• Title/Summary/Keyword: Bulk Data Transmission

Search Result 25, Processing Time 0.027 seconds

A Performance Evaluation of Multimedia Data Downstream with PDA over Wireless LAN (무선 랜 환경에서 PDA의 멀티미디어 데이터 다운스트림 성능 평가)

  • Hur Hye Sun;Hong Youn Sik;Woo Yo Seop
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.71-78
    • /
    • 2005
  • When a PDA is used as a mobile terminal in an infrastructure network based on 802.11b standard wireless LAN, we measured and evaluated the performance of multimedia data transmission. In general, PDAs are mainly used tot receiving bulk data like multimedia data. However, while a PDA as a mobile host transfers multimedia data to a desktop PC as a fixed host in such a network, the time taken to receive data from the PC to the PDA is always longer than the time taken to send data from the PDA to the PC by at least 53%. Thus, we consider some critical factors that affect the time taken to receive Our experimental results show that with the PDA the time taken to access a file for writing is longer than the time taken to access a file for reading of to 4.11 times. In addition, a dramatic change of the site of the receiver window, from 686 bytes to 32,383 bytes, prolongs the time taken to receive. To transfer data without any inter-packet interval for the PDA and to increase the size of the TCP receive buffer will be effective in improving the delay to receive data.

  • PDF

Characteristic of the femtosecond laser machining in glass (펨토초 레이어 기반 유리 내부가공 특성)

  • Yoo B.H.;Kim Y.M.;Cho S.H.;Chang W.S.;Kim J.G.;Whang K.H.;Lee D.J.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.239-240
    • /
    • 2006
  • For longer than picosecond pulses, bulk damage inside defect-free dielectrics involves the heating and multiplication of spurious electrons by the incident laser beam and transfer of this energy to the lattice. The situation is quite different for femtosecond pulses which are shorter than the time scale for electron energy transfer to the lattice. Damage caused by these pulses is produced with smaller statistical uncertainty and is controllable on a microscopic scale. These properties can be exploited to produce laser devices such as arrays of damage dots for all optical memories with high data storage density or arrays of parallel grooves to form transmission gratings. In this work, we observed characteristic of the femtosecond laser machining in BK7 and fused silica.

  • PDF

DSP Implementation of QPSK Signal Generator for Underwater Supersonic Waves Communication (수중 초음파 통신을 위한 QPSK 신호발생기의 DSP 구현에 관한 연구)

  • Lee, Deok-Hwan;Ji, Yong-Il;Kim, Seung-Geun;Lim, Yong-Gon;Ko, Hak-Lim
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.341-344
    • /
    • 2003
  • There communicates using tire supersonic waves in tire underwater, that is different from tire ground that use tire propagation. Because using Law frequency to come under tire waves, bandwidth that is able to communicate is very smaller that tire mobile communication of tire ground. Also, The channel environment changes rapidly in tire shallow underwater than tire ground. Due to such a reason, data transmission technic that is able to tire maximum application to restricted bandwidth and tire signal processing technics that is able to conquer tire rapid changes of tire channel environment are being used. Algorithm is used at tire application of these technic has a lot of tire calculating quantity. So this research reveals small bulk and equal performance using one DSP chip and then implements QPSK transmitter, that uses SHARC DSP of Analog Device company, for tire underwater supersonic waves communication rapidly decrease tire calculating quantity.

  • PDF

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Comparative Measurements and Characteristics of Cu Diffusion into Low-Dielectric Constant para-xylene based Plasma Polymer Thin Films

  • Kim, K.J.;Kim, K.S.;Jang, Y.C.;Lee, N.-E.;Choi, J.;Jung, D.
    • Journal of the Korean institute of surface engineering
    • /
    • v.34 no.5
    • /
    • pp.475-480
    • /
    • 2001
  • Diffusion of Cu into the low-k para-xylene based plasma polymer (pXPP) thin films deposited by plasma-enhanced chemical vapor deposition using the para-xylene precursor was comparatively measured using various methods. Cu layer was deposited on the surfaces of pXPPs treated by $N_2$ plasma generated in a magnetically enhanced inductively coupled plasma reactor. Diffusion characteristics of Cu into pXPPs were measured using Rutherford backscattering spectroscopy (RBS), secondary ion mass spectroscopy (SIMS), cross-sectional transmission electron microscopy (XTEM), and current-voltage (I-V) measurements for the vacuum-annealed Cu/pXPPs for 1 hour at $450^{\circ}C$ and were compared. The results showed a correlation between the I-V measurement and SIMS data are correlated and have a sensitivity enough to evaluate the dielectric properties but the RBS or XTEM measurements are not sufficient to conclude the electrical properties of low-k dielectrics with Cu in the film bulk. The additional results indicate that the pXPP layers are quite resistant to Cu diffusion at the annealing temperature of $450^{\circ}C$ compared to the other previously reported organic low-k materials.

  • PDF

An Adaptive UDT Rate Control Method on Network Traffic Condition (네트워크 트래픽 상태에 적응적인 UDT Rate Control 기법)

  • An, Do-Sik;Wang, Gi-Cheol;Kim, Seung-Hae;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.19-27
    • /
    • 2011
  • Due to the growth of optical fiber network technologies, most networks recently support several tens of Gb/s bandwidth. UDT(UDP-based Data Transfer protocol) is an optimized protocol for bulk data transmission on the network, which has the high bandwidth and long delay time. It periodically controls the sending rate on the fixed sync-interval, 0.01 sec. Here, if the network traffic status varies quickly, available network bandwidth is not able to be properly utilized in-between the sync-intervals. In this paper, we propose an adaptive rate control method with considering the network traffic status in-between the sync-interval periods. The network traffic status is determined based on the RTT variances. With dividing the network status into four classes, the proposed method performs a new rate control by adjusting the inter-packet sending period for a corresponding class. As a simulation result, the proposed method improves the message delivery throughput as well as stability than that of the existing UDT Protocol.

