• 제목/요약/키워드: Bandwidth management scheme

Search Result 131, Processing Time 0.024 seconds

Design and Implementation of An I/O System for Irregular Application under Parallel System Environments (병렬 시스템 환경하에서 비정형 응용 프로그램을 위한 입출력 시스템의 설계 및 구현)

  • No, Jae-Chun;Park, Seong-Sun;;Gwon, O-Yeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1318-1332
    • /
    • 1999
  • 본 논문에서는 입출력 응용을 위해 collective I/O 기법을 기반으로 한 실행시간 시스템의 설계, 구현 그리고 그 성능평가를 기술한다. 여기서는 모든 프로세서가 동시에 I/O 요구에 따라 스케쥴링하며 I/O를 수행하는 collective I/O 방안과 프로세서들이 여러 그룹으로 묶이어, 다음 그룹이 데이터를 재배열하는 통신을 수행하는 동안 오직 한 그룹만이 동시에 I/O를 수행하는 pipelined collective I/O 등의 두 가지 설계방안을 살펴본다. Pipelined collective I/O의 전체 과정은 I/O 노드 충돌을 동적으로 줄이기 위해 파이프라인된다. 이상의 설계 부분에서는 동적으로 충돌 관리를 위한 지원을 제공한다. 본 논문에서는 다른 노드의 메모리 영역에 이미 존재하는 데이터를 재 사용하여 I/O 비용을 줄이기 위해 collective I/O 방안에서의 소프트웨어 캐슁 방안과 두 가지 모형에서의 chunking과 온라인 압축방안을 기술한다. 그리고 이상에서 기술한 방안들이 입출력을 위해 높은 성능을 보임을 기술하는데, 이 성능결과는 Intel Paragon과 ASCI/Red teraflops 기계 상에서 실험한 것이다. 그 결과 응용 레벨에서의 bandwidth는 peak point가 55%까지 측정되었다.Abstract In this paper we present the design, implementation and evaluation of a runtime system based on collective I/O techniques for irregular applications. We present two designs, namely, "Collective I/O" and "Pipelined Collective I/O". In the first scheme, all processors participate in the I/O simultaneously, making scheduling of I/O requests simpler but creating a possibility of contention at the I/O nodes. In the second approach, processors are grouped into several groups, so that only one group performs I/O simultaneously, while the next group performs communication to rearrange data, and this entire process is pipelined to reduce I/O node contention dynamically. In other words, the design provides support for dynamic contention management. Then we present a software caching method using collective I/O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performance for I/O above what has been possible so far. The performance results are presented on an Intel Paragon and on the ASCI/Red teraflops machine. Application level I/O bandwidth up to 55% of the peak is observed.he peak is observed.

Mtigating the IGMP Flooding Attacks for the IPTV Access Network (IPTV 접속망에서의 IGMP 플러딩 공격 효과 감소 기법)

  • Kim, Sung-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.998-1002
    • /
    • 2009
  • In IPTV multicast architecture, the IGMP(Internet Group Management Protocol) is used for access networks. This protocol supports the functionality of join or leave for a specific multicast channel group. But, malicious attackers can disturb legitimate users being served appropriately. By using spoofed IGMP messages, attackers can hi-jack the premium channel, wasting bandwidth and exhausting the IGMP router's resources. To prevent the message spoofing, we can introduce the packet-level authentication methods. But, it causes the additional processing overhead to an IGMP processing router, so that the router is more susceptible to the flooding attacks. In this paper, we propose the two-level authentication scheme in order to mitigate the IGMP flooding attack.

A Frequency Allocation Method for Cognitive Radio Using the Fuzzy Set Theory (퍼지 집합 이론을 활용한 무선인지 주파수 할당 알고리즘)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.745-750
    • /
    • 2008
  • In a cognitive radio based system, quality of service (QoS) for the secondary user must be maintained as much as possible even while that of the primary user is protected all he time. In particular, switching wireless links for the secondary user during the transmission of multimedia data causes delay and information loss, and QoS degradations occur inevitably. The efficient resource management scheme is necessary to support the seamless multimedia service to the secondary user. This paper proposes a novel frequency selection method based on Multi-Criteria Decision Making (MCDM), in which uncertain parameters such as received signal strength, cell load, data rate, and available bandwidth are considered during the decision process for the frequency selection with the fuzzy set theory. Through simulation, we show that our proposed frequency selection method provides a better performance than the conventional methods which consider the received signal strength only.

