• Title/Summary/Keyword: Data Transmission Processing

Search Result 905, Processing Time 0.022 seconds

Delay Analysis for Seamless Connections in Interworking between MPOA Networks and MPLS Networks (MPOA망과 MPLS 망 연동시 심리스 연결에 대한 지연 분석)

  • Kim, Dong-Ho;Lee, Soong-Hee;Jeon, Hyung-Goo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.147-155
    • /
    • 2002
  • Seamless connection can be a good solution to reduce processing delays in interworking points, a possible big burden to the data transmission in Internet. This paper, therefore, will present several interworking methods which can minimize the delays through seamless connections in interworking between MPOA networks, usually ATM-LANs, and MPLS networks, mainly Internet backbones. We compare characteristics of those networks, propose requirements for interworking, and describe three Interworking methods. Proposed Interworking methods reduce end-to-end transmission delay for seamless connection between ATM VC and LSP, as decreases the number of IP lookup processing in LER. We describe detailed process and characteristic of each interworking method, And we analyze and compare end-to-end delay, using Jackson's network theorem, of proposed interworking methods.

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

Distortion Measurement based Dynamic Packet Scheduling of Video Stream over IEEE 802.11e WLANs

  • Wu, Minghu;Chen, Rui;Zhou, Shangli;Zhu, Xiuchang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2793-2803
    • /
    • 2013
  • In H.264, three different data partition types are used, which have unequal importance to the reconstructed video quality. To improve the performance of H.264 video streaming transmission over IEEE 802.11e Wireless Local Area Networks, a prioritization mechanism that categorizes different partition types to different priority classes according to the calculated distortion within one Group of Pictures. In the proposed scheme, video streams have been encoded based on the H.264 codec with its data partition enabled. The dynamic scheduling scheme based on Enhanced Distributed Channel Access has been configured to differentiate the data partitions according to their distortion impact and the queue utilization ratio. Simulation results show that the proposed scheme improves the received video quality by 1dB in PSNR compared with the existing Enhanced Distributed Channel Access static mapping scheme.

A Research and development of integrated Platform for data security between different smart home devices (안드로이드 기반 스마트 홈 디바이스의 통신 데이터 보안 및 통합 관리 플랫폼 연구개발)

  • Lee, Jeong-Gi;Yang, Chul-Seung;Kim, Jun-Ha;Kim, Kang-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1173-1179
    • /
    • 2015
  • In this paper is given to implements the Android-based integration platform to provide convenience for gender development and scalability , easy access for the user. Sensor-based smart home-related products have a different way of the data exchange so platform can be integrated easily and connect heterogeneous network products and external data transmission security processing for data communication and supported to enable the integration

Forest Environment Monitoring Application of Intelligence Embedded based on Wireless Sensor Networks

  • Seo, Jung Hee;Park, Hung Bog
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1555-1570
    • /
    • 2016
  • For monitoring forest fires, a real-time system to prevent fires in wider areas should be supported consistently. However, there has still been a lack of the support for real-time system related to forest fire monitoring. In addition, the 'real-time' processing in a forest fire detection system can lead to excessive consumption of energy. To solve these problems, the intelligent data acquisition of sensing nodes is required, and the maximum energy savings as well as rapid and accurate detection by flame sensors need to be done. In this regard, this paper proposes a node built-in filter algorithm for intelligent data collection of sensing nodes for the rapid detection of forest fires with focus on reducing the power consumption of the remote sensing nodes and providing efficient wireless sensor network-based forest environment monitoring in terms of data transmission, network stability and data acquisition. The experimental result showed that battery life can be extended through the intelligent sampling of remote sensing nodes, and the average accuracy of the measurement of flame detection based on the distance is 44%.

Design on MPEC2 AAC Decoder

  • NOH, Jin Soo;Kang, Dongshik;RHEE, Kang Hyeon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1567-1570
    • /
    • 2002
  • This paper deals with FPGA(Field Programmable Gate Array) implementation of the AAC(Advanced Audio Coding) decoder. On modern computer culture, according to the high quality data is required in multimedia systems area such as CD, DAT(Digital Audio Tape) and modem. So, the technology of data compression far data transmission is necessity now. MPEG(Moving Picture Experts Group) would be a standard of those technology. MPEG-2 AAC is the availableness and ITU-R advanced coding scheme far high quality audio coding. This MPEG-2 AAC audio standard allows ITU-R 'indistinguishable' quality according to at data rates of 320 Kbit/sec for five full-bandwidth channel audio signals. The compression ratio is around a factor of 1.4 better compared to MPEG Layer-III, it gets the same quality at 70% of the titrate. In this paper, for a real time processing MPEG2 AAC decoding, it is implemented on FPGA chip. The architecture designed is composed of general DSP(Digital Signal Processor). And the Processor designed is coded using VHDL language. The verification is operated with the simulator of C language programmed and ECAD tool.

