• Title/Summary/Keyword: Information Request

Search Result 1,725, Processing Time 0.029 seconds

Study on Dynamic Priority Collision Resolution Algorithm in HFC-CATV Network (HFC-CATV 망에서 동적 우선순위 충돌해결알고리즘에 관한 연구)

  • Lee, Su-Youn;Chung, Jin-Wook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.611-616
    • /
    • 2003
  • Recently, the HFC-CATV network stand in a substructure of superhighway information network. Because of sharing up to 500 of subscribes, the Collision Resolution Algorithm needs in the upstream channel of HFC-CATV network. In order to provide Quality of Service (QoS) to users with real-time data such as voice, video and interactive service, the research of Collision Resolution Algorithm must include an effective priority scheme. In IEEE 802.14, the Collision Resolution Algorithm has high request delay because of static PNA(Priority New Access) slots structure and different priority traffics with the same probability. In order to resolve this problem, this paper proposed dynamic priority collision resolution algorithm with ternary tree algorithm. It has low request delay according to an increase of traffic load because high priority traffic first resolve and new traffic content with different probability. In the result of the simulation, it demonstrated that the proposed algorithm needs lower request delay than that of ternary tree algorithm with static PNA slots structure.

Priority-based Intelligent Uplink Random Access Scheme for Fourth-generation Cellular Systems and Its Standardization (4세대 이동통신시스템을 위한 우선순위 기반 지능적 상향링크 랜덤 접속 방법 및 표준화)

  • Moon, Jung-Min;Lee, Ho-Won;Cho, Dong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1623-1635
    • /
    • 2011
  • Fourth-generation (4G) cellular communication systems must provide different quality-of-service (QoS) to users according to the service type, membership class, and usage case of each user. For the purpose of user's QoS differentiation, we propose an enhanced uplink random access scheme for bandwidth request. More specifically, we divide a bandwidth request channel into two parts: One is a primary region and the other is a secondary region. Then, each region has a unique minimum access class that allows only specific users to perform random access through that region. By doing so, we can reduce collision probability and increase the success probability of bandwidth request. From the perspective of standardization, we presented this scheme in the IEEE 802.16m Session #66 held on March 2010. As a result, the concept of the proposed scheme and required messages were defined in the 802.16m standard.

Parity Bits Request Estimation Using Motion Information Feedback for Fast Distributed Video Decoding (고속 분산 비디오 복호화를 위한 움직임 정보 피드백을 이용한 패리티 비트 요구량 예측 기법)

  • Kim, Man-jae;Choi, Haechul;Kim, Jin-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.107-108
    • /
    • 2012
  • For low complexity encoder, the parity bit transmission through a feedback channel is an essential part of DVC. But feedback channel-based parity bit control is a major cause for the high decoding time latency. In this paper, we propose a fast distributed video decoding by parity bit request estimation using rate-distortion model. Through computer simulations, it is shown that the proposed method can achieve complexity reduction compared to other methods.

  • PDF

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

Emergency Rescue Request Notification Service Using Bluetooth Low Energy Technology (Bluetooth Low Energy 기술을 이용한 긴급구조요청 알림서비스)

  • Kim, Sung-Jin;Cho, Kyoung-woo;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.529-530
    • /
    • 2016
  • When the mountain accident occurred, the accident victims should inform anyone of information of the location and accident situation rapidly. But if you are in the radio shadow area where you cannot use GPS, 3G/4G, and wireless communication, you can't inform someone your accidents. In this paper, we suggest the emergency rescue request notification service in situation that victims can't report their accidents. This service is to send request message for rescue in radio shadow area, in mountain accident, by BLE(Bluetooth Low Energy).

  • PDF

A Method for Security Strengthening of Web Application using AOP (AOP를 이용한 웹 애플리케이션의 보안성 강화 방안)

  • Sun, Soo-Rim;Lee, Keum-Suck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.119-128
    • /
    • 2009
  • As use of web applications and web-based information systems increases, so web application attacks are increasing. Recently, XSRF(Gross Site Request Forgery) attacks among a variety of web attacks become important because victim's damage caused by such attacks can be severe. But adding security functions for preventing XSRF attacks to existing developed and running software systems could affect move dangerous and expensive to companies and organizations. We suggest effectively adding these security functions to legacy systems, could separate concerns using advantage of the modularity offered by AOP(Aspect-Oriented Programming) methodology. In this paper, we have presented approach for detecting and preventing XSRF in JEE systems using aspect of AOP.

