• Title/Summary/Keyword: Bandwidth Requirements

Search Result 330, Processing Time 0.03 seconds

Degraded Quality Service Policy with Bitrate based Segmentation in a Transcoding Proxy

  • Lee, Jung-Hwa;Park, Yoo-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.245-250
    • /
    • 2010
  • To support various bandwidth requirements for many kinds of devices such as PC, notebook, PDA, cellular phone, a transcoding proxy is usually necessary to provide not only adapting multimedia streams to the client by transcoding, but also caching them for later use. Due to huge size of streaming media, we proposed the 3 kinds of segmentation - PT-2, uniform, bitrate-based segmentation. And to reduce the CPU cost of transcoding video, we proposed the DQS service policy. In this paper, we simulate the combined our previous two researches that are bitrate-based segmentation and DQS(Degraded Quality Service) policy. Experimental results show that the combined policy outperforms companion schemes in terms of the byte-hit ratios and delay saving ratios.

A Practical Network Design for VoD Services

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.225-234
    • /
    • 2009
  • Recently IPTV service is penetrating to the ordinary home users very swiftly. One of the first phase of IPTV service is considered to be VoD, and a nationwide availability of the VoD service imposes tremendous pressure to the network resource due to its requirements for the broad bandwidth, the inherent nature of unicast technology, and the large scalability, etc. This work suggests a novel and practical method to the design of network resource for the VoD service. Especially, we explore the distributed content storage problem that takes into account the popularity of the video contents and its corresponding link dimensioning problem that takes into account the grade of service for the flow level quality of service about the VoD service. By assuming a realistic topology for the nationwide IP backbone network of Korea, which is a typical tree topology, we suggest an analytic method for the design of VoD service.

The Status of Configuration on the e-VLBI Network for the Transfer of Mass VLBI Data (대용량 VLBI 데이터 전송을 위한 e-VLBI 네트워크 구축 현황)

  • Song, Min-Gyu;Kim, Hyun-Goo;Byun, Do-Young;Roh, Duk-Gyoo;Oh, Se-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.560-562
    • /
    • 2005
  • The electronic transmission of VLBI data(dubbed e-VLBI) presents a special challenge to the use of high-speed global network. with long-term requirements for simultaneous or near-simultaneous Gbps data streams from antennas worldwide converging in a single processing center, e-VLBI is both a useful and highly synergetic application for global high-speed networksAs broband access to high speed research and education networks has become increasingly available to radio telescopes around the world the use of e-VLBI has also increased. High bandwidth e-VLBI experiments have been achieved across wide areas e-VLBI has also been used for the transfer of data from "production"exoeriments

  • PDF

New Buffer Management Scheme to Support TCP/IP Traffic over ATM GFR service

  • Kim, Kwan-Woong;Park, Ji-Hyoun;Chung, Kyung-Taek;Chon, Byoung-Sil
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.892-895
    • /
    • 2002
  • We propose new buffer management scheme for GFR service through FIFO queuing discipline. Proposed scheme can provide minimum bandwidth guarantees for GFR VCs as well as improve the fairness among the competing GFR VCs on a single FIFO queue. From simulation results, we demonstrate the proposed scheme fulfills the requirements of GFR service as well as improves the TCP throughput.

  • PDF

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

Optimal Design of a Barrel Stave Flextensional Transducer (Barrel Stave Flextensional 트랜스듀서의 최적설계)

  • Kim, Hoe-Yong;Kim, Won-Ho;Joh, Chee-Young;Roh, Yong-Rae
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.18 no.5
    • /
    • pp.572-581
    • /
    • 2008
  • The performance of a barrel stave flextensional transducer is determined by the properties of its constituent materials and the effects of many structural parameters. In this study, with the finite element method, the structure of a barrel stave flextensional transducer was optimized to achieve the widest bandwidth while satisfying the requirements on pressure and center frequency. The optimization was carried out with the SQP-PD method for multi-variable minimization. The optimized barrel stave flextensional transducer satisfied all the required specifications.

