• Title/Summary/Keyword: Internet Use Control

Search Result 706, Processing Time 0.024 seconds

A Study of Management Strategy for Session QoS System in Education and Research Network (교육 연구망에서 세션 QoS 시스템 관리 기법 연구)

  • Park, Seong-Ho;Lee, Hwa-Sei;Sohn, Keon-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.341-352
    • /
    • 2008
  • The dedicated line linked up with the internet maintains generally the efficiency of network by using Best Effort Model. But it is the problem that we allocate the higher bandwidth to services which request high bandwidth regardless of service types or purposes. To overcome this weak point, we use the Session QoS System which distinguish between business services such as E-mail, Web, etc. and non-business services. But, a recent session QoS system is not adequate to the environment similar to university, because that has many users who have various requests. In this paper, to satisfy various requirements of many user's in session QoS system which support services of research, education, business, etc., we analyze types of service in the environment of education and research network and propose a necessity of management strategies of session Qos system.

  • PDF

Analysis of IEEE 802.11n MAC and PHY Integration Method for High Throughput Performance based on NS-2 (고속 처리량을 위한 NS-2 기반 IEEE 802.11n MAC/PHY 연동 기법분석)

  • Kim, Joo-Seok;Lee, Yun-Ho;Song, Jae-Su;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.67-75
    • /
    • 2009
  • IEEE 802.11 WLAN(Wireless Local Area Network) standard is currently developing with increased wireless internet demand. Study trends of IEEE 802.11n for high throughput show two aspects, enhanced system throughput using aggregation among packets in MAC(Medium Access Control) layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PRY(Physical) layer. But, no one demonstrates IEEE 802.11n system performance results considering MAC and PRY connection. This paper adapts A-MPDU(Aggregation-MAC Protocol Data Unit) method in MAC layer and MIMO in PRY layer for IEEE 802.11n system. Consequently, Simulation results show enhanced throughput and data rates compared to existing system. Also, We use NS-2(Network Simulator-2) considering MAC and PRY connection for reality.

PLC-Based Smart grid Home Network System Design and Implementation using OPNET Simulation

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.1 no.2
    • /
    • pp.111-118
    • /
    • 2014
  • The Smart grid refers to the technology that enables efficient usage of electric power by collecting information concerning the power usage and power lines grafting information and communications technology to onto power grids. There are Zigbee, PLC or IEEE 802.11 WLAN MAC as a core technology of the Smart grid, but in this paper, the discussion is focused on the PLC. The PLC is the technology that carries out data communications using power lines and put into practical use in the field of lights or home appliances control recently but PLC-applied communications between electronic devices are rarely seen. For the reason that the PLC uses high-voltage power lines and has a disadvantage of experiencing higher data loss rate caused by the noises produced by going through transformers, the technology is yet to be used in many areas. Nevertheless, the PLC has been studied widely recently in respect that it's the low-cost communication solution for the Smart Metering [1]. Moreover, this technology is emerging as a novel data communication method and discussed as an important technology lately due to the developments of the Smart grid systems and Internet of things (IoT). Thus, in this paper, the results obtained from designing and performing implementation scenario for the PLC-based Smart grid home network system were compared and analyzed with that of IEEE 802.11 WLAN MAC (the foundation technology at Jeju Smart grid Test bed)-based Smart grid home network. Thus, in this paper, OPNET 14.5 PL8, OSI 7 layer, PLC router nodes and PLC nodes had been used for the designing and implementation simulations of both systems. Additionally, QoS was not considered in order to guarantee that all the traffics would not have the same processing priority.

  • PDF

A study of improve vectorising technique on the internet (인터넷에서의 개선된 벡터라이징 기법에 관한 연구)

  • 김용호;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.271-281
    • /
    • 2002
  • Currently, most web designers guarante high quality using bitmap graphics as fixed font size, but that has defects about file size and flexibility. Especially, to provide high quality of banner and advertise characters, after you should use a bitmap edit program, and then we should follow the method we add that program to HTML documents as bitmap data. In this study, as I show a couple of new tags in front of HTML documents, I show methods which can be presented diverse effects. When text information are stored, because we print out a screen with simple control points and outside information, it can be possible for us to express the same quality of Hangul characters like printed documents in a web browser. Regardless of the second class of platform, we can make it possible the character expression with exact character expressions and diverse effects.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

Geographic Disparities in Prostate Cancer Outcomes - Review of International Patterns

