• Title/Summary/Keyword: Data Transmission Processing

Search Result 901, Processing Time 0.025 seconds

Scalable Overlay Multicast supporting QoS and Reliability (QoS와 신뢰성을 제공하는 확장성 있는 오버레이 멀티캐스트)

  • Rhee, Choon-Sung;Song, Jung-Wook;Choi, Byoung-Uk;Han, Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.767-774
    • /
    • 2006
  • In order to support overlay multicast with scalability and reliability, in this paper, we introduced a new multicast tree construction method and a regional multicast. The architecture we introduce efficiently transmits streaming data to the users from multicast source in an environment in which non-multicast network and multicast network. The new multicast tree construction method enables the connection with a remote relay which is an optimum condition in case there is no relay in subnet. Besides, by defining a new service type to traffic class of IPv6 header, a selective adoption or FEC and a distinctive transmission became possible. In order to verify the effect of the solution we suggested, we embodied an environment which is similar to the actual service environment by a simulator and tested it. The result of the test shows that the proposed method is more efficient than the traditional unicast approach method and the existing overlay multicast.

A Study on the Industrial Data Processing for Control System Middle Ware and Algorithm RFID is Expected (RFID을 이용한 산업용 제어 관리시스템에 적합한 미들웨어 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.451-459
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.

TCP Session Recovery Technique for High Availability in Smart On-Devices (스마트 온디바이스의 고가용성을 위한 TCP 세션 복구 기술)

  • Hong, Seungtae;Kim, Beob-Kyun;Lee, Kwang-Yong;Kim, Jeong-Si;Lim, Chae-Deok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.261-270
    • /
    • 2017
  • With the development of smart on-devices and communication technology, demand for non-stop services is increasing. Therefore, the high availability for continuously providing services in the event of system failure has been spotlighted. Meanwhile, because most internet-based services are provided by using TCP, an efficient TCP session recovery technique for providing non-stop services is required. However, the existing TCP session recovery techniques are inefficient because it has a high recovery cost or does not support failover operation, To solve these problems, in this paper, we propose a TCP session recovery technique for high availability in smart on-devices. For this, we first recover the TCP session without re-establish the TCP session by correcting a sequence number and a acknowledgment number. Second, we synchronize the TCP session recovery data between the master and the server, and then we operate the failover operation when master server fails. Finally, we provide the non-stop service to peer by using the virtual IP number and the transmission of GARP (Gratuitous ARP) packet.

Low-resistance ohmic contacts to p-$Hg_{0.7}$$Cd_{0.3}$Te (p-$Hg_{0.7}$$Cd_{0.3}$Te에 낮은 저항의 접촉을 얻는 방법에 대한 연구)

  • Kim, Kwan;Chung, Han;Kim, Sung-Chul;Lee, Hee-Chul;Kim, Choong-Ki;Kim, Hong-Kook;Kim, Jae-Mook
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.10
    • /
    • pp.87-93
    • /
    • 1994
  • Ohmic contacts between Au and p-HgHg_{0.7}Cd_{0.3}Te$ with low specific contact resistance have been obtained. The contact region of the wafer is first pre-heated for 5 seconds in a rapid thermal processing equipment. The temperature reaches a maximum value of about 200$^{\circ}C$ at the end of the 5 seconds. Next, a thin Au film is formed on the contact region by immersing the sample in AuCl$_{3}$ solution. the sample is then post-annealed in the same condition as the pre-heating after Pb/In pad metals are deposited on the electroless Au contacts. The specific contact resistance measured by transmission line model is 5${\times}10^{-3}{\Omega}cm^{2}$ at 80K. RBS and differential Hall measurement data suggest that the above low resistance ohmic contact is ascribed to surface traps and increased gold diffusion rate.

  • PDF

The Study on Dynamic Images Processing for Finger Languages (지화 인식을 위한 동영상 처리에 관한 연구)

  • Kang, Min-Ji;Choi, Eun-Sook;Sohn, Young-Sun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.2
    • /
    • pp.184-189
    • /
    • 2004
  • In this paper, we realized a system that receives the dynamic images of finger languages, which is the method of intention transmission of the hearing disabled person, using the white and black CCD camera, and that recognizes the images and converts them to the editable text document. We use the afterimage to draw a sharp line between indistinct images and clear images from a series of inputted images, and get the character alphabet from the away of continuous images and output the accomplished character to the word editor by applying the automata theory. After the system removes the varied wrist part from the data of clean image, it gets the controid point of hand by the maximum circular movement method and recognizes the hand that is necessary to analyze the finger languages by applying the circular pattern vector algorithm. The system abstracts the characteristic vectors of the hand using the distance spectrum from the center of the hand and it compares the characteristic vector of inputted pattern from the standard pattern by applying the fuzzy inference and recognizes the movement of finger languages.

