• Title/Summary/Keyword: Distributed Communication Model

Search Result 436, Processing Time 0.027 seconds

Object Replication and Consistency Control Techniques of P2P Structures for Multiplayer Online Games (멀티플레이어 온라인 게임을 위한 P2P 구조의 객체 복제와 일관성 제어 기법)

  • Kim, Jinhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.91-99
    • /
    • 2014
  • The main game architectures for multiplayer online games are the traditional client-server architectures, multi-server architectures and P2P(peer-to-peer) architectures. P2P architectures, due to their distributed and collaborative nature, have low infrastructure costs and can achieve high scalability as well as fast response time by creating direct connections between players. However, P2P architectures face many challenges. Distributing a game among peers makes maintaining control over the game more complex. These architectures also tend to be vulnerable to churn and cheating. Providing consistency control in P2P systems is also more difficult since conflicting updates might be executed at different sites resulting in inconsistency. In order to avoid or correct inconsistencies, most multiplayer games use a primary-copy replication approach where any update to the object has to be first performed on the primary copy. This paper presents the primary-copy model with the update dissemination mechanism that provides consistency control over an object in P2P architectures for multiplayer online games. The performance for this model is evaluated through simulation experiments and analysis.

Performance Analysis of User Clustering Algorithms against User Density and Maximum Number of Relays for D2D Advertisement Dissemination (최대 전송횟수 제한 및 사용자 밀집도 변화에 따른 사용자 클러스터링 알고리즘 별 D2D 광고 확산 성능 분석)

  • Han, Seho;Kim, Junseon;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.721-727
    • /
    • 2016
  • In this paper, in order to resolve the problem of reduction for D2D (device to device) advertisement dissemination efficiency of conventional dissemination algorithms, we here propose several clustering algorithms (modified single linkage algorithm (MSL), K-means algorithm, and expectation maximization algorithm with Gaussian mixture model (EM)) based advertisement dissemination algorithms to improve advertisement dissemination efficiency in D2D communication networks. Target areas are clustered in several target groups by the proposed clustering algorithms. Then, D2D advertisements are consecutively distributed by using a routing algorithm based on the geographical distribution of the target areas and a relay selection algorithm based on the distance between D2D sender and D2D receiver. Via intensive MATLAB simulations, we analyze the performance excellency of the proposed algorithms with respect to maximum number of relay transmissions and D2D user density ratio in a target area and a non-target area.

Adaptive Load Balancing based on Consistency (일관성에 기초한 적응 부하 평형)

  • Kim, Jun-Hyeong;O, Ha-Ryeong;Lee, Jae-Mun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.288-298
    • /
    • 1995
  • Load balancing attempts to improve the performance of a distributed computing system by transferring some of the workload of a congested site to others. A load balancing scheme that supports both the source-initiated and the server- initiated load balancing is proposed in this paper. It can model both the m/m/1 queue(no load balancing) and the m/m/n queue(perfect load balancing) as the extreme State variables are replicated into every site, and copy consistency constraints are relaxed more weakly. We propose weak copy consistency constraints which correlate the outdated state information to that of the current state. We also derive sufficient conditions under which each scheduler can guarantee the load balancing without communication Using this model, the problem of load balancing is converted to that of maintaining the consistency of states and communication overhead becomes less than that of the bidding algorithm. The scheme is simulated by event tracing, compared to the two extreme cases and the bidding algorithm. The results show that the mean response time and the number of messages are reduced by 0-35% and 40-100% respectively, compared with the bidding algorithm. Finally the effects of some system parameters are described.

  • PDF

Design of ActiveX based Application for the Implementation of Control & Monitoring System (제어 및 모니터링 시스템 구현을 위한 ActiveX 기반의 애플리케이션 설계)

  • Song, Min-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1237-1242
    • /
    • 2006
  • Microsoft's ActiveX corresponding to the advanced type of COM based distributed application model is made available for the use of component communication[1]. ActiveX supports reuse of code and object linking, so developers can integrate many objects into application and improve the efficiency of development. Also, Integration of seperated application makes easy to develop customized program[2]. ActiveX, formerly used to develope communication application in Visual C++ or Visual Basic, has the efficiency of programming and is widely used in the M&C(Monitoring and Control) of instruments. In this paper, we will implement M&C application capable of remote operating, and besides, develop web browser and media player in the form of ActiveX control in order to control and monitor program remotely.

  • PDF

A DDoS Attack Detection Technique through CNN Model in Software Define Network (소프트웨어-정의 네트워크에서 CNN 모델을 이용한 DDoS 공격 탐지 기술)

  • Ko, Kwang-Man
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.605-610
    • /
    • 2020
  • Software Defined Networking (SDN) is setting the standard for the management of networks due to its scalability, flexibility and functionality to program the network. The Distributed Denial of Service (DDoS) attack is most widely used to attack the SDN controller to bring down the network. Different methodologies have been utilized to detect DDoS attack previously. In this paper, first the dataset is obtained by Kaggle with 84 features, and then according to the rank, the 20 highest rank features are selected using Permutation Importance Algorithm. Then, the datasets are trained and tested with Convolution Neural Network (CNN) classifier model by utilizing deep learning techniques. Our proposed solution has achieved the best results, which will allow the critical systems which need more security to adopt and take full advantage of the SDN paradigm without compromising their security.

