• Title/Summary/Keyword: Cooperate network

Search Result 129, Processing Time 0.028 seconds

IMPLEMENTATION EXPERIMENT OF VTP BASED ADAPTIVE VIDEO BIT-RATE CONTROL OVER WIRELESS AD-HOC NETWORK

  • Ujikawa, Hirotaka;Katto, Jiro
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.668-672
    • /
    • 2009
  • In wireless ad-hoc network, knowing the available bandwidth of the time varying channel is imperative for live video streaming applications. This is because the available bandwidth is varying all the time and strictly limited against the large data size of video streaming. Additionally, adapting the encoding rate to the suitable bit-rate for the network, where an overlarge encoding rate induces congestion loss and playback delay, decreases the loss and delay. While some effective rate controlling methods have been proposed and simulated well like VTP (Video Transport Protocol) [1], implementing to cooperate with the encoder and tuning the parameters are still challenging works. In this paper, we show our result of the implementation experiment of VTP based encoding rate controlling method and then introduce some techniques of our parameter tuning for a video streaming application over wireless environment.

  • PDF

The Coming Cyber Society - Types of Multimedia Applications & Services in Japan -

  • Ichinose, Susumu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.1-3
    • /
    • 1998
  • The 21st century will see the formation of a“Cyber society”that, while separate form the real world, will cooperate with it, leading to the further expansion and development of world society. Cyber society allows the formation of virtual space through the connection of multiple computers in a network. In this virtual space, multiple users can communicate with each other and can collect and exchange information while moving about freely and engaging in activities. Three main technologies are vital to the construction of the Cyber society: platform technology for converting multimedia information to optical signals and performing digital processing and communication processing on such signals; communications network technology for transferring these signals from one point to another; and application technology for configuring the Cyber society that will be formed on this network. This paper describes platform technology and network technology with an emphasis on their relationship to application technology for configuring the Cyber society, and will also discuss InterSpace, one of the cyber society platform system of the Cyber society.

  • PDF

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

Design and Implementation of Cooperation System of UPnP and ACAP (UPnP와 ACAP의 연동을 위한 홈방연동시스템의 설계 및 구현)

  • Kim, Dong-Hee;Park, Dong-Hwan;Park, Jun-Hee;Moon, Kyeong-Deok;Lim, Kyung-Shik
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.741-748
    • /
    • 2006
  • This paper describes the system which provides home entertainment services to users using the middleware-cooperation module which makes UPnP and ACAP cooperate with each other. UPnP or ACAP providespowerful functionalities to its own network to play multimedia contents using its own resources. U one middleware uses the information and the resources of another middleware, itcould provide services with more contents and more powerful functionalities than those which it originally provides. This paper develops the middleware-cooperation module to make two middleware cooperate with each other and use resources of another middleware. The middleware-cooperation module makes UPnP and ACAP cooperate with each other, and it makes them share their information and resources without resource collision.

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

A method to construct self organizing system in robotic application

  • Noda, Hiroshi;Hashimoto, Hideki;Harashima, Fumio
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10b
    • /
    • pp.1022-1027
    • /
    • 1988
  • The author propose a method to realize a self organization in the artificial system. In self organizing system, sub-systems are not constructed as functional parts of the system but cooperate with one another to realize the total system. Each sub-system obtains the local purpose from the global purpose by learning. This function is realized by using a neural network. The validity of this method is confirmed by some simulations.

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.605-608
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network conisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

  • PDF

A Strategy of Technology Development for the Railway System based on Railway Network (철도망 구축을 고려한 철도시스템의 기술개발전략)

  • Lee Hi-Sung
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.3 s.34
    • /
    • pp.319-324
    • /
    • 2006
  • Studied was a strategy of technology development for railway system in terms of railway network. First, The successful launch of the Korean HST system has not only decreased logistics burden but also significantly transformed the Korean trunk-line railway network, revolutionizing the logistics and technology sectors and reinvigorating the Korean railway industry in one century. Korean railway industry sector is now investing to develop many different types of railway system(G7, Post G7, tilting train...) so that these kinds of various railway system development should be integrated with the National Inter-modal Transportation Network Plan. To secure sufficient capacity that is required by the National Railroad Plan, the railway industry needs to establish mid- and long-term train purchase and operation strategies in compliance with railway construction and operation policies. During a railway construction planning, train operators, based on their train operation strategies, should come up with measures to closely cooperate with project operators from the planning stage through to the opening of a railway system. To be more precise, train operators should establish long-term train procurement plans reflecting both long-term national railroad network plans and plans for each railway line in order to suggest appropriate roles and schedules for each line. Also, based on the long-term railway plan, directions should be decided concerning the research and development of trains in advance.

A Study on the Design of Monitoring Architecture for the Grid NOC (그리드 NOC를 위한 모니터링 구조의 설계에 관한 연구)

  • 하지아;안성진;이혁로;노민기
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.97-106
    • /
    • 2002
  • Grid makes it possible to cooperate with other network area by sharing and using distributed resources. In order to manage effectively large-scale Grid network resources, Grid NOC needs monitoring architecture that can manage distributed resources in one time. Being restricted within specific managing area, conventional network management system has limitation in extension of managing area and in general management of heterogeneous resource. In this paper, we design a monitoring architecture that can take in the situation and has scalability. In the monitoring architecture the network areas publish information in a common directory service, and then Grid NOC can connect to the network areas directly by using this information. Therefore, it makes us possible to manage overall large-scale resource of Grid network reducing load.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF