• Title/Summary/Keyword: Information flow control

Search Result 1,186, Processing Time 0.028 seconds

Automatic Verification of the Control Flow Model for Effective Embedded Software Design (효과적인 임베디드 소프트웨어 설계를 위한 제어흐름 모델의 자동 검증)

  • Park, Sa-Choun;Kwon, Gi-Hwon;Ha, Soon-Hoi
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.563-570
    • /
    • 2005
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Cod sign Environment) allows to express both data flow and control flow. To formally verify an fFSM specification which expresses control flow in PeaCE, the step semantics of the model was defined. In this paper, we introduce the automatic verification tool developed by formal semantics of previous work. This tool uses the SMV as inner model checker md, through our tool, users can formally verify some important bugs such as race condition, ambiguous transition, and circulartransition without directly writing logical formulae.

Convergence of MPLS applied SDN to Optimize IPTV Broadcast Transmission for IPv6 and IPv4 (IPv6와 IPv4 환경에서 IPTV 전송 최적화 위한 SDN을 응용한 MPLS)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.819-824
    • /
    • 2015
  • SDN (Software Defined Network) technology, hardware and network control functions should be separated independently of existing switches or routers and data transfer functions and are also refers to a separate network architecture that can develop and run. When planning a network and designed to reflect the network control function by applying the SDN may reflect the resources efficiently. In this study, one people suggest Applications SDN, which offer an absolutely necessary part of a coded program that combines the benefits of the existing IOS (Combined Benefits) applying the model to complete the Controller part through the MPLS IOS. The OpenFlow Controller is a command to the router LER(Label Edge Router), and transmits the packet in accordance with the command to the destination according to the EXP bit. To configure TCP / IP to the IOS through the optimized coding. Using the OpenFlow protocol controller transmits an encapsulation header as defined in the MPLS packet.

PERFORMANCE ANALYSIS OF CONGESTION CONTROL ALGORITHM IN COMMON CHANNEL SIGNALING NETWORKS

  • Park, Chul-Geun;Ahn, Seong-Joon;Lim, Jong-Seul
    • Journal of applied mathematics & informatics
    • /
    • v.12 no.1_2
    • /
    • pp.395-408
    • /
    • 2003
  • Common Channel Signaling(CCS) networks need special controls to avoid overload of signaling networks and degradation of call process-ing rate, since they play an important role of controlling communication transfer networks. Congestion control and flow control mechanisms are well described in ITU-T recommendation on Signaling System No.7(SS7). For the practical provisions, however, we need an analysis on the relation among service objects, system requirements and implementation of congestion control algorithms. SS7 provides several options for controlling link congestion in CCS networks. In this paper we give a general queueing model of congestion control algorithm which covers both the international and national options. From the queuing model, we obtain the performance parameters such as throughput, message loss rate and mean delay for the international option. To show the performance of the algorithm, some numerical results are also given.

A Study of ABR Traffic Control in ATM Networks by Integrating EFCI and ER Modes (ATM 네트워크상에서 EFCI와 ER을 결합한 ABR 트래픽 제어에 관한 연구)

  • 김종은;우현구;김봉기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.2
    • /
    • pp.98-104
    • /
    • 2000
  • One of the main features of ABR service is the employment of a rate-based flow control mechanism, and congestion control plays an important role in the effective and stable operation of ATM networks Feedback from the network switches to the end system gives users the information necessary to adjust transmission rates appropriately according to the current networks load. Congestion controls by feedback mechanism are classified as EFCI and ER mode. We analyze the performance of EFCI and ER and propose a new ABR traffic control strategy by integrating EFCI and ER modes to improve the traditional traffic control. Through the distributed simulation. the performance improved by the proposed control strategy is analyzed.

  • PDF

Extended FRED(Fair Random Early Detection) Method with Virtual Buffer (가상 버퍼를 이용한 공평성을 지원하는 확장된 FRED 기법)

  • U, Hui-Gyeong;Kim, Jong-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3269-3277
    • /
    • 1999
  • To promote the inclusion of end-to-end congestion control in the design of future protocols using best-effort traffic, we propose a router mechanism, Extended FRED(ex-FRED). In this paper, we catagorize the TCP controlled traffics into robust and fragile traffic and discuss several unfairness conditions between them caused by the diverse applications. For example, fragile traffic from bursty application cannot use its fair share due to their slow adaptation. Ex-FRED modifies the FRED(Fair Random Early Drop), which can show wrong information due to the narrow view of actual buffer. Therefore, Ex-FRED uses per-flow accounting in larger virtual buffer to impose an each flow a loss rate that depends on the virtual buffer use of a flow. The simulation results show that Ex-FRED uses fair share and has good throughput.

  • PDF

Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification (자바 바이트코드 검증을 위해 기본경로를 통한 BIRS 코드로부터 검증조건 생성)

  • Kim, Je-Min;Kim, Seon-Tae;Park, Joon-Seok;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.61-69
    • /
    • 2012
  • BIRS is an intermediate representation for verifying Java program. Java program in the form of bytecode could be translated into BIRS code. Verification conditions are generated from the BIRS code to verify the program. We propose a method generating verification conditions for BIRS code. Generating verification conditions is composed of constructing control flow graph for BIRS code, depth first searching for the control flow graph to generate basic paths, and calculating weakest preconditions of the basic paths.

