• Title/Summary/Keyword: Control Networks

Search Result 4,030, Processing Time 0.031 seconds

A study of Vertical Handover between LTE and Wireless LAN Systems using Adaptive Fuzzy Logic Control and Policy based Multiple Criteria Decision Making Method (LTE/WLAN 이종망 환경에서 퍼지제어와 정책적 다기준 의사결정법을 이용한 적응적 VHO 방안 연구)

  • Lee, In-Hwan;Kim, Tae-Sub;Cho, Sung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.271-280
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate, the system service cost and handover attempt number.

AFLRS: An AODV-based Fast Local Repair Scheme in Ad Hoc Networks (AFLRS: 애드 혹 네트워크에서 AODV에 기반한 빠른 경로 복구 기법)

  • 서현곤;김기형;서재홍
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.81-90
    • /
    • 2004
  • A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies without the use of any existing network infrastructure. The AODV (Ad Hoc On-Demand Distance Vector) Protocol is one of the typical reactive routing protocols, in that mobile nodes initiate routing activities only in the presence of data packets in need of a route. In this paper, we focus upon the local repair mechanism of AODV. When a link is broken, the upstream node of the broken link repairs the route to the destination by initiating a local route discovery process. The process involves the flooding of AODV control messages in every node within a radius of the length from the initiating node to the destination. In this paper, we propose an efficient local repair scheme for AODV called AFLRS (AODV-based Fast Local Repair Scheme). AFLRS utilizes the existing routing information in the intermediate nodes which have been on the active route to the destination before a link break occurs. AFLRS can reduce the flooding range of AODV control messages and the route recovery time because it can repair route through the intermediate nodes. For the performance evaluation of the proposed AFLRS, we have simulated the local repair mechanisms by using NS2 and AODV-UU. The performance results show that AFLRS can achieve faster route recovery than the local repair mechanism of AODV.

Transcriptome Profiling of Kidney Tissue from FGS/kist Mice, the Korean Animal Model of Focal Segmental Glomerulosclerosis (국소성 분절성 사구체 신병증의 동물 모델 (FGS/kist 생쥐) 신 조직의 유전자 발현 양상)

  • Kang, Hee-Gyung;Lee, Byong-Sop;Lee, Chul-Ho;Ha, Il-Soo;Cheong, Hae-Il;Choi, Yong
    • Childhood Kidney Diseases
    • /
    • v.15 no.1
    • /
    • pp.38-48
    • /
    • 2011
  • Purpose: Focal segmental glomerulosclerosis (FSGS) is the most common glomerulopathy causing pediatric renal failure. Since specific treatment targeting the etiology and pathophysiology of primary FSGS is yet elusive, the authors explored the pathophysiology of FSGS by transcriptome analysis of the disease using an animal model. Methods: FGS/kist strain, a mouse model of primary FSGS, and RFM/kist strain, as control and the parent strain of FGS/kist, were used. Kidney tissues were harvested and isolated renal cortex was used to extract mRNA, which was run on AB 1700 mouse microarray chip after reverse transcription to get the transcriptome profile. Results: Sixty two genes were differentially expressed in FGS/kist kidney tissue compared to the control. Those genes were related to cell cycle/cell death, immune reaction, and lipid metabolism/vasculopathy, and the key molecules of their networks were TNF, IL-6/4, IFN${\gamma}$, TP53, and PPAR${\gamma}$. Conclusion: This study confirmed that renal cell death, immune system activation with subsequent fibrosis, and lipid metabolism-related early vasculopathy were involved in the pathophysiology of FSGS. In addition, the relevance of methodology used in this study, namely transcriptome profiling, and Korean animal model of FGS/kist was validated. Further study would reveal novel pathophysiology of FSGS for new therapeutic targets.

An ABR Rate-based Control Scheme Avoiding Access Point Buffer Overflow and Underflow during Handoffs in Wireless ATM Networks (무선 ATM망에서 핸드오프시 접속점 버퍼 오버플로우와 언더플로우를 방지하는 ABR 전송률 기반 제어 방안)

  • Ha, In-Dae;Oh, Jung-Ki;Park, Sang-Joon;Choi, Myung-Whan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.527-539
    • /
    • 2001
  • The wireless asynchronous transfer mode (ATM) system has the advantage of providing the broadband services with various quality-of-service requirements to the mobile terminal efficiently by utilizing the ATM technology developed for the wired ATM system. The available bit rate (ABR) service among various ATM services utilizes the available bandwidth remaining in the ATM link, which allows the efficient bandwidth usage. During the handoff of the mobile terminal, however, the queue length in the access point (AP) which resides in the boundary of the wired ATM network and the wireless ATM network may increase abruptly. In this paper, we propose a scheme which prevents the buffer-overflow and buffer-underflow in the AP during the handoff of the wireless ABR connection in the wireless ATM system using binary feedback rate-based ABR traffic control. This scheme controls the source's cell generation rate during both handoff period and some time interval after the completion of the handoff procedure. The simulation results show that the proposed scheme prevents the buffer-overflow and buffer-underflow. The proposed scheme can contribute to increasing the throughput of the wireless ABR service during handoff by preventing the buffer overflow and underflow during handoff period.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

The Analysis of Content Regulation on Social Network Service(SNS): Focusing on the Problem of Legal and Administrative Regulation (표현매체로서 SNS(Social Network Service)에 대한 내용규제의 문제점 분석: 법률적.행정적 규제를 중심으로)

  • Hwang, Yong-Suk
    • Korean journal of communication and information
    • /
    • v.58
    • /
    • pp.106-129
    • /
    • 2012
  • Social Network Service(SNS), which are an emerging form of political architecture, have been a political means to promote civic engagement and shape pubic opinions on social issues. Along with the influence of SNSs, the governmental control on the dissemination of information over SNSs has increased more and more. It would be ideal if the autonomous governance regulates SNSs which facilitate the networks of the dispersed people. It is the fact, though, that compulsory regulations under which the government controls impose policy and legal restrictions on political expressions. The current study addresses expressive and participatory nature embedded in technological characteristics of SNSs and discusses the problems of content regulations of political expression over SNSs. First of all, it is analyzed that light touch regulation or light touch monitoring should be applied to regulating content on SNSs, particularly political expressions. Constitutional Court proclaimed that legal restrictions on the Internet could infringe basic rights of the people and thus under unambiguous standards, the Doctrine of Clear and Present Danger should be applied to its content. Second, it is found that clarifying the definition of illegality in the application of legal restrictions is necessary to minimize the excessive misleading. Third, it is required that Korea Communications Standards Commission under the government control needs to change in determining the scope of illegal information. In a domestic level, there needs to be safeguards for the protection of the self-regulatory organization such as KISO to guarantee voluntary and autonomous regulatory practices.

  • PDF

A architecture and control method of Streaming Packet Scheduler at 100bps for Guaranteed QoS of Internet and Broadcasting Services (인터넷 및 방송서비스의 QoS 보장을 위한 10Gbps급 스트리밍 패킷 스케줄러 구조 및 제어방법)

  • Kim Kwang-Ok;Park Wan-Ki;Choi Byeoun-Chul;Kwak Dong-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.1
    • /
    • pp.23-34
    • /
    • 2004
  • This paper presents architecture and control method of packet scheduler to guarantee QoS of high quality streaming services in high-speed packet-switched networks. Since streaming services need far more stringent QoS requirements than the typical sort of burst data applications, they should be guaranteed minimum bandwidth and end-to-end delay bound to each flow, regardless of the behavior of other flows. To meet these requirements, a packet scheduler isolate a flow from the undesirable effects of other flows and provides end-to-end delay guarantees for individual flow and divides stringently the available link bandwidth among flows sharing the link. Until now, many vendors are developing traffic management chips running at 10Gbps, but most of chips have drawbacks to support high quality streaming services. In this paper, we investigate the drawbacks of commercial TM chips and traffic characteristic of streaming services and present implementation frameworks of the proposed packet scheduler. Finally, we analyze the simulation results of the proposed scheduler.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

Design and Implementation of Transport and Session Managers in a Multimedia Streaming Framework (멀티미디어 스트리밍 프레임워크에서 전송 및 세션 관리자의 설계 및 구현)

  • Lim, Eak-Jin;Lee, Sung-Young;Jeong, Chang-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.24-37
    • /
    • 2001
  • This paper deals with our experience for the design and implementation of Transport and Session managers in the Integrated Streaming Service Architecture (IS SA) that was developed by the authors. The ISSA is a streaming framework that allows to develop integrated multimedia streaming applications such as VOD system in unicast/multicast and real-time broadcastOive-cast). It also facilities standard real-time transport protocols such as RTp(Real-Time Transport Protocol)/RTCP(Real-time Control Protocol) and RTSP(Real-Time Streaming ProtocoD that allows to user openness. The ISSA supports diverse media fonnats and is independent from underlying networks and operating systems, and compatible with the global real-time multimedia database system (BeeHive) so that streaming media are efficiently retrieved, stored, and serviced. The role of the Transport Manager is to do packetization and depacketization for the different types of multimedia data and delivers the packetized media data in real-time. The Transport Manager uses RTP protocol. The role of the Session Manager is to establish and control the media channel by using RTSP protocol and to deliver the database transactions for the multimedia database by using RTTP(Real-Time Transaction Protocol) protocol. Both the Transport and Session Manager are doing their functions through the network interface in the ISSA that allows developers to various network programming interfaces and provides flexibility to the system.

  • PDF