• Title/Summary/Keyword: Forwarding

Search Result 692, Processing Time 0.023 seconds

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

Recent Trends of Vessel-Source Pollution (선박 기인 오염물의 처리동향 및 대책)

  • Park, Sang-Ho;Kim, In-Soo
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.97-104
    • /
    • 2006
  • Though stringent guidelines are in place to protect the harbor environment, pollution from ships, from the ports terminals. Discharge from the ballast tanks of ships, though illegal, does occur. Such vessels, arriving from distant ports of call, can introduce exotic species of plants and animals, causing disruption of the local food web. Discharges rich in nitrogen can generate the rapid growth of plankton, eventually leading to a condition known as red tide that is lethal to some coastal organisms. In addition to the harbor's negative effects on marine organisms, the diesel engines of the ships and the trucks that haul cargo to and from the ports release large volumes of diesel exhaust into the atmosphere. IMO(International Maritime Organization) is strongly proceeding with adoption of a new maritime environment convention and coming into effect for regulation enhancement about the pollutants which are happened in a ship recently. Study about the conventions that our country currently comes into effect, and there is during forwarding and correspondence must be performed effectively. In this paper, International convention on the control of harmful Anti-Fouling system on ship, Ballast water management, Prevention of air pollution from ships, treat a main pending problem in ocean related environmental regulation convention.

  • PDF

Reefer Container Monitoring System using Trajectory Information (궤적 정보를 이용한 냉동 컨테이너 모니터링 시스템)

  • Lee, Myung-Jin;Lee, Eung-Jae;Ha, Deok-Cheon;Ryu, Keun-Ho;Baek, Seung-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.1
    • /
    • pp.23-39
    • /
    • 2005
  • As developing satellite communication, the tracking range of the moving objects which move in local area is expanded to the whole world. However previous logistics management system is able to monitor freight which transporting in local area using mobile communication system. In this paper, we propose the reefer container management system that manages the location information and other related information such as temperature, humidity of container using the satellite system. The proposed system consists of three parts; data collector, satellite communication manager, reefer container information manager. And the proposed system uses the moving object index for managing the trajectory of container and tracing the location of container or vessel that is transporting the container, and supports various services such as reefer container and vessel tracking, container control and container statistics to logistic companies like shipper and forwarding agent. And the system can be increasing the quality of container transportation service to the shipper, and it makes the efficient management of reefer container to the shipping company.

  • PDF

A Study on the Operational Way of Freight Forwarding Company: Focusing on Residental Moving Company (화물운송주선업체의 운영방안에 관한 연구 - 이사화물운송주선업체를 중심으로 -)

  • Moon, Jong-Ryoung;Jung, Hyun-Jae;Lee, Tae-Hwee;Kim, Young-Hwan;Yeo, Gi-Tae
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.3
    • /
    • pp.221-239
    • /
    • 2010
  • This study aims to provide solutions concerned with to residential moving companies about their operational problems. In order to shed light on these problem, factor analysis and fuzzy AHP method are adopted. Selected factors are low quality of workers and equipments, weak condition of business, policy and form of a contract, and excessive competition. The results of survey show that excessive competition is the most urgent problem compared with other problems. In the twelve-measured variables, The problem of non-certificated firms, low service quality caused by excessive competition, and claims caused by lack of service instruction are chosen as the urgent matters. As a result of the analyses, the study would propose policy directions how to solve these problems. Firstly, the government should make the legal basis of operating the industry because there is too competitive in the field. Secondly, the government should regulate firms which have not a certificate because they are the cause of low service quality in the field. Thirdly, in order to improve the service quality, the study would suggest that the managers should instruct the workers of residential moving companies. Lastly, the paper would suggest that customers check the certificate of the firm allowed by the government authorities.

A Study on Scheme to Support QoS using Differentiated Services in MPLS Network (MPLS 망에서 Differentiated Services를 이용한 QoS 지원 방안에 관한 연구)

  • Park, Chun-Kwan;Jeon, Byung-Chun
    • Journal of IKEEE
    • /
    • v.5 no.2 s.9
    • /
    • pp.136-145
    • /
    • 2001
  • As with appearing new applications that requires QoS guarantee such as VoIP, VPN in Internet, problems of IP QoS has been one of most important issues in next-generation Internet. IETF has proposed integrated services model(Int-Serv) and differentiated service(Diff-Serv) to supply IP QoS in Internet. Int-Serv model uses the state information of each IP flow, so satisfies QoS according to traffic characteristics, but increases the amount of flow state information with increasing flow number. Diff-Serv model uses PHP(Per Hop Behavior), and there are well-defined classes to provide differentiated traffics with different services according to delay and loss sensitivity. Diff-Serv model can provide diverse services in Internet because of having no the state and signal information of each flow. As MPLS uses the packet forwarding technique based-on label, it implements the traffic engineering in the networks easily. The MPLS can set up the path with different traffic parameters, and assign each path to particular Class of Services. Therefore it is possible to support the Diff-Serv model with well-defined classes. In this paper we investigate the performance improvement of Diff-Serv function in the MPLS network to guarantee class of services in Internet.

