• Title/Summary/Keyword: Assured Services

Search Result 60, Processing Time 0.025 seconds

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

A study on the Throughput Guarantee with TCP Traffic Control (전송률 보장을 위한 TCP 트래픽 제어에 관한 연구)

  • Lee, Myun-Sub
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.303-308
    • /
    • 2016
  • Recently, as the rapid development of network technology and the increase of services required high bandwidth such as multimedia service, the network traffic dramatically increases. This massive increase of network traffic causes some problems such as the degradation of QoS and the lack of network resources and, to solve these problems, various research to guarantee QoS have been performing. Currently, The most representative method to guarantee the QoS is the DiffServ(: Differentiated Service). The DiffServ defines the AF(: Assured Forwarding) PHB(: Per Hop Behavior) and statistically ensures the throughput over the certain level of data rate. However, the TCP congestion control method that make up the majority of the Internet traffic is not fundamentally suitable to the DiffServ that guarantees the throughput without managing the individual flow. Therefore, in this paper, we present this mismatch through the simulation as an example and propose the solution by controlling the TCP of the terminal in the network. The proposed scheme utilizes the information of the reception window size included in the ACK frame and does not require any modification of the TCP algorithms currently in use.

A Study on Systemic Test Approach of Automated Control of the Personal Rapid Transit System (PRT 자동화 제어시스템의 체계적인 테스트 접근에 관한 연구)

  • Jeong Seung-Hwan;Kim Jong-Ki;Lee Kum-Seok
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.205-210
    • /
    • 2004
  • The PRT(Personal Rapid Transit) system has been being researched and examined to efficiently provide high quality services to passengers against the traffic congestion of the capital region. With concept that PRT differentiated from GRT(Group Rapid Transit), PRT generally is a tracked vehicle system operating with unmanned. The embedded software of PRT Automated Control system generally is comprised of the central software, stations software and vehicle software. The controllers of these software interface to each other using its RF communication antennas. In this paper, each embedded software of the PRT system should be applied to an incremental and systematic test approach technique in the design and implementation phase, because the reliability and safety of the PRT system should be assured

  • PDF

A Study on Service Design of Public transportation for Transportation Vulnerable - Focused on elderly and Foreigner - (교통약자를 고려한 대중교통 서비스 디자인 연구 - 고령자 및 외국인 중심으로 -)

  • Lee, Seung Min;Pan, Young Hwan;Song, In ho
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.223-236
    • /
    • 2016
  • The infrastructure of public transportation of Seoul which has been developed in parallel with the progress of modernization receives successful performance evaluation at home and abroad, currently representing the highest transport distribution ratio. In spite of this fact, the public transportation of Seoul, which has entered into advanced phase of services, still leaves much to be desired, in particular, the mobility considering the transportation vulnerable is not well assured. It is time to provide proper supports for the efficient mobility of public transportation in accordance with the social changes present in the aging and multicultural society. This study inquired about the current status of public transportation and that of its users. In addition, the main inquiry target was oriented to the elderly and foreigners for observation and investigation, as well as for the analysis of their behavior. Furthermore, through in-depth interviews, inconvenient factors have been found according to public transportation means and its usage phase, by carrying out detailed evaluations of public transportation services. Based on this, the enhancement elements were defined and the corresponding concept was designed through a series of idea workshops, and this study intended to contribute to improving future public transportation services by proposing the improvement scheme applicable to the upcoming public transportation.

A link control method using self relay signal in wireless sensor networks (무선 센서 네트워크에서 자기 전달 신호를 활용한 전송 제어 방법)

  • Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.37-43
    • /
    • 2009
  • Reliability should be assured to support the stable ubiquitous sensor network services in wireless sensor networks. Data transmission reliability is the most important one in the reliability factors in USN. When we consider the wireless communication environment of sensor networks, data transmission reliability requires the performance improvement. For this, this paper introduces the method that can handle the reliability and the performance together. The proposed scheme uses the self relay signal between sensor nodes to deliver the ACK and the next data is scheduled to be sent on acceptance of this self relay signal. For the evaluation of the performance improvement, the analysis and the simulation have been done.