A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption (고속 영상데이터 암호화에 적합한 SES Alarmed 링크 암호동기 방식)

  • Kim, HyeongRag;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2891-2898
    • /
    • 2013
  • CCSDS Standard is widely used in international space telecommunication area. In this standard, Encryption is realized using a unique hierarchical encryption protocol and satisfied security requirements of communication channels. For synchronization, encryption sync is attached in the beginning of encrypted data. But exceptional case(timing jittering, abnormal system shutdown, etc.) is occurred, receiving equipment cannot decrypt received data. In this paper, we propose a SES Alarmed link encryption synchronization method for sending warning signal to the transmitter when some problems have been occurred during the transmission and we also suggest optimum conditions for SES Alarm signal through performance analysis.

Piezo-electrically Actuated Micro Corner Cube Retroreflector (CCR) for Free-space Optical Communication Applications

  • Lee, Duk-Hyun;Park, Jae-Y.
    • Journal of Electrical Engineering and Technology
    • /
    • v.5 no.2
    • /
    • pp.337-341
    • /
    • 2010
  • In this paper, an extremely low voltage operated micro corner cube retroreflector (CCR) was fabricated for free-space optical communication applications by using bulk silicon micromachining technologies. The CCR was comprised of an orthogonal vertical mirror and a horizontal actuated mirror. For low voltage operation, the horizontal actuated mirror was designed with two PZT cantilever actuators, torsional bars, hinges, and a mirror plate with a size of $400{\mu}m{\times}400{\mu}m$. In particular, the torsional bars and hinges were carefully simulated and designed to secure the flatness of the mirror plate by using a finite element method (FEM) simulator. The measured tilting angle was approximately $2^{\circ}$ at the applied voltage of 5 V. An orthogonal vertical mirror with an extremely smooth surface texture was fabricated using KOH wet etching and a double-SOI (silicon-on-insulator) wafer with a (110) silicon wafer. The fabricated orthogonal vertical mirror was comprised of four pairs of two mutually orthogonal flat mirrors with $400{\mu}m4 (length) $\times400{\mu}m$ (height) $\times30{\mu}m$ (thickness). The cross angles and surface roughness of the orthogonal vertical mirror were orthogonal, almost $90^{\circ}$ and 3.523 nm rms, respectively. The proposed CCR was completed by combining the orthogonal vertical and horizontal actuated mirrors. Data transmission and modulation at a frequency of 10 Hz was successfully demonstrated using the fabricated CCR at a distance of approximately 50 cm.

Match Field based Algorithm Selection Approach in Hybrid SDN and PCE Based Optical Networks

  • Selvaraj, P.;Nagarajan, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5723-5743
    • /
    • 2018
  • The evolving internet-based services demand high-speed data transmission in conjunction with scalability. The next generation optical network has to exploit artificial intelligence and cognitive techniques to cope with the emerging requirements. This work proposes a novel way to solve the dynamic provisioning problem in optical network. The provisioning in optical network involves the computation of routes and the reservation of wavelenghs (Routing and Wavelength assignment-RWA). This is an extensively studied multi-objective optimization problem and its complexity is known to be NP-Complete. As the exact algorithms incurs more running time, the heuristic based approaches have been widely preferred to solve this problem. Recently the software-defined networking has impacted the way the optical pipes are configured and monitored. This work proposes the dynamic selection of path computation algorithms in response to the changing service requirements and network scenarios. A software-defined controller mechanism with a novel packet matching feature was proposed to dynamically match the traffic demands with the appropriate algorithm. A software-defined controller with Path Computation Element-PCE was created in the ONOS tool. A simulation study was performed with the case study of dynamic path establishment in ONOS-Open Network Operating System based software defined controller environment. A java based NOX controller was configured with a parent path computation element. The child path computation elements were configured with different path computation algorithms under the control of the parent path computation element. The use case of dynamic bulk path creation was considered. The algorithm selection method is compared with the existing single algorithm based method and the results are analyzed.

An Efficient Graph Algorithm Processing Scheme using GPUs with Limited Memory (제한된 메모리를 가진 GPU를 이용한 효율적인 그래프 알고리즘 처리 기법)

  • Song, Sang-ho;Lee, Hyeon-byeong;Choi, Do-jin;Lim, Jong-tae;Bok, Kyoung-soo;Yoo, Jae-soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.81-93
    • /
    • 2022
  • Recently, research on processing a large-capacity graph using GPUs has been conducting. In order to process a large-capacity graph in a GPU with limited memory, the graph must be divided into subgraphs and then processed by scheduling subgraphs. In this paper, we propose an efficient graph algorithm processing scheme in GPU environments with limited memory and performance evaluation. The proposed scheme consists of a graph differential subgraph scheduling method and a graph segmentation method. The bulk graph segmentation method determines how a large-capacity graph can be segmented into subgraphs so that it can be processed efficiently by the GPU. The differential subgraph scheduling method schedule subgraphs processed by GPUs to reduce redundant transmission of the repeatedly used data between HOST-GPUs. It shows the superiority of the proposed scheme by performing various performance evaluations.