  • PDF

Provision and Obligations in Policy Rules (정책규칙에서 Provision과 Obligation)

  • Kim, Su-Hee
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2005
  • XML is the most common tool for data processing and data transmission in web applications. Policies are extensively used in all online business solutions and it is recognized that abinary decision such as 'yes/no' for access requests is not enough. In this paper, a method is developed to convert policy rules with provisions and obligations in logic formula formats into XML formats. The primary purpose is to enable security policy programmers to write flexible authorization policies in XML and to implement them easily. General syntaxes are defined to specify information for users, objects and actions in XML formats and an XML DTD is developed to specify authorization rules with these three components. To support various security features such as data transcoding and non-repudiation depending on data in addition to access control based on authorization policies, studies for specifying them in XML policy rules will be performed in the future.

  • PDF

Selective Decoding Schemes and Wireless MAC Operating in MIMO Ad Hoc Networks

  • Suleesathira, Raungrong;Aksiripipatkul, Jansilp
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.421-427
    • /
    • 2011
  • Problems encountered in IEEE 802.11 medium access control (MAC) design are interferences from neighboring or hidden nodes and collision from simultaneous transmissions within the same contention floors. This paper presents the selective decoding schemes in MAC protocol for multiple input multiple output ad-hoc networks. It is able to mitigate interferences by using a developed minimum mean-squared error technique. This interference mitigation combined with the maximum likelihood decoding schemes for the Alamouti coding enables the receiver to decode and differentiate the desired data streams from co-channel data streams. As a result, it allows a pair of simultaneous transmissions to the same or different nodes which yields the network utilization increase. Moreover, the presented three decoding schemes and time line operations are optimally selected corresponding to the transmission demand of neighboring nodes to avoid collision. The selection is determined by the number of request to send (RTS) packets and the type of clear to send packets. Both theoretical channel capacity and simulation results show that the proposed selective decoding scheme MAC protocol outperforms the mitigation interference using multiple antennas and the parallel RTS processing protocols for the cases of (1) single data stream and (2) two independent data streams which are simultaneously transmitted by two independent transmitters.

A Study on the System Configuration and Communication Equipment Operation for Mission and Control of Small UAV (소형 무인항공기의 임무 및 제어를 위한 시스템 구성과 통신 장비 운용에 대한 연구)

  • Ha, Young-Seok
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.118-124
    • /
    • 2019
  • As Unmanned Aerial Vehicles technology has been widespread, various types of unmanned aircraft and mission equipment have been developed in line with mission diversification. Especially in Korea, small unmanned aerial vehicles have been actively developed. In addition, flight control system and mission equipment interface system for effective control of small unmanned aerial vehicles, efficient communication system configuration and operation for transmission to ground operated systems by processing data are required. This paper addresses efficient system structure and operation of communication equipment for missions and control of small unmanned aerial vehicles.

Design and implementation of a SHM system for a heritage timber building

  • Yang, Qingshan;Wang, Juan;Kim, Sunjoong;Chen, Huihui;Spencer, Billie F. Jr.
    • Smart Structures and Systems
    • /
    • v.29 no.4
    • /
    • pp.561-576
    • /
    • 2022
  • Heritage timber structures represent the history and culture of a nation. These structures have been inherited from previous generations; however, they inevitably exhibit deterioration over time, potentially leading to structural deficiencies. Structural Health Monitoring (SHM) offers the potential to assess operational anomalies, deterioration, and damage through processing and analysis of data collected from transducers and sensors mounted on the structure. This paper reports on the design and implementation of a long-term SHM system on the Feiyun Wooden Pavilion in China, a three-story timber building built more than 500 years ago. The principles and features of the design and implementation of SHM systems for heritage timber buildings are systematically discussed. In total, 104 sensors of 6 different types are deployed on the structure to monitor the environmental effects and structural responses, including air temperature and humidity, wind speed and direction, structural temperatures, strain, inclination, and acceleration. In addition, integrated data acquisition and transmission subsystem using a newly developed software platform are implemented. Selected preliminary statistical and correlation analysis using one year of monitoring data are presented to demonstrate the condition assessment capability of the system based on the monitoring data.