• 제목/요약/키워드: Assured Services

검색결과 60건 처리시간 0.03초

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • 제2권4호
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

전송률 보장을 위한 TCP 트래픽 제어에 관한 연구 (A study on the Throughput Guarantee with TCP Traffic Control)

  • 이면섭
    • 한국전자통신학회논문지
    • /
    • 제11권3호
    • /
    • pp.303-308
    • /
    • 2016
  • 최근 네트워크 기술이 급속도로 발전하고 인터넷 상에서 멀티미디어 서비스 같은 높은 대역폭을 요구하는 서비스들이 증가하면서 네트워크 트래픽이 급속히 증가하고 있다. 이러한 트래픽의 급증으로 인하여 네트워크 자원 부족 및 서비스의 품질 저하등의 문제점들이 발생하고 있으며, 이를 해결하기 위해 QoS(: Quality of Service)를 보장하기 위한 다양한 기법들이 연구되고 있다. 현재 QoS를 보장하기 위한 기법들 중 가장 대표적인 방식이 차등화 서비스(Differentiated Service)이다. 차등화 서비스에서는 AF(: Assured Forwarding) PHB(: Per Hop Behavior)를 정의하고 이를 통해 통계적으로 일정 수준 이상의 전송률(throughput)을 보장하고자 한다. 그러나, 인터넷 트래픽의 대부분을 차지하고 있는 TCP의 혼잡제어 방식은 개별 플로(flow)를 관리하지 않으면서 전송률을 보장하려고 하는 차등화 서비스의 방식과 근본적인 부조화를 보인다. 본 논문에서는 이러한 부조화 현상을 시뮬레이션을 통해 예시적으로 보여주고, 망에서 터미널의 TCP를 제어하여 이를 해결할 수 있는 방안을 제시하였다. 본 논문에서 제안한 방식은 TCP를 제어하기 위해 ACK에 포함되는 수신 윈도우 크기 정보를 조작하며, 이는 현재 사용중인 TCP 알고리즘의 수정을 필요로 하지 않는다.

PRT 자동화 제어시스템의 체계적인 테스트 접근에 관한 연구 (A Study on Systemic Test Approach of Automated Control of the Personal Rapid Transit System)

  • 정승환;김종기;이금석
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2004년도 추계학술대회 논문집
    • /
    • pp.205-210
    • /
    • 2004
  • The PRT(Personal Rapid Transit) system has been being researched and examined to efficiently provide high quality services to passengers against the traffic congestion of the capital region. With concept that PRT differentiated from GRT(Group Rapid Transit), PRT generally is a tracked vehicle system operating with unmanned. The embedded software of PRT Automated Control system generally is comprised of the central software, stations software and vehicle software. The controllers of these software interface to each other using its RF communication antennas. In this paper, each embedded software of the PRT system should be applied to an incremental and systematic test approach technique in the design and implementation phase, because the reliability and safety of the PRT system should be assured

  • PDF

교통약자를 고려한 대중교통 서비스 디자인 연구 - 고령자 및 외국인 중심으로 - (A Study on Service Design of Public transportation for Transportation Vulnerable - Focused on elderly and Foreigner -)

  • 이승민;반영환;송인호
    • 디자인융복합연구
    • /
    • 제15권2호
    • /
    • pp.223-236
    • /
    • 2016
  • 근대화의 발전과 함께 성장해온 서울의 대중교통의 인프라는 국내외로 성공적인 평가를 받고 있으며 현재 가장 높은 수송 분담률을 가지고 있다. 그럼에도 불구하고 서비스 고도화 단계에 진입한 서울시의 대중교통은 아직도 부족한 부분이 많으며 특히 교통약자에 대한 이동성이 보장되지 않고 있다. 고령화 및 다문화 등의 사회적 변화에 맞춰 특정 계층의 대중교통 이용에 지원이 필요한 시점이다. 본 연구에서는 대중교통의 현황 및 이용자의 현황을 살펴보고 고령자 및 외국인을 주 조사 대상으로 선정하여 관찰조사를 진행하고 행태를 분석하였다. 또한 심층 인터뷰를 통해 대중교통 서비스 상세한 평가를 진행하여 대중교통수단과 이용단계 별 불편요소를 발굴하였다. 이를 토대로 아이디어 워크숍을 통해 개선요소를 정의하고 컨셉 디자인을 하여 향후 대중교통에 적용할 수 있는 개선안을 제시하여 추후 대중교통 서비스를 개선하는데 일조하고자 하였다.

