• Title/Summary/Keyword: Buffer Overflow

Search Result 141, Processing Time 0.024 seconds

A Study on The Smoothing Method for Efficient Video Stream Transmission on ATM Network. (ATM 망에서 효율적인 비디오 스트림 전송을 위한 Smoothing 방법에 관한 연구)

  • 김태형;이병호
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.99-102
    • /
    • 1998
  • As multimedia communication services have been widely spreading, the amount of video traffic is rapidly increasing in B-ISDN environment based on the ATM technology. The image quality of MPEG services is very sensitive to the cell losses in ATM network, since each cell contains information needed at decoding process. Since the number of cells in each frame of MPEG is variable, this video smoothing technology need to prepare a buffer for no overflow or underflow at the transmission, requires that some number of cells be taken to the buffer in client before the playback of video. To ensure the high quality image of video, the video smoothing is scheduled by a Group of Picture unit. In this paper, we then apply the theory to reds nightmare encoded in MPEG, and find minimum smoothing buffer size, initial buffer size. It can be used to study the smoothing of stored video.

  • PDF

Analysis and solution to the phase concentration and DC-like component of correlation result in Daejeon correlator (대전 상관기의 상관 결과에 나타난 유사 DC 성분과 위상 집중 현상에 대한 원인 분석과 해결 방법)

  • Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Oh, Chung-Sik;Jung, Jin-Seung;Chung, Dong-Kyu;Yun, Young-Joo;Oyama, Tomoaki;Ozeki, Kensuke;Onuki, Hirofumi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.191-204
    • /
    • 2013
  • In this paper, we investigated the correlation outputs of Daejeon correlator at the viewpoints of the buffer memory setting related to the fine delay tracking and the under/overflow issue in FFT modules, in order to eliminate DC-like component and phase concentration to 0 degree. As the ring buffer memory is being used for the fine delay tracking, the DC-like component in correlation outputs is generated by improper setting of data read/write address, and then that address setting method is modified to exclude a polluted FFT segment in correlation processing when crossing the port/stream boundary. The phase concentration to 0 degree at beginning of bandpass is caused by inadequate scaling factors, which may be the origins of under/overflow occurred at internal computation of FFT stage. With the revised method of the ring buffer memory setting and the scaling factors in FFT, we could obtain higher signal-to-noise ratio and flux density, compared to the previous method, through the correlation processing of true observational data.

Implementation of the E-BLP Security Model for Trusted Embedded Systems (안전한 임베디드 시스템을 위한 E-BLP 보안 모델의 구현)

  • Kang Jungmin;Nam Taelliun;Jang Insook;Lee Jinseok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.512-519
    • /
    • 2005
  • E-BLP security model considers the reliability of the processes that are real subjects in systems. This paper deals with the implementation of the E-BLP model for secure embedded systems. Implemented EBSM(E-BLP Based Security Module) consists of three components: identification and authentication, access control and BRC(Dynamic Reliability Check) that checks the process behavior dynamically. Access Control of EBSM ensures unreliable processes not to access the sensitive objects and the DRC detects the buffer overflow attack by normal user. Besides, the performance overhead of the embedded system applying the EBSM is introduced.

Video Streaming Receiver with Video Information File to correct Wrong Token Bucket Parameters by Packet Loss (패킷 손실에 의해 잘못된 토큰 버킷 파라메타를 정정하는 비디오 정보 파일을 가진 비디오 스트리밍 수신기)

  • Lee, Hyun-No;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.181-188
    • /
    • 2016
  • Video streaming traffics which are arrived in receiver have irregular traffic patterns by many problems over the network path. Particularly, if these received traffics enter into replay buffer without any operation, the overflow and underflow effects are made according to the buffer status. There was an existing scheme which automatically set up token bucket parameters using the video information file under the assumption of the lossless packet on network. The existing scheme has a problem which can set up the wrong token bucket parameters by the lost packets on the practical networks with video packet loss. Therefore, this paper proposes a new scheme which reset up video file information to correct the wrong token bucket parameters in case of packet loss in practical networks with packet loss. Through the simulation, it was found that the proposed scheme would have better performance than the existing scheme in terms of overflow generation and packet loss.

A New Criterion of Cell Discard in an ATM Switch with Input and Output Buffers (입출력버퍼형 ATM 교환기의 셀 폐기 방법에 대한 새로운 기준 제안 및 성능 분석)

  • Gwon, Se-Dong;Park, Hyeon-Min;Choe, Byeong-Seok;Park, Jae-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1246-1264
    • /
    • 2000
  • An input-output buffering switch operates in either of tow different cell loss modes; Backpressure mode and Queueloss mode. In the previous studies, the Backpressrue mode is more effective at low traffic loads, and the Queueloss mode performs better at high traffic. We propose a new operation mode, called Hybrid mode, which adopts the advantages of he Backpressure and the Queueloss mode. Backpressure and Queueloss modes are distinguished from whether a cell loss occurs at the output buffer or not when output buffer overflows, irrespective of input buffer status. In order to simply combine Backpressure and Queueloss mode, the change of input traffic load must be measured. However, in the Hybrid mode, simply both of the input and output buffer overflow and checked out to determine the cell discard. The performance of the Hybrid mode is compared with those of the Backpressure and the Queueloss mode under random and bursty traffic. This paper show that the Hybrid mode always gives the best performance results for most ranges of load values.