An emprical analysis on the effect of OTT company's content investment (OTT 사업자 콘텐츠 투자가 미치는 영향에 대한 실증 분석)

  • Kwak, Jeongho;Na, Hoseoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.149-156
    • /
    • 2021
  • OTT service, which allows video content to be viewed as a streaming service on the Internet network, has recently attracted a lot of attention, and the number of users is also increasing rapidly. It would be a natural strategy for OTT companies to acquire more content to gain a competitive advantage in relations with traditional media companies and other OTT companies. However, there are research results to show that the investment in facilities by Internet service providers who must transport the increasing Internet traffic from OTT provider to end users should increase as the amount of Internet traffic originated by OTT services also increases. This study empirically analyzed how content investment by Netflix, a leading OTT company, affects its revenue growth and network investment by Internet service providers through a polynomial distributed lag model. And the analysis results show that Netflix's content investment contributes to the company's increase in revenue, and also has an effect on the increase in network investment by Internet service providers. This result confirms that OTT operators' content acquisition strategy is a valid management strategy, and empirically supports the study results that OTT operators need to share the cost of Internet network facility investment.

Design of Mobile Agent Model Supporting the Intelligent Path Search (지능형 경로 탐색 이동 에아전트 모델 설계)

  • Ko, Hyun;Kim, Kwang-Jong;Lee, Yon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.993-1000
    • /
    • 2002
  • In this paper, we design the CORBA-based Mobile Agent Model (CMAM) which has the capability of the efficient work processing in distributed environment through sensing network traffic and searching the optimal path for migration nodes of mobile agent. In case existing mobile agent model is given various works from user, the network overhead and traffic are increased by increasing of execution module size. Also, if it happens a large quantity of traffics due to migration of nodes according to appointment of the passive host(below node) routing schedule by user, it needs much cost for node search time by traffic. Therefore, in this paper, we design a new mobile agent m()del that assures the reliability of agent's migration through dynamic act on the specific situation according to appointment of the active routing schedule and can minimize agent's work processing time through optimal path search. The proposed model assigns routing schedule of the migration nodes actively using an extended MAFFinder. Also, for decreasing overhead of network by agent's size, it separates the existing mobile agent object by mobile agent including only agent calling module and push agent with work executing module based on distributed object type of CORBA. Also, it reduces the required time for round works of mobile agent through the optimal path search of migration nodes.

Energy Harvesting Technique for Efficient Wireless Cognitive Sensor Networks Based on SWIPT Game Theory

  • Mukhlif, Fadhil;Noordin, Kamarul Ariffin Bin;Abdulghafoor, Omar B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2709-2734
    • /
    • 2020
  • The growing demand to make wireless data services 5G compatible has necessitated the development of an energy-efficient approach for an effective new wireless environment. In this paper, we first propose a cognitive sensor node (CSN) based game theory for deriving energy via a primary user-transmitted radio frequency signal. Cognitive users' time was segmented into three phases based on a time switching protocol: energy harvest, spectrum sensing and data transmission. The proposed model chooses the optimal energy-harvesting phase as the effected factor. We further propose a distributed energy-harvesting model as a utility function via pricing techniques. The model is a non-cooperative game where players can increase their net benefit in a selfish manner. Here, the price is described as a function pertaining to transmit power, which proves that the proposed energy harvest game includes Nash Equilibrium and is also unique. The best response algorithm is used to achieve the green connection between players. As a result, the results obtained from the proposed model and algorithm show the advantages as well as the effectiveness of the proposed study. Moreover, energy consumption was reduced significantly (12%) compared to the benchmark algorithm because the proposed algorithm succeeded in delivering energy in micro which is much better compared to previous studies. Considering the reduction and improvement in power consumption, we could say the proposed model is suitable for the next wireless environment represented in 5G.

ICU Real-Time Sign Information Transmission System using TMO in Distributed Network Systems (분산 네트워크 시스템에서 TMO를 이용한 ICU 실시간 생체정보 전송 시스템)

  • Oh, Seung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.230-235
    • /
    • 2009
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of ICU. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

A Study on 2 X 2 MIMO Propagation Channel Characteristics for Receiving Antenna Spacings (수신 안테나 이격거리에 대한 2 X 2 MIMO 전파 채널 특성에 관한 연구)

  • Park, Se-Hyun;Yoon, Byung-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.747-752
    • /
    • 2009
  • In this paper, the MIMO(Multi-Input Multi-Output) channel characteristics for Rx antenna spacing are described in the real environment, which has LOS(Ling of Sight) and NLOS (Won-Line of Sight). We developed $2\times2$ MIMO channel measurement system at 2.3GHz Wibro Band. MIMO antenna evaluation parameters such as received power, channel capacity and spatial correlation are evaluated for standard dipole antenna with 0.25, 0.5, 0.75 and 1.0 wavelength spacing at 2-position for LOS and 4-position for NLOS. The spatial correlation is distributed more than 0.9 in most LOS case which might be intricate to operate MIMO communication. MIMO antenna design need to be focused on getting spatial diversity and reducing spatial correlation in LOS case.