• Title/Summary/Keyword: Hybrid access

Search Result 342, Processing Time 0.038 seconds

Peducing the Overhead of Virtual Address Translation Process (가상주소 변환 과정에 대한 부담의 줄임)

  • U, Jong-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.118-126
    • /
    • 1996
  • Memory hierarchy is a useful mechanism for improving the memory access speed and making the program space larger by layering the memories and separating program spaces from memory spaces. However, it needs at least two memory accesses for each data reference : a TLB(Translation Lookaside Buffer) access for the address translation and a data cache access for the desired data. If the cache size increases to the multiplication of page size and the cache associativity, it is difficult to access the TLB with the cache in parallel, thereby making longer the critical timing path in the processor. To achieve such parallel accesses, we present the hybrid mapped TLB which combines a direct mapped TLB with a very small fully-associative mapped TLB. The former can reduce the TLB access time. while the latter removes the conflict misses from the former. The trace-driven simulation shows that under given workloads the proposed TLB is effective even when a fully-associative mapped TLB with only four entries is added because the effects of its increased misses are offset by its speed benefits.

  • PDF

A Survey on Admission Control Mechanisms for providing QoS in the IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 QoS 제공을 위한 허가 제어 연구)

  • Lee, Kye-Sang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.535-538
    • /
    • 2005
  • Wireless LANs based on the IEEE 802.11 standard are widely spread for use nowadays. Traffic which are conveyed over the WLANs change rapidly from normal data such a Email and Web pages, to multimedia data of high resolution video and voice. To meet QoS (Quality of Service) required by these multimedia traffic, the IEEE 802 committee recently has developed a new standard, IEEE 802.11e. IEEe 802.11.e contains two MAC mechanisms for providing QoS: EDCA(Enhanced Distributed Channel Access) and HCCA (HCF Controlled Channel Access). Using these standardized MAC mechanisms as a building platform, various admission control mechanisms can be combined to offer QoS gurantees for multimedia traffic. This paper surveys these research efforts.

  • PDF

Kalman Filtering-based Traffic Prediction for Software Defined Intra-data Center Networks

  • Mbous, Jacques;Jiang, Tao;Tang, Ming;Fu, Songnian;Liu, Deming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2964-2985
    • /
    • 2019
  • Global data center IP traffic is expected to reach 20.6 zettabytes (ZB) by the end of 2021. Intra-data center networks (Intra-DCN) will account for 71.5% of the data center traffic flow and will be the largest portion of the traffic. The understanding of traffic distribution in IntraDCN is still sketchy. It causes significant amount of bandwidth to go unutilized, and creates avoidable choke points. Conventional transport protocols such as Optical Packet Switching (OPS) and Optical Burst Switching (OBS) allow a one-sided view of the traffic flow in the network. This therefore causes disjointed and uncoordinated decision-making at each node. For effective resource planning, there is the need to consider joining the distributed with centralized management which anticipates the system's needs and regulates the entire network. Methods derived from Kalman filters have proved effective in planning road networks. Considering the network available bandwidth as data transport highways, we propose an intelligent enhanced SDN concept applied to OBS architecture. A management plane (MP) is added to conventional control (CP) and data planes (DP). The MP assembles the traffic spatio-temporal parameters from ingress nodes, uses Kalman filtering prediction-based algorithm to estimate traffic demand. Prior to packets arrival at edges nodes, it regularly forwards updates of resources allocation to CPs. Simulations were done on a hybrid scheme (1+1) and on the centralized OBS. The results demonstrated that the proposition decreases the packet loss ratio. It also improves network latency and throughput-up to 84 and 51%, respectively, versus the traditional scheme.

Hybrid Technique based on one way and two way delegation in Role-based Access Control (역할기반 접근통제에서의 단방향과 양방향이 고려된 하이브리드한 위임기법)

  • 양혜진;전준철;전진우;김용석;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.454-456
    • /
    • 2004
  • 권한위임은 역할기반-접근통제에서 중요한 정책의 하나로 한 역할에서 다른 역할로 권한의 일부 또는 전부를 위임하는 것을 말한다. 대부분의 계층적 역할기반-접근통제 시스템에서는 권한위임 시에 회수까지 고려한 위임을 지원하는 모델이 일반적이다. 하지만 권한위임에 있어서 역할권한의 회수가 불필요하거나 회수를 할 때 문제가 발생할 수 있다. 본 논문에서는 역할권한의 회수가 필요하지 않는 경우에 시스템의 복잡성을 감소시키기 위한 방안으로써 단방향 권한 위임 기법을 정의하며, 일반적인 위임과 단방향 권한 위임이 같이 고려된 하이브리드한 위임 기법을 제안한다.

