• Title/Summary/Keyword: 프로토콜 성능

Search Result 2,787, Processing Time 0.038 seconds

A Study on Effective Peer Search Algorithm Considering Peer's Attribute using JXTA in Peer-to-Peer Network (JXTA를 이용한 Peer-to-Peer 환경에서 Peer의 성향을 고려한 Peer 탐색 알고리즘의 연구)

  • Lee, Jong-Seo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.632-639
    • /
    • 2011
  • Searching distributed resource efficiently is very important in distributed computing, cloud computing environment. Distributed resource searching may have system overheads and take much time in proportion to the searching number, because distributed resource searching has to circuit many peers for searching information. The open-source community project JXTA defines an open set of standard protocols for ad hoc, pervasive, peer-to-peer computing as a common platform for developing a wide variety of decentralized network applications. In this paper, we proposed peer search algorithm based on JXTA-Sim. original JXTA peer searching algorithm selected a loosely-consistent DHT. Our Lookup algorithm decreases message number of WALK_LOOKUP and reduce the network system overload, and we make a result of same performance both original algorithm and our proposed algorithm.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Design and Implementation of 10 Giga VPN Acceleration Board (10 Giga급 VPN 가속보드 설계 및 구현)

  • 김기현;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.661-664
    • /
    • 2003
  • Trade-off of sorority and speed always exists in the latest network environment. Recently, developed security processors is improved very performance, and sorority connection algorithms of a lot of part were embodied by hardware. This high speed security processor is essential ingredient in string network security solution equipment development that require very big band width. In this paper, we wish to describe about design and implementation of 10 Giga VPN equipments. In this system, embodied 10 Giga to use Cavium company's Nitrox-II processor, and supports two SP14-2 interface and PCI interface. All of the password algorithm that password algorithm that support is used in common use VPN equipment for compatibility with common use VPN equipment are supported and support SEED algorithm developed in domestic. Designed to support IPsec and SSL protocol, and supports all of In-Line structure that is profitable in high speed transaction and the Look-Aside structure that is profitable in practical use degree of NPU(Network Processor Unit).

  • PDF

Design and Implementation of Mobile VNC System for GUI Control and Monitoring of Remote Computer (원격 컴퓨터의 GUI 제어와 모니터링을 위한 Mobile VNC 시스템 설계 및 구현)

  • Chon Hee-ja;Seo Jung-Hee;Park Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.912-919
    • /
    • 2005
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere. So mobile devices like cellular phone and PDA are now used in various fields. In particular, the mobility of mobile devices has a great advantage in remote control. This paper designed and implemented a Mobile VNC system that transmitted the screen image of a remote computer, control the remote computer GU and monitor all by cellular phone. The proposed system consists of a Mobile Viewer un on the cellular phone, VNC Server m on a number of remote computers and a VNC Monitor. For communication between the VNC Server and the Mobile Viewer the MRFB protocol is used. The screen image transmitted to the Mobile Viewer is encoded in the PNG format supported by SK-VM, the Java execution environment of the Cellular phone. According to implementation results, the image is about $2KB\~8KB$. According to the 65 times transmission test, the average frame per second is 4.93fps in the emulator and a real cellular phone takes 0.8fps. Therefore, the proposed system is more efficient than existing systems.

An Analysis of Maximum Allowable Transmission Output Level between Adjacent Channels in TV Frequency Band (TV 주파수 대역 내 인접채널간의 최대 허용 송신 출력 레벨 분석)

  • Cho, Ju-Phil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1364-1369
    • /
    • 2012
  • We make an analysis of maximum allowable transmission output level to get the solution how heterogeneous systems between adjacent channels can be used in TVWS(TV White Space). The two applied systems are WLAN and WiBro and the overall performances are analyzed based on simulation results according to various density and transmission output of interfering transmitter. In order to get the relationship between interfering density of two systems and allowable maximum transmitter output, we consider the case that a WLAN is an interfering transmitter and a WiBro is a victim receiver. Each simulation results, obtained by free space channel model, are analyzed by SEAMCAT. Coexistence results may be widely applied into the technique development to get the coexisting condition for wireless devices using many communication protocols in an adjacent frequency and a same frequency.