무선 센서 네트워크에서 자기 전달 신호를 활용한 전송 제어 방법 (A link control method using self relay signal in wireless sensor networks)

  • 김승천
    • 한국인터넷방송통신학회논문지
    • /
    • 제9권2호
    • /
    • pp.37-43
    • /
    • 2009
  • 안정적인 유비쿼터스 센서 네트워크 서비스가 운용되기 위해서는 센서 네트워크 내에서 신뢰성이 확보되어야 하며, 이중에서도 전송 신뢰성의 확보는 다른 어떤 것보다 시급하다. 특히 무선 센서 네트워크의 활용이라는 측면을 보았을 때 전송 신뢰성은 단순히 안정적인 전송만을 생각하기 보다는 성능 향상이라는 부분도 생각해야 한다. 이를 위해서 본 논문에서는 전송 신뢰성 확보와 성능 개선이라는 두가지 모두를 확보 할 수 있는 방법을 제안한다. 제안하는 방법은 무선 환경 내에서의 자기 전달 신호를 활용하여 ACK를 대신하고 이를 바탕으로 다음 데이터의 전송을 시작하도록 한다. 성능 개선을 확인하기 위해서 제안 방법의 수학적 분석과 시뮬레이션을 통한 검증을 실시한다.

  • PDF

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

DiffServ 망에서 AF 서비스의 공평성 향상을 위한 제어 기법 (A Study on Control Scheme for Fairness Improvement of Assuared Forwarding Services in Differentiated Service Network)

  • 김변곤;정동수
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.649-652
    • /
    • 2015
  • 차등서비스 네트워크의 AF(Assured Forwarding) 서비스에서 TCP 트래픽을 위한 기존 marking policy 연구는 TCP 트래픽의 RTT(Round Trip Time), 목표 전송률(target rate) 영향 등에 대한 고려가 부족하였다. 본 논문에서는 TCP 트래픽의 RTT의 영향에 의한 낮은 공평성을 개선하기 위하여 평균 전송률 예측 기반에서 TCP flow의 상태 정보를 이용한 개선된 TSW3CDM_FS(Time Sliding Window Three Color Dynamic Marker) 알고리즘을 제안한다. 제안한 알고리즘은 목표 전송률에 비례한 대역분배를 하기위한 dynamic marking policy 알고리즘이다. 제안된 알고리즘의 성능평가를 위하여 네트워크 시뮬레이터(NS-2)를 이용하여 컴퓨터 시뮬레이션을 수행하였다. 시뮬레이션 결과 제안한 TSW3CDM 알고리즘의 공평성이 기존의 TSW3CM 방식에 비해 향상된 결과를 보였다.

  • PDF

An Adaptive Drop Marker for Edge Routers in DiffServ Networks

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.411-419
    • /
    • 2011
  • In this paper, we propose an Adaptive Regulating Drop (ARD) marker, as a novel dropping strategy at the ingressive edge router, to improve TCP fairness in assured services (ASs) without a decrease in the link utilization. To drop packets pertinently, the ARD marker adaptively changes a Temporary Permitted Rate (TPR) for aggregate TCP flows. The TPR is set larger than the current input IN packet rate of aggregate TCP flows while inversely proportional to the measured input OUT packet rate. To reduce the excessive use of greedy TCP flows by notifying droppings of their IN packets constantly to them without a decrease in the link utilization, the ARD marker performs random early fair remarking of their excessive IN packets to OUT packets at the aggregate flow level according to the TPR. In addition, an aggregate dropper is combined to drop some excessive IN packets fairly and constantly according to the TPR. Thus, the throughput of a TCP flow no more depends on only the sporadic and unfair OUT packet droppings at the RIO buffer in the core router. Then, the ARD marker regulates the packet transmission rate of each TCP flow to the contract rate by increasing TCP fairness, without a decrease in the link utilization.

Priority Factors of Service Recovery Strategy in Distribution Channel

  • Han, Sang-Lin;Jung, Kyung Sik;Lee, Myoung Soung;Lee, Jong Won
    • Asia Marketing Journal
    • /
    • 제17권2호
    • /
    • pp.97-125
    • /
    • 2015
  • In this study, we tried to evaluate the relative importance and find out the differences in consumer perceptions regarding service recovery strategies and the service provider in the distribution industry by using AHP (Analytic Hierarchy Process) analysis method. Therefore in this study, we tried to systematize various recovery strategies which were considered very important during service failure process in the distribution industry and analyze the relative importance for each recovery strategy. We set hierarchy composed of four items of monetary, action-oriented, psychological, and assured level as primary selection criteria and a total of 16 items(indemnity, refund, gift, gift certificate, prompt resolution, exchange, manager support, explanation, apology, empathy, acknowledge, kindness, assortment, after service, manage subcontractor, manage employee) as secondary selection criteria. We tried to take one step further from the service sector and study service recovery strategies specialized in distributor services. This study suggests various implications about service recovery strategies of distributors. First, this study can provide practical implications - e.g. service recovery efforts should be applied differently depending on service channels. There is a perceptual difference with respect to the importance of the types of service recovery strategies between service provider and final customer. Second, we can find theoretical implications in terms of identifying the priorities through hierarchy design of new recovery strategies and comparison of each element from the classifications of the current fractional recovery strategies. We hope to help service providers to build more efficient recovery strategy system based on the results of this study.

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.