Request Redirection Method to reduce load for Storage Server based on iSCSI Protocol (Request Redirection 기법을 통한 iSCSI 프로토콜 기반 스토리지 서버의 부하분산 방안 연구)

  • Seo Jawon;Choi Wonil;Yang Yuan;Park Myongsoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.802-804
    • /
    • 2005
  • 유비쿼터스 환경에 대한 관심과 휴대용 컴퓨팅 기기의 보급으로 가까운 미래의 사람들은 언제 어디서나 네트워크를 통해 데이터 접근이 가능하게 될 것이다. 특히 영화나 음악과 같은 멀티미디어 데이터의 폭발적인 증가로 인해 확장성 있는 네트워크 스토리지 시스템의 필요성이 부각되고 있다. SAN(Storage Area Network)은 높은 확장성과 빠른 속도를 제공하여 엔터프라이즈 환경에 적합한 스토리지 네트워크 시스템이다. 최근에 SAN 환경은 SCSI Architecture Model(SAM)의 표준으로 채택된 iSCSI를 이용한 IP기반의 SAN으로 옳겨가고 있다. 본 논문에서는 iSCSI 기반의 IP SAN환경에서 서비스 클라이언트가 증가함에 따라 스토리지 서버의 부하가 커지는 문제를 해결하기 위해 스토리지 디바이스에서 클라이언트로 데이터를 직접 전송하는 방안을 제안한다.

  • PDF

Adaptive Zoning with Multiple Posts for Efficient Routing in MANET (다중 포스트의 적응형 Zoning으로 MANET을 위한 효율적 라우팅)

  • Seo, Myung-Joo;Lee, Jong-Ho;Youn, Hee-Yong;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1539-1542
    • /
    • 2002
  • Many routing protocols have been proposed for mobile ad-hoc networks, but most protocols do not consider the physical location of the communicating nodes. In this paper we propose adaptive zoning approach with multiple hosts for reducing the number of route request messages. The proposed approach makes the sub-request zone has shorter interval than the existing schemes between the source and destination. This results in significantly lower routing overhead than the existing schemes as verified by computer simulation.

  • PDF

A Study on Countermeasure for CCN Interest Flooding Attack (콘텐츠 중심 네트워킹 환경에서의 Interest Packet Flooding 대응 연구)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.954-961
    • /
    • 2013
  • To enhance the efficiency of network, content-centric networking (CCN), one of future Internet architectures, allows network nodes to temporally cache transmitted contents and then to directly respond to request messages which are relevant to previously cached contents. Also, since CCN uses a hierarchical content-name, not a host identity like source/destination IP address, for request/response packet routing and CCN request message does not include requester's information for privacy protection, contents-providers/ network nodes can not identify practical requesters sending request messages. So to send back relevant contents, network nodes in CCN records both a request message and its incoming interfaces on Pending Interest Table (PIT). Then the devices refer PIT to return back a response message. If PIT is exhausted, the device can not normally handle request/response messages anymore. Hence, it is needed to detect/react attack to exhaust PIT. Hence, in this paper, we propose improved detection/reaction schemes against attacks to exhaust PIT. In practice, for fine-grained control, this proposal is applied to each incoming interface. Also, we propose the message framework to control attack traffic and evaluate the performance of our proposal.

Resource Request Scheduling for Best Effort Service in Wireless MAN : Performance Analysis (Wireless MAN에서 Best Effort 서비스를 위한 자원 요청 스케줄링 방식의 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.57-60
    • /
    • 2003
  • IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple service. Among the service classes supported by the wireless MAN, the BE class is ranked on the lowest position in priority and is usually deployed by multicast and broadcast polling MAC scheme. In provisioning such BE service, the delay performance is influenced by a number of components including restrictions on resource request per SS, the number of request opportunities in upward frame, scheduling requests at BS, and contention resolution method. As candidate components of MAC function for BE service, we propose single and multiple request schemes (for controling the number of requests per SS), exhaustive and limited request schemes (for regulating the amount of grant per request) and FCFS, H-SMF, pure SMF, SS-wise Round Robin, and pure Round Robin (for scheduling requests at BS). Then, we construct MAC schemes by combining the above components and evaluate the delay performance exhibited by each MAC scheme using a simulation method. From numerical results, we investigate the effect of MAC components on average delay and delay variation and observe the dissonance on collision reduction in a resource - limited environment.

  • PDF