Multimedia No-reference Video Quality Assessment Methods Using Bit Stream Information (비트스트림 정보를 이용한 멀티미디어 동영상의 무기준법 화질평가방법)

  • Seo, Guiwon;Ok, Jiheon;Lee, Kwon;Lee, Jae Ho;Lee, Chulhee
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.283-296
    • /
    • 2013
  • Various video services with networks are increasingly available as smart phones, computers and IPTV are widely used. However, transmission over networks may experience transmission errors due to traffic increases and noise. As a result, video quality may suffer. Therefore, quality monitoring emerges as an important issue. In this paper, we propose a video quality assessment method using bit stream information. The video quality metric is calculated using header information and ES (elementary stream) information. To assess performance of the proposed algorithm, subjective quality assessment tests are conducted (VGA resolution). It is shown high correlation between subjective result and the proposed method.

A study on the implementation and performance evaluation of low-power ZigBee sensor in the M2M gateway system (M2M Gateway 시스템을 위한 저전력 지그비 센서 구현 및 성능평가에 관한 연구)

  • Jeon, Joong-Sung;Kim, Nam-Hwan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.629-634
    • /
    • 2016
  • This paper describes the implementation of a ZigBee sensor node that can be utilized as a multiband and machine to machine (M2M) communication gateway. The IEEE 802.15.4-2003 standard was used as the wireless network frequency band. Ember's Type EM357 SoC was used as the transmission and reception device to perform the communication function, and it was also used for both the main M2M gateway and the sensor node. For the implementation of the operating protocol, EmberZNet Stack 4.5.4 from the Ember Corporation was used. The measurement of the reception sensitivity in the receiving module and the actual output signal from the reference were obtained from the transmission of a packet, and the packet included the M2M gateway within the attached ZigBee sensor. The packet error rate was measured as 0% with a -98 dBm reception sensitivity at the ZigBee frequency. In addition, excellent current characteristics of the ZigBee modules were shown by the implementation of the low-power circuit.

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

Security Mechanism for Firewall Traversal in Mobile IP (안전한 방화벽 Traversal을 제공하는 Mobile IP의 보안 메커니즘)

  • Jin, Min-Jeong;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.11-20
    • /
    • 2004
  • Mobile IP is designed to provide IP services to roaming nodes. Mobile users take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases mobile users is connected through a wireless link and is protected by corporation's firewall in virtual Private network. In order to have a successful deployment of Mobile IP as an extension of a private network, security services should be provided as if the mobile node were attached to its home network. In this paper, we propose the security mechanism of combining Mobile IP and IPSec tunnels, which can provide secure traversal of firewall in a home network. The simulation results show that the proposed mechanism provides the secure and efficient communication.

Development of Signature Generation and Update System for Application-level Traffic Classification (응용 레벨 트래픽 분류를 위한 시그니쳐 생성 및 갱신 시스템 개발)

  • Park, Jun-Sang;Park, Jin-Wan;Yoon, Sung-Ho;Lee, Hyun-Shin;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.99-108
    • /
    • 2010
  • The traffic classification is a preliminary but essentialstep for stable network service provision and efficient network resource management. While various classification methods have been introduced in literature, the payload signature-based classification is accepted to give the highest performance in terms of accuracy, completeness, and practicality. However, the collection and maintenance of up-to-date signatures is very difficult and time consuming process to cope with the dynamics of Internet traffic over time. In this paper, We propose an automatic payload signature generation mechanism which reduces the time for signature generation and increases the granularity of signatures. Furthermore, We describe a signature update system to keep the latest signatures over time. By experiments with our campus network traffic we proved the feasibility of our mechanism.