  • Baade, Peter D.;Yu, Xue Qin;Smith, David P.;Dunn, Jeff;Chambers, Suzanne K.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.3
    • /
    • pp.1259-1275
    • /
    • 2015
  • Background: This study reviewed the published evidence as to how prostate cancer outcomes vary across geographical remoteness and area level disadvantage. Materials and Methods: A review of the literature published from January 1998 to January 2014 was undertaken: Medline and CINAHL databases were searched in February to May 2014. The search terms included terms of 'Prostate cancer' and 'prostatic neoplasms' coupled with 'rural health', 'urban health', 'geographic inequalities', 'spatial', 'socioeconomic', 'disadvantage', 'health literacy' or 'health service accessibility'. Outcome specific terms were 'incidence', 'mortality', 'prevalence', 'survival', 'disease progression', 'PSA testing' or 'PSA screening', 'treatment', 'treatment complications' and 'recurrence'. A further search through internet search engines was conducted to identify any additional relevant published reports. Results: 91 papers were included in the review. While patterns were sometimes contrasting, the predominate patterns were for PSA testing to be more common in urban (5 studies out of 6) and affluent areas (2 of 2), higher prostate cancer incidence in urban (12 of 22) and affluent (18 of 20), greater risk of advanced stage prostate cancer in rural (7 of 11) and disadvantaged (8 of 9), higher survival in urban (8 of 13) and affluent (16 of 18), greater access or use of definitive treatment services in urban (6 of 9) and affluent (7 of 7), and higher prostate mortality in rural (10 of 20) and disadvantaged (8 of 16) areas. Conclusions: Future studies may need to utilise a mixed methods approach, in which the quantifiable attributes of the individuals living within areas are measured along with the characteristics of the areas themselves, but importantly include a qualitative examination of the lived experience of people within those areas. These studies should be conducted across a range of international countries using consistent measures and incorporate dialogue between clinicians, epidemiologists, policy advocates and disease control specialists.

A Study on Difference in Tendency of Undergraduates with Reliance on Factors of Online Game Addiction (온라인 게임 중독 요인에 따른 대학생들의 경향 차이 연구)

  • Jeon, Mi-Yeon;Kim, Eui-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1228-1233
    • /
    • 2009
  • The purpose of this study is to suggest a countermeasure against a major cause that leads to game addiction, by grasping tendency of the actual condition for the online game use in freshmen for university and by analyzing relationship of game addiction according to factors. As a result of analyzing on relationship among sub-variables for game addiction, it could be known that the more men in gender leads to the more serious game addiction and that the longer game time given using once leads to the higher level in control loss and game addiction. Also, it was indicated that the more in group with high risk leads to the more serious in physical and mental problem. There is a suggestion that a scale related to game is developed for the expansion in counseling institution nationwide and for the preventive education targeting all the ages including undergraduates and adults as well as small children and children.

Relay of Remote Control Signal for Spacecraft in Deep Space via FHLH (FHLH를 매개로 한 심우주 우주선 원격 제어 신호 중계)

  • Koo, Cheol Hea;Kim, Hyungshin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.4
    • /
    • pp.295-301
    • /
    • 2020
  • When a spacecraft in deep space falls into an abnormal state, an emergency communication channel between ground and the spacecraft is essential in order to perform analysis to the cause of the anomaly, and to remedy the spacecraft from the distressed state. Because the recovery actions generally comprises of long and complicated sequences of commands, the transmission of the recovery commands may require a reliable and a delay tolerant networking technology based on bundle routing. While the delay tolerant networking protocol becomes a prominent method interfacing ground and space into a internet-like Solar system network because it can address the issues of the severe communication problems in deep space, the communication system on the spacecraft which based on space packet protocol cannot use the delay tolerant networking technology directly. So a community of the consultative committee for space data systems starts a discussion of the first-hop last-hop mechanism to establish a feasible concept and standardization. This paper presents an enhanced concept of the first-hop last-hop by applying it a virtual cislunar communication environment, and we believe this contributes to make a way applicable to an interoperable relay concept of the first hop last hop between the delay tolerant networking and space packet protocol standard.

Resource Allocation Based on Location Information in D2D Cellular Networks (D2D 셀룰러 네트워크에서 위치기반 자원할당)

  • Kang, Soo-Hyeong;Seo, Bang-Won;Kim, Jeong-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.750-757
    • /
    • 2017
  • Recently, mobile internet traffic has rapidly increased as the huge increase of the smart phone and mobile devices. D2D get attention, because D2D is known that it reduce the traffic load of the base station and also improves the reliability of the network performance. However, D2D has a problem that the efficiency decreases as interference is increased. In this paper, we propose a resource allocation scheme to use the resources efficiently when the D2D link share the cellular resources in the cellular network based the uplink. D2D communication utilizes the location information for allocating resources when the eNB know the location of all devices. The proposed scheme select some cellular user using location informations in order to ensure performance of the D2D communication. and D2D link choose cellular user that performs resource allocation using only selected cellular user. Simulation results show optimal value of resource selection in order to ensure most performance of the D2D communication.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.