  • PDF

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

Broadcast Method based on Data Access Frequencies and Semantic Relationships in Mobile Computing Environments (이동컴퓨팅 환경에서 데이타의 접근빈도 및 시맨틱 관계를 고려한 방송 방법)

  • 최성환;정성원;이송이
    • Journal of KIISE:Databases
    • /
    • v.30 no.5
    • /
    • pp.476-493
    • /
    • 2003
  • Data broadcast is an effective data transmission method from a data base server to numerous mobile clients due to the restrictions on mobile environment such as low wireless communication bandwidth and energy shortage of mobile devices. There are various broadcast methods based on clients' data access frequencies or semantic relationship of data. The broadcast schedule based only on the access frequencies does not consider semantic relations of data, so that when a client needs to access a series of semantically related data, the client has to listen to the wireless channel for a long time. On the other hand, the broadcast schedule based only on semantic relationship of data makes data access time longer when clients highly request specific data which are not semantically related but frequently accessed. In this paper, we present an efficient data broadcast method based on not only data access frequencies but also semantic relationship to improve mobile clients' query response time. The new hybrid broadcast method we propose creates a data broadcast schedule according to the data access frequencies and then the schedule is adjusted to reflect semantic relationship of data. We show our method is efficient by experimental performance analysis.

Frequency Selection Methods in RF-Powered Backscatter Cognitive Radio Networks with Spectrum Sensing (스펙트럼 센싱을 적용한 인지 무선 기반 백스케터 네트워크의 주파수 선택 기법)

  • Hong, Seung Gwan;Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.98-102
    • /
    • 2017
  • In this paper, we study RF-powered backscatter cognitive radio networks to improve the performance for the secondary user which is backscatter radio based wireless sensors. In our proposed model, we consider an avoiding the doubly round-trip attenuation to add a carrier emitter and utilization of spectrum sensing information. When the primary channel is busy, the secondary user is able to harvest RF energy from the channel through a hybrid-access point (H-AP) and a carrier emitter. When the channel becomes idle, the secondary user will be use the harvested energy to operate wireless sensors, to use the sensing and to backscatter through the carrier emitter. We model mathematically the deterministic and multisource elements of a number of tagged channels. In the proposed communication environment, we show the BER performance of the backscatter communication using WiFi signal.

Large-area imaging evolution of micro-scale configuration of conducting filaments in resistive switching materials using a light-emitting diode

  • Lee, Keundong;Tchoe, Youngbin;Yoon, Hosang;Baek, Hyeonjun;Chung, Kunook;Lee, Sangik;Yoon, Chansoo;Park, Bae Ho;Yi, Gyu-Chul
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.285-285
    • /
    • 2016
  • Resistive random access memory devices have been widely studied due to their high performance characteristics, such as high scalability, fast switching, and low power consumption. However, fluctuation in operational parameters remains a critical weakness that leads to device failures. Although the random formation and rupture of conducting filaments (CFs) in an oxide matrix during resistive switching processes have been proposed as the origin of such fluctuations, direct observations of the formation and rupture of CFs at the device scale during resistive switching processes have been limited by the lack of real-time large-area imaging methods. Here, a novel imaging method is proposed for monitoring CF formation and rupture across the whole area of a memory cell during resistive switching. A hybrid structure consisting of a resistive random access memory and a light-emitting diode enables real-time monitoring of CF configuration during various resistive switching processes including forming, semi-forming, stable/unstable set/reset switching, and repetitive set switching over 50 cycles.

  • PDF

Efficient Scheduling Algorithm for Supporting High Bandwidth Utilization and QoS In EPON (EPON에서의 높은 대역폭 사용효율과 QoS 지원을 위한 효율적인 스케줄링 알고리즘)

  • Kim Junseog;Yeon Hunje;Kim Seoggyu;Lee Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.86-96
    • /
    • 2006
  • In recent year, EPON(Ethernet PON) system is expected to be more attractive solutions for high speed, broadband access networks in next generation access networks due to the conversionce of low-cost ethernet equipment and low-cost fiber infrastructure. Upstream channel control algorithm is essential to hare upstream bandwidth in EPON. In this paper, we suggest HUHG(High Utilization and Hybrid Granting) algorithm for supporting high bandwidth utilization and QoS for different service class. This algorithm improves bandwidth utilization as removing or diminishing idle time of upstream channel using characteristics of fixed EF(Expedited Forwarding) sub-cycle. The proposed algorithm also minimizes the packet delay and delay variation of EF class. We conduct detailed simulation experiments using OPNET to study the performance and validate the effectiveness of the proposed algorithm.