A Leader Election Algorithm and Performance Evaluation for Mobile Ad hoc Networks (이동 에드 혹 네트워크를 위한 제어노드 선택 알로리즘 및 성능 평가)

  • Parvathipuram Pradeep;Yang Gi-Chul;Oh Sooyul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.829-834
    • /
    • 2004
  • Nodes communicate through wireless channels under peer-to-peer level in ad-hoc mobile networks. The nodes are free to move around in a geographical area and are loose]y bounded by the transmission range of the wireless channels. Also, a node is completely free to move around, there is no fixed final topology. Hence, to manage the inter-node communication and data exchange among them a leader node is required. In this paper we introduce an efficient leader election algorithm for mobile ad hoc networks where inter-node communication is allowed only among the neighboring nodes. Furthermore we present the result of performance evaluation through simulation. The algorithm is efficient and practical since it uses least amount of wireless resources and does not affect the movement of the nodes.

Efficient Group Management Mechanism and Architecture for Secure Multicast (안전한 멀티캐스트 서비스 제공을 위한 효율적인 그룹 관리 메커니즘 및 구조)

  • Eun, Sang-A;Jo, Tae-Nam;Chae, Gi-Jun;Lee, Sang-Ho;Park, Won-Ju;Na, Jae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.323-330
    • /
    • 2002
  • Multicast services are gradually diversified and used widely. Proportionately, they become the center of attackers' attention and there are growing possibilities of an intelligence leak. Therefore, research related to secure multicast should be required to provide multicast service efficiently. This paper presents the architecture for secure multicast which provides efficient group management mechanism in group consists using member's dynamic join and leave. This architecture can provide secure multicast services to many users with regard to security aspects in one-to-many communication. The simulation results show that the proposed architecture achieves an efficient group management and a secure data transmission with low latency compared with the other existing secure multicast architecture.

The Influence of Quantization Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain (주파수 영역 계수 변경을 이용한 정보은닉기술에서의 양자화 테이블의 영향력)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Park, Chun-Myoung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.56-63
    • /
    • 2009
  • Nowdays, Most of Internet Contents delivered as a compressed file. It gives many advantages like deduction of communication bandwidth and transmission time etc. In case of JPEG Compression, Quantization is the most important procedure which accomplish the compression. In general signal processing, Quantization is the process which converts continuous analog signal to discrete digital signal. As you known already, Quantization over JPEG compression is to reduce magnitude of pixel value in spatial domain or coefficient in frequency domain. A lot of Data Hiding algorithms also developed to applicable for those compressed files. In this paper, we are going to unveil the influence of quantization table which used in the process of JPEG compression. Even thought most of algorithm modify frequency coefficients with considering image quality, they are ignoring the influence of quantization factor corresponding with the modified frequency coefficient. If existing algorithm adapt this result, they can easily evaluate their performances.

Evolution of Next Generation Mobile Network Based on CDMA2000-1X Network (CDMA 2000-1X를 기반으로한 차세대 이동망의 진화)

  • Son, Dong Chul;Kim, J.W.;Ryu, C.S.
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.1
    • /
    • pp.70-80
    • /
    • 2006
  • The large portion of communication service areas move from a legacy wire-line voice service to mobile data service. For the purpose of satisfaction on market need, many communication systems should be installed and upgraded based on a mobile wide-band transmission facility. Recently, large part of communication service is based on internet protocol by packet switch techniques and required new technologies such as multimedia processing, QoS achievement, and mobility managememobile communication network such as IS-95A/B and CDMA2000-1X. In this paper, I analyzed the network architecture and service provision methods. in CDMA2000-1X nt. In korea, a CDMA communication technique is standardized for digital mobile communication systems. By using the analysed results, I will extract an efficient method for network evolution and a core technique for next generation mobile communication network.

  • PDF

A Transport Layer Mobility Support Approach for Multimedia Streaming Services (멀티미디어 스트리밍 서비스를 지원하기 위한 트랜스포트 계층에서의 이동성 지원 방안)

  • Jang, Moon-Jeong;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.917-926
    • /
    • 2005
  • In this paper, we propose a transport layer mobility support protocol for multimedia streaming services in mobile/wireless environments by extending PR-SCTP to support mobility. We named the proposed scheme to be uPR-mSCTP. The rules related to provide unordered and unreliable data transfer, as well as an approach to minimize handover latency we proposed. Through the simulation results, it is shown that, since uPR-mSCTP reduces transmission rates during handover, not only it reduces the waste of network resources, but it also has the packet loss rate similar to FMIPv6, which is a lot smaller than UDP over MIPv6 or HMIPv6 It also incurs smaller control packet overhead compared to the network layer mobility support approaches.