  • PDF

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

A Study on Control Scheme for Fairness Improvement of Assuared Forwarding Services in Differentiated Service Network (DiffServ 망에서 AF 서비스의 공평성 향상을 위한 제어 기법)

  • Kim, Byun-gon;Jeong, Dong-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.649-652
    • /
    • 2015
  • Previous marking policy for the AF service of TCP traffic in the Diffserv network have no sufficient consideration on the effect of RTT and target rate. In this paper, in order to improve fairness Index by the effect RTT difference of TCP traffic, we propose the modified TSW3CDM(Time Sliding Window Three Color Dynamic Marker) based on average transfer rate estimation and the flow state. The proposed algorithm is dynamic marking policy that do allocate band width in proportion to transmission rate. To evaluate the performance of the proposed algorithm, We accomplished a computer simulation using NS-2. From simulation results, the proposed TSW3CDM algorithm improves fairness index by comparison with TSW3CM.

  • PDF

An Adaptive Drop Marker for Edge Routers in DiffServ Networks

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.411-419
    • /
    • 2011
  • In this paper, we propose an Adaptive Regulating Drop (ARD) marker, as a novel dropping strategy at the ingressive edge router, to improve TCP fairness in assured services (ASs) without a decrease in the link utilization. To drop packets pertinently, the ARD marker adaptively changes a Temporary Permitted Rate (TPR) for aggregate TCP flows. The TPR is set larger than the current input IN packet rate of aggregate TCP flows while inversely proportional to the measured input OUT packet rate. To reduce the excessive use of greedy TCP flows by notifying droppings of their IN packets constantly to them without a decrease in the link utilization, the ARD marker performs random early fair remarking of their excessive IN packets to OUT packets at the aggregate flow level according to the TPR. In addition, an aggregate dropper is combined to drop some excessive IN packets fairly and constantly according to the TPR. Thus, the throughput of a TCP flow no more depends on only the sporadic and unfair OUT packet droppings at the RIO buffer in the core router. Then, the ARD marker regulates the packet transmission rate of each TCP flow to the contract rate by increasing TCP fairness, without a decrease in the link utilization.

Priority Factors of Service Recovery Strategy in Distribution Channel

  • Han, Sang-Lin;Jung, Kyung Sik;Lee, Myoung Soung;Lee, Jong Won
    • Asia Marketing Journal
    • /
    • v.17 no.2
    • /
    • pp.97-125
    • /
    • 2015
  • In this study, we tried to evaluate the relative importance and find out the differences in consumer perceptions regarding service recovery strategies and the service provider in the distribution industry by using AHP (Analytic Hierarchy Process) analysis method. Therefore in this study, we tried to systematize various recovery strategies which were considered very important during service failure process in the distribution industry and analyze the relative importance for each recovery strategy. We set hierarchy composed of four items of monetary, action-oriented, psychological, and assured level as primary selection criteria and a total of 16 items(indemnity, refund, gift, gift certificate, prompt resolution, exchange, manager support, explanation, apology, empathy, acknowledge, kindness, assortment, after service, manage subcontractor, manage employee) as secondary selection criteria. We tried to take one step further from the service sector and study service recovery strategies specialized in distributor services. This study suggests various implications about service recovery strategies of distributors. First, this study can provide practical implications - e.g. service recovery efforts should be applied differently depending on service channels. There is a perceptual difference with respect to the importance of the types of service recovery strategies between service provider and final customer. Second, we can find theoretical implications in terms of identifying the priorities through hierarchy design of new recovery strategies and comparison of each element from the classifications of the current fractional recovery strategies. We hope to help service providers to build more efficient recovery strategy system based on the results of this study.

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.