Evaluating of Traffic Flow Distributed Control Strategy on u-TSN(ubiquitous-Transportation Sensor Network) (V2I 통신을 이용한 교통류 분산제어 전략 수립 및 평가)

  • Kim, Won-Kyu;Lee, Min-Hee;Kang, Kyung-Won;Kim, Byung-Jong;Kang, Yeon-Su;Oh, Cheol;Kim, Song-Ju
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.3
    • /
    • pp.122-131
    • /
    • 2009
  • Ubiquitous-Transportation sensor network is able to realize a vehicle ad-hoc network. Since there are some problems in an existing ITS system, the new technology and traffic information strategies are requirements in this advanced system, u-TSN. The purposes of this paper is to introduce the components on u-TSN system, establish new traffic strategies for this system, and then evaluate these strategies by making a comparative study of ITS and using micro traffic simulator, AIMSUN. The strategy evaluated by AIMSUN is position-based multicast strategy which provides traffic information to vehicles using V2I (vehicle to Infrastructure) communication. This paper focuses on the providing real-time route guidance information when congestion is occurred by the incidents. This study estimates total travel time on each route by API modules. Result from simulation experiments suggests that position-based multicast strategy can achieve more optimal network performance and increased driver satisfaction since the total accumulated travel times of both the major road and the total system on position-based multicast strategy are less than those on VMS.

  • PDF

A Study on the Factors Affecting the Use and Satisfaction of Internet Ticketing Systems (인터넷 티켓팅 시스템의 사용과 만족에 영향을 미치는 요인)

  • Woo, Sung-Hwa;Kim, Kyung-Kyu;Chang, Hang-Bae;Shin, Ho-Kyoung
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.1-24
    • /
    • 2007
  • With the development of information technology (IT), various information systems (IS) such as Web-based systems and mobile systems have appeared utilizing different technologies. However, recent studies on IS use and user satisfaction rarely account for technological differences among IS and environmental characteristics where IS are intended to be used. The purpose of this research is to investigate the determinants of the use of Web-based ticketing systems for cultural activities and to empirically validate their relationships. Environmental psychology suggests that human beings respond to external stimuli from environments with their emotions, and their emotional states influence human actions, e.g., IS use in this research. Applying environmental psychology to the use of Web-based systems in the culture and entertainment industry, we propose that web site characteristics first influence a user's internal state of mind (i.e., flow) and then the flow state influences the IS use. Studies related to the state of flow collectively affirm the key role played by the flow construct in shaping individual attitudes and behaviors toward IS. Users' flow states are captured by their shopping enjoyment, perceived behavioral control, and the level of concentration on the IS use. Referring to social presence theory, we have included such web site characteristics as content quality, context of web site, and community quality. In our research model, a second order construct is utilized to represent web site quality, because flow theory suggests that holistic experiences with web-based systems (rather than individual characteristics of the web site) are important in explaining the IS use. Further, we have included trust as another important factor influencing the IS use since business transactions on the web encompass higher uncertainty comparing to offline transactions. In order to test our hypotheses, we have conducted an online survey which results in 1,141 valid responses in the final sample. The data were collected from respondents who have experiences in Internet ticketing systems. Although it was a convenient sample, the sample represents a wide variety of user demographics. Validity and reliability of the research instrument were tested and research hypotheses were examined using PLS Graph 3.0. The results indicate that web site characteristics significantly influence the level of user concentration, user's enjoyment in shopping, and perceived behavioral control. Further, the use of Internet ticketing systems is influenced by users' flow states and trust in the web channel. User satisfaction is turned out to be affected by the use of Internet ticketing systems. Unlike extant research on the relationship between web site characteristics and its use, our study has found that, in the culture and entertainment industry, the impact of web site characteristics on IS use is mediated by a user's flow state. This finding has a practical implication that web site design should include as many features that enhance shopping enjoyment and concentration. Other practical implications of these findings and future research implications are also discussed.

Polyinstantiation for spatial data for multilevel secure spatial database (다단계 보안 공간 데이터베이스를 위한 공간 다중인스턴스화)

  • 오영환;이재동;임기욱;배해영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.43-54
    • /
    • 2001
  • In this paper we study the use of polyinstantiation for spatial data, for the purpose of solving cover in topology channel in multilevel secure spatial database systems. Spatial database system with topological structure has a number of spatial analysis function using spatial data and neighbored one\`s each other. But. it has problems that information flow is occurred by topological relationship in spatial database systems. Geographic Information System(CIS) must be needed mandatory access control because there ,are many information flow through positioning information And topological relationship between spatial objects. Moreover, most GIS applications also graphe user interface(GUI). In addressing these problems, we design the MLS/SRDM(Multi Level Security/Spatial Relational Data Model) and propose polyinstantiation for spatial data for solving information flow that occurred by toplogical relationship of spatial data.

A Study on the Traffic Controller of ATM Call Level Based on On-line Learning (On-line 학습을 통한 ATM 호레벨 트래픽 제어 연구)

  • 서현승;백종일;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.115-118
    • /
    • 2000
  • In order to control the flow of traffics in ATM networks and optimize the usage of network resources, an efficient control mechanism is necessary to cope with congestion and prevent the degradation of network performance caused by congestion. To effectively control traffic in UNI(User Network Interface) stage, we proposed algorithm of integrated model using on-line teaming neural network for CAC(Call Admission Control) and UPC(Usage Parameter Control). Simulation results will show that the proposed adaptive algorithm uses of network resources efficiently and satisfies QoS for the various kinds of traffics.

  • PDF