• Title/Summary/Keyword: Information Request

Search Result 1,736, Processing Time 0.026 seconds

Performance Analysis of MAC Protocols for Ethernet PON (이더넷 PON을 위한 MAC 프로토콜 성능 분석)

  • 안계현;이봉주;한경은;강동국;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.457-465
    • /
    • 2003
  • In this paper, we analyze the performances of variable MAC (Medium Access Control) protocols and present an efficient MAC protocol for Ethernet PON (Passive Optical Network). We consider three MAC protocols: static TDMA, dynamic TDMA, and Interleaved polling. Static TDMA assigns an equal amount of bandwidth to all ONUs regardless of the request information but Dynamic TDMA dynamically allocates the bandwidth to each ONU considering its request. Interleaved Polling operates a cycle with variable time period and a polling method for informing a uplink transmission chance to each ONU. This paper theoretically analyzes the available bandwidth for each of three protocols. We also implement the simulation models for them by using OPNET and evaluates the performances under various bursty traffic environments. The results are compared and analyzed in terms of channel utilization and queueing delay.

Performance Analysis of Interworking Protocol for Efficient Mobile Data Service (효율적인 이동 데이타 서비스를 위한 연동 프로토콜의 성능 분석)

  • 박성수;송영재;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.7
    • /
    • pp.1744-1754
    • /
    • 1998
  • In this paper, the data service protocol which could support data service more efficiently between mobile host and fixed host in wire network is investigated. Wireless link has high bit error rate compared with wire link. Therefore, TCP performance for the data service is degraded in wire and wireless interworking environment. Thus, to reduce performance degradation. Interworking module withsimple protocol processing function is proposed. This, interworking module analyzes the hearder information of TCP fram. If received TCP freame is a duplicated frame, TCP frame is discared. Also, if interworking moudule receives retransmission request frame is a duplicated frame, TCP freme is discarded. Also, if interworking module receives retansmission request frame, interworking module performs retransmission procedure. According to simulation results, the proposed IWF shows better performance than traditional IWF in view of delay and throughput in the wire and wireless interworking environments.

  • PDF

A Study on Implementation of System Improvement for Medical Information Processing (의료정보처리를 위한 시스템 개선에 관한 연구)

  • Yoo, Jinho
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.283-288
    • /
    • 2016
  • This research is to study IoT based implementation of system and network for medical information processing. This paper's configuration environment consists of sensor node, gateway and server node as a basic IoT architecture. Medical terminal as a sensor node asks connect request to his server, and the server accepts the request if the medical device is already registered. Wearable medical device sends its collected sensing data to server, and server processes the received data for data visualization or saves them for usage in the future. This paper describes overall processes and their algorithms and suggests their software processing architecture.

Efficient Hybrid ARQ with Space-Time Coding and Low-Complexity Decoding (Space-Time Coding과 낮은 복잡도의 복호 방범을 사용한 효과적인 Hybrid ARQ 기법)

  • Oh Mi-Kyung;Kwon Yeong-Hyen;Park Dong-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1222-1230
    • /
    • 2005
  • We aim at increasing the throughput of the hybrid automatic retransmission request (HARQ) protocol in Space-Time (ST) coded multi-antenna transmission systems. By utilizing reliability information at the decoder, we obtain an improved probability of successful decoding, which enhances the overall system throughput at low-complexity. Simulations and analytical results demonstrate the performance of our scheme in impulse noise environment as well as AWGN and fading multi-input multi-ouput (MIMO) channels.

Flow Mobility Scheme Based on a Measured QoS Condition in PIMIPv6 Network (PMIPv6에서 QoS 측정값에 따른 Flow Mobility 방안 제안)

  • Lee, Seong Ro;Kim, Su-Hyun;Jang, Dae-Woong;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.782-788
    • /
    • 2014
  • In this paper, we propose a scheme for the support of flow mobility according to a QoS condition when a mobile node with multiple wireless interface moves and attaches to a different access network. For this purpose, we extend the fields of the PBU/PBA message and add an additional request procedures. Through the proposed scheme, we can provide the best service in according to the network conditions of the next access network based on the measured QoS values by LMA. Finally we consider the state transition diagram of our proposed scheme and confirm its operation.