A dynamic cell scheduling algorithm for efficient allocation of bandwidth on ATM network (ATM 망에서 효율적 대역폭 할당을 위한 종적 셀 스케줄링 알고리즘)

  • 조성현;오윤탁;박성한
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.54-64
    • /
    • 1998
  • In this paper, a cell scheduling algorithm is proposed to satisfy the service requirements of CBR, VBR traffics. Particularly, inthe proposed algorithm an ABR traffic which is not included in the conventional cell schedulaing algorithm is treated as one kind of traffic types. The algorithm of RT-VBR and NRT-VBR traffic such that the service requrements of RT-VBR and NRT-VBR traffic are satisfied. The proposed algorithm dynamically schedules cells in a real time by considerin the current traffic conditions. The simulation of the proposed algorithms such as WRR or DWRR in terms of the mean delay time and the maximum queue length.

  • PDF

GPS/PCS Dual Polarization Compact Microstrip patch Antenna (GPS/PCS 이중편파 소형 마이크로스트립 패치 안테나)

  • Kim, Ho-Yong;Cho, Jung-Yong;Won, Chung-Ho;Lee, Hong-Min
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2003.11a
    • /
    • pp.473-477
    • /
    • 2003
  • In this paper, a integrated structure of a two-element microstrip patch antenna with two feeds for GPS/PCS dual-band operation is proposed. The radiating element for PCS operation is a novel broad band low-profile cylindrical monopole top-loaded with a shorted meander patch, which gives linearly polarized conical radiation pattern and size reduction of patch due to meander line. The radiating element for GPS operation is a novel square-ring microstrip patch with truncated corners and slits. which provide circularly polarized broadside radiation patterns and size reduction due to slots. using dielectric substrate in GPS antenna of proposed antenna provide to improve isolation between two feeds and reduce size of patch. The proposed antenna achieves the bandwidth and polarization requirements of GPS and PCS systems.

  • PDF

A Study on the Cell Loss Rates for Various Parameter Values of Leaky Bucket Mechanism in ATM Networks (ATM망의 Leaky Bucket 메카니즘에서 파라메타 값들에 대한 쎌손실율의 연구)

  • 이영옥;유기혁
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.174-178
    • /
    • 1991
  • ATM, the core technology of BISDN, provides a high degree of flexibility with regard to varying bandwidth requirements for different services. In ATM networks, since users may exceed the traffic volume negotiated at the call setup, traffic from users may need to be monitored and enforced to comply with traffic parameters. The leakybucket mechanism is one of the typical traffic enforcement methods based on the use of transmission tokens for each cell. In this mechanism the major system parameters are size of input buffer, size of token pool, and token generation ratio. In order to represent ATM cell arrivals we assume a Poisson process. In this paper, a state transition analysis technique is used to study the cell loss rates for various values of system parameters.

RSA Based Digital Signature for Secure Authentication

  • Allayear, Shaikh Muhammad;Park, Sung-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1083-1086
    • /
    • 2005
  • Now these days, many technical concepts and tools have been developed in the cryptographic field. Most digital signature schemes used in practice, such as RSA or DSA, have an important role in information privacy and secure authentication for perfect user. A clearly advantage of such schemes over with security proven relative to such common cryptographic assumptions, is their efficiency: as a result of their relative weak requirements regarding computation, bandwidth and storage, these scheme have so far beaten proven secure schemes in practice. Our aim is to contribute to bridge the gap that exists between the theory and practice of digital signature schemes. In this paper we present a digital signature that ensures information privacy. More precisely, under an appropriate assumption about RSA, the scheme is proven to be existentially forgeable under adaptively chosen message attacks. This mechanism can be applied to smart cards or E-Wallet for maintaining secure authentication for user’s information privacy.

  • PDF