An Uplink Scheduling Algorithm for VoIP in IEEE 802.16d Systems (IEEE 802.160에서 상향링크 VoIP 스케줄링 알고리즘 방식 연구)

  • Kang, Min-Seok;Jang, Jae-Shin
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.87-91
    • /
    • 2006
  • With the growth of the internet, the number of wireless internet users has increased continuously up to date. However, mobile communications could not support high speed transmission rate with cheap communication fee and wireless LAN has problems in providing terminal mobility and wide area connectivity, respectively. So the WMAN standard has been newly designed to make up for these limits. The initial 802.16 specification effectively offers a solution for providing fixed users with high speed wireless communication but it does not offer terminal mobility. So the 802.16d and 802.16e have been developed as the next generation solution that can support various PHY layer (SC, SCa, OFDM, OFDMA) and offer the terminal mobility. In this paper, we propose an effective uplink scheduling algorithm for VoIP with using UGS, and we show that our proposed algorithm is superior in view of average delay and management of uplink bandwidth to conventional rtPS algorithm and the scheme in reference, with using NS-2 network simulator.

  • PDF

A Dualistic Channel List Management Technique for Efficient Channel Navigation in IPTVs (효율적인 IPTV 채널 탐색을 위한 이분화된 채널 리스트 관리 기술)

  • Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.21-26
    • /
    • 2016
  • With the increased desire of TV consumers for interactivity and personalization, IPTV has been rapidly spread in recent years. IPTV can provide a variety of services through hundreds of channels, but the explosion of TV channels makes users even more difficult to find their desired contents. In addition, the channel zapping delay of IPTV is serious due to the limited network bandwidth. To resolve these problems, this paper distinguishes hot and cold channels by exploiting the real-time viewing rate as well as each user's viewing history, and then, maintains hot channels in the hot list, which is searched first during channel navigation and also prefetched to support the preview of channels. Experimental results show that the proposed scheme improves the IPTV channel seek time significantly compared to existing channel seeking interfaces.

Performance Analysis of Fractional Frequency Reuse Scheme for Enterprise Femtocell Networks (기업형 펨토셀 네트워크에서 부분 주파수 재사용 방법의 성능분석)

  • Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.11-17
    • /
    • 2018
  • In this paper, we propose a novel frequency reuse method using the fractional frequency reuse (FFR) for enterprise femtocell networks (EFNs) in which a lot of femtocell base stations (fBSs) are deployed in a buinding, e.g., business companies, department stores, etc, and evaluate the system performance for the downlink of EFNs. First, we introduce the concept of the split reuse method to allocate the frequency bandwidth with considering the interference between the macrocell and femtocell. Then, we propose the resource allocation with the FFR for fBSs of EFNs to reduce the interference and increase the system capacity. Through simulations, we show that the proposed FFR method outperforms a traditional resource allocation method with frequency reuse factor 4 in terms of the mean fUE capacity, total EFN capacity, and outage probability.

Design and Performance Evaluation of a Flash Compression Layer for NAND-type Flash Memory Systems (NAND형 플래시메모리를 위한 플래시 압축 계층의 설계 및 성능평가)

  • Yim Keun Soo;Bahn Hyokyung;Koh Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.4
    • /
    • pp.177-185
    • /
    • 2005
  • NAND-type flash memory is becoming increasingly popular as a large data storage for mobile computing devices. Since flash memory is an order of magnitude more expensive than magnetic disks, data compression can be effectively used in managing flash memory based storage systems. However, compressed data management in NAND-type flash memory is challenging because it supports only page-based I/Os. For example, when the size of compressed data is smaller than the page size. internal fragmentation occurs and this degrades the effectiveness of compression seriously. In this paper, we present an efficient flash compression layer (FCL) for NAND-type flash memory which stores several small compressed pages into one physical page by using a write buffer Based on prototype implementation and simulation studies, we show that the proposed scheme offers the storage of flash memory more than $140\%$ of its original size and expands the write bandwidth significantly.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

A Scheme of Supporting a Soft Handoff for IEEE 802.16e (IEEE 802.16e에서 소프트 핸드오프 지원 방안)

  • Han Jong soo;Park Ju hee;Lee Joon hyuk;Yun Chan young;Oh Young hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12A
    • /
    • pp.1309-1318
    • /
    • 2004
  • The rapid growth of the mobile Internet has enabled its application area to expand, and its users want services that require more bandwidth for multimedia services. There are limits to support the various multimedia service to mobile station provided by existing mobile communications. The wireless MAN called the IEEE 802.16 Broadband Wireless Access systems which the IEEE 802.11 wireless LAN is similar to wireline Internet service being able to supper a various contents is used and is designed to consider a handoff is studying. Especially, TG(Task Group)e of IEEE 802.16 is in progress discussion to support a handoff to higher layer using BS(Base Station) or unit of sector, to UC. Yet a scheme is not detail. This thesis proposes the network model for IEEE 802.16e to support a soft handoff between BSs to use a mobile communication network called cdma2000 Ix EV-DO network. The proposed network model supports soft handoff to add a management skill in MA of each BS for MC(Mobility Controller). The proposed network model has merits that is able to apply existing systems as it is and that is able to use a various multimedia service, when using a wireless Internet.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.