  • PDF

A Study on the Factors of Choosing the Liner Shipping Companies Using AHP Method by International Freight Forwarder (AHP기법을 이용한 국제물류주선업체의 정기해운선사 선택요인에 관한 연구)

  • Song, Sun-Yok
    • International Commerce and Information Review
    • /
    • v.13 no.2
    • /
    • pp.95-117
    • /
    • 2011
  • The Purpose of this study is to identify important factors in choosing liner shipping companies using the AHP. The Analytic Hierarchy Process(AHP), introduced by Satty T. L. in 1970, is a decision technique the has been applied to private and public sectors and to group decision problems. This paper will demonstrate the level of importance in 4 major factors: cost, service, transportation and promotion. In detail, the 4 major factors are divided into 14 sub-factors. In the present research, various service attributes for shipping lines were selected from previous studies and the observed data for 4 main service attributes were collected through a questionnaire survey from 26 concerned international freight forwarder experts. The conclusion of this study is as follows. First, it is found that the cost factor is the most important factor among the 4 main service attributes. It is very obvious that the cost factor directly affects the choosing the liner shipping company by international freight forwarders. Second, it is found that the second important factor in choosing the liner shipping company is the transportation factor and the third is the service factor. The promotion factor is underestimated, comparatively speaking. With the ever-increasing competition, liner shipping companies will need to study and understand the selection criteria of their clients(international freight forwarder), and apply the results to their daily and long-terms operations. In particular, liner shipping companies should establish a system to identify and sort the various selection criteria used by international freight forwarding companies.

  • PDF

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

P2P-based Mobility Management Protocol for Global Seamless Handover in Heterogeneous Wireless Network (이기종망에서 글로벌 끊김 없는 핸드오버를 위한 P2P 기반 이동성 관리 프로토콜)

  • Chun, Seung-Man;Lee, Seung-Mu;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.73-80
    • /
    • 2012
  • In this article, we propose a P2P-based mobility management protocol for global seamless handover in heterogeneous wireless networks. Unlike previous mobility management protocols such as IETF MIPv4/6 and its variants, the proposed protocol can support global seamless handover without changing the existing network infrastructure. The idea of the proposed protocol is that the location management function for mobility management is separately supported from packet forwarding function, and bidirectional IP tunnels for packet transmission are dynamically constructed between two end-to-end mobile hosts. In addition, early handover techniques have been developed to avoid large handover delays and packet losses using the IEEE 802.21 Media Independent Handover functions. The architecture and signaling procedure of the proposed protocol have been designed in detail, and the mathematical analysis and simulation have been done for performance evaluation. The performance results show that the proposed protocol outperforms the existing MIPv6 and HMIPv6 in terms of handover latency and packet loss.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Energy-Efficient Data-Aware Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 데이터 인지 라우팅 프로토콜)

  • Lee, Sung-Hyup;Kum, Dong-Won;Lee, Kang-Won;Cho, You-Ze
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.122-130
    • /
    • 2008
  • In many applications of wireless sensor networks, sensed data can be classified either normal or urgent data according to its time criticalness. Normal data such as periodic monitoring is loss and delay tolerant, but urgent data such as fire alarm is time critical and should be transferred to a sink with reliable. In this paper, by exploiting these data characteristics, we propose a novel energy-efficient data-aware routing protocol for wireless sensor networks, which provides a high reliability for urgent data and energy efficiency for normal data. In the proposed scheme, in order to enhance network survivability and reliability for urgent data, each sensor node forwards only urgent data when its residual battery level is below than a threshold. Also, the proposed scheme uses different data delivery mechanisms depending on the data type. The normal data is delivered to the sink using a single-path-based data forwarding mechanism to improve the energy-efficiency. Meanwhile, the urgent data is transmitted to the sink using a directional flooding mechanism to guarantee high reliability. Simulation results demonstrate that the proposed scheme could significantly improve the network lifetime, along with high reliability for urgent data delivery.