  • PDF

Sensitivity Analysis on Flood Level Changes by Offline Storage Creation Based on Unsteady Flow Modeling (부정류 모의 기반 오프라인 저류지 조성에 따른 홍수위 변화 민감도 분석)

  • Eun-kyung Jang;Un Ji;Sanghyeok Kim;Jiwon Ryu
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.217-225
    • /
    • 2023
  • This study analyzed the effect of flood level reduction in the case of creating and operating offline storage for the Jangdong district, which can be used as a flood buffer space for the Geumgang River, through one-dimensional unsteady flow numerical simulation. In particular, the sensitivity analysis of changes in the height and width (length) of transverse weirs on flood level changes was performed to provide quantitative information necessary for flood control facility (embankment) design. As a result of analyzing the flood control effect of the offline storage based on the peak flood discharge and level, spatially, the flood control effect at the planned flood buffer space site and the downstream end was confirmed, and it was confirmed that the flood reduction effect at the downstream occurred the most. By design conditions of the transverse overflow weir, the greatest flood reduction effect was found under the condition that the overflow weir height based on the 50-year frequency flood level and the transverse overflow weir width (length) of 125 m were considered. The effect of delaying the time to reach the maximum flood due to the operation of the offline storage site was also presented based on unsteady flow modeling.

Simulation and Analysis of Base Station Buffer in UMTS Systems (UMTS 시스템에서 기지국 버퍼에 대한 실험 및 분석)

  • Kim, Nam-Gi;Park, In-Yong;Jeong, Hye-Yeong;Yun, Hyeon-Su
    • The KIPS Transactions:PartA
    • /
    • v.9A no.3
    • /
    • pp.317-326
    • /
    • 2002
  • The mobile telecommunication system has been growing exponentially after 1990s due to the high population in a city and the growth of mobile user. In this time, the current mobile system mainly concentrates on the voice communication. However, in the next generation, mobile users want to get very diverse services via mobile terminal such as the Internet access, web access, multimedia communication, and etc. For this reason, the next generation system, such as the UMTS system, has to support the packet data service and it will play the major role in the system. In different from the voice service, the packet data service should store packet data in a buffer at base station before it forwards. Consequently, the performance closely related to the buffer management and its operation. However, until now, there are rare study on the buffer behavior and management. In this paper, we will observe the buffer behavior in the UMTS systems by using simulation and analyze the results. For this research, we generate packet data traffics and model the UMTS system for a simulation. Then we analyze the buffer state by a simulation and calculate the buffer overflow probability by mathematical methods.

Performance Analysis of a Statistical Packet Voice/Data Multiplexer (통계적 패킷 음성 / 데이터 다중화기의 성능 해석)

  • 신병철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.3
    • /
    • pp.179-196
    • /
    • 1986
  • In this paper, the peformance of a statistical packet voice/data multiplexer is studied. In ths study we assume that in the packet voice/data multiplexer two separate finite queues are used for voice and data traffics, and that voice traffic gets priority over data. For the performance analysis we divide the output link of the multiplexer into a sequence of time slots. The voice signal is modeled as an (M+1) - state Markov process, M being the packet generation period in slots. As for the data traffic, it is modeled by a simple Poisson process. In our discrete time domain analysis, the queueing behavior of voice traffic is little affected by the data traffic since voice signal has priority over data. Therefore, we first analyze the queueing behavior of voice traffic, and then using the result, we study the queueing behavior of data traffic. For the packet voice multiplexer, both inpur state and voice buffer occupancy are formulated by a two-dimensional Markov chain. For the integrated voice/data multiplexer we use a three-dimensional Markov chain that represents the input voice state and the buffer occupancies of voice and data. With these models, the numerical results for the performance have been obtained by the Gauss-Seidel iteration method. The analytical results have been verified by computer simylation. From the results we have found that there exist tradeoffs among the number of voice users, output link capacity, voic queue size and overflow probability for the voice traffic, and also exist tradeoffs among traffic load, data queue size and oveflow probability for the data traffic. Also, there exists a tradeoff between the performance of voice and data traffics for given inpur traffics and link capacity. In addition, it has been found that the average queueing delay of data traffic is longer than the maximum buffer size, when the gain of time assignment speech interpolation(TASI) is more than two and the number of voice users is small.

  • PDF

Improved Protecting Method based on Stackguard against Buffer Overflow Attack (스택가드를 개선한 버퍼 오버플로우 공격으로부터의 대응책)

  • 정길균;권영미
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.657-661
    • /
    • 2001
  • 버퍼 오버플로우는 최근에 나온 개념은 아니다. 1996년 버퍼 오버프로우가 Phrack 문서를 통해 세상에 알려지자 유닉스 계열의 운영체제들은 보안 문제로 많은 어려움을 겪게 되었다. 이 공격은 내부에서 쉘을 실행해 원격지에서 루트권한을 획득할 수 있기 때문에 보안상 위협 중에 가장 심각한 부류에 속한다. 아직까지도 공격 방법 중에서는 가장 많은 부분을 차지하고 있다. qs 논문에서는 버퍼 오버플로우의 원리 및 관련 연구에 관해서 살펴보고, 기존 대응책인 stackguard를 기본으로 하여 좀 더 개선시킨 대응책을 제안하고자 한다.

  • PDF