Automatic Detection and Analysis of Desktop Bus'(D-Bus) Privilege Bypass in Tizen (타이젠 용 데스크톱 버스 (D-Bus) 권한 우회 취약점 분석 및 자동 탐지)

  • Kim, Dongsung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1023-1030
    • /
    • 2020
  • Wearable devices, such as a smart watch and a wrist band, store owner's private information in the devices so that security in a high level is required. Applications developed by third parties in Tizen request for an access to designated services through the desktop bus (D-Bus). The D-Bus verifies application's privileges to grant the request for an access. We developed a fuzzing tool, so-called DAN (the D-bus ANalyzer), to detect errors in implementations for privilege verifications and access controls within Tizen's system services. The DAN has found a number of vulnerable services which granted accesses to unauthorized applications. We built a proof-of-concept application based on those findings to demonstrate a bypass in the privilege examination.

User-Information based Adaptive Service Management Algorithm (사용자 정보기반의 적응적인 서비스관리 알고리즘)

  • Park, Hea-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.81-88
    • /
    • 2009
  • Many studies and policies are suggested for customer satisfaction to survive in multimedia content service markets. there are policies like a segregating the clients using the contents service and allocating the media server's resources distinctively by clusters using the cluster analysis method of CRM. The problem of this policy is fixed allocation of media server resources. It is inefficient for costly media server resource. To resolve the problem and enhance the utilization of media server resource, the ACRFA (Adaptive Client Request Filtering Algorithm) was suggested per cluster to allocate media server resources by flexible resource allocation method.

Investigation on Uncertainty in Construction Bid Documents

  • Shrestha, Rabin;Lee, JeeHee
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.67-73
    • /
    • 2022
  • Construction bid documents contain various errors or discrepancies giving rise to uncertainties. The errors/discrepancies/ambiguities in the bid document, if not identified and clarified before the bid, may cause dispute and conflict between the contracting parties. Given the fact that bid document is a major resource in estimating construction costs, inaccurate information in bid document can result in over/under estimating. Thus, any questions from bidders related to the errors in the bid document should be clarified by employers before bid submission. This study aims to examine the pre-bid queries, i.e., pre-bid request for information (RFI), from state DoTs of the United States to investigate error types most frequently encountered in bid documents. For the study, around 200 pre-bids RFI were collected from state DoTs and were classified into several error types (e.g., coordination error, errors in drawings). The analysis of the data showed that errors in bill of quantities is the most frequent error in the bid documents followed by errors in drawing. The study findings addressed uncertainty types in construction bid documents that should be checked during a bid process, and, in a broader sense, it will contribute to advancing the construction management body of knowledge by clarifying and classifying bid risk factors at an early stage of construction projects.

  • PDF

Adaptive Hard Decision Aided Fast Decoding Method using Parity Request Estimation in Distributed Video Coding (패리티 요구량 예측을 이용한 적응적 경판정 출력 기반 고속 분산 비디오 복호화 기술)

  • Shim, Hiuk-Jae;Oh, Ryang-Geun;Jeon, Byeung-Woo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.4
    • /
    • pp.635-646
    • /
    • 2011
  • In distributed video coding, low complexity encoder can be realized by shifting encoder-side complex processes to decoder-side. However, not only motion estimation/compensation processes but also complex LDPC decoding process are imposed to the Wyner-Ziv decoder, therefore decoder-side complexity has been one important issue to improve. LDPC decoding process consists of numerous iterative decoding processes, therefore complexity increases as the number of iteration increases. This iterative LDPC decoding process accounts for more than 60% of whole WZ decoding complexity, therefore it can be said to be a main target for complexity reduction. Previously, HDA (Hard Decision Aided) method is introduced for fast LDPC decoding process. For currently received parity bits, HDA method certainly reduces the complexity of decoding process, however, LDPC decoding process is still performed even with insufficient amount of parity request which cannot lead to successful LDPC decoding. Therefore, we can further reduce complexity by avoiding the decoding process for insufficient parity bits. In this paper, therefore, a parity request estimation method is proposed using bit plane-wise correlation and temporal correlation. Joint usage of HDA method and the proposed method achieves about 72% of complexity reduction in LDPC decoding process, while rate distortion performance is degraded only by -0.0275 dB in BDPSNR.

A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence (디지털 증거의 긴급한 보전을 위한 법제 개선 연구)

  • Ro, Sohyong;Ji, Sungwoo
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.