• Title/Summary/Keyword: LAN topology

Search Result 40, Processing Time 0.026 seconds

Topology-aware Chord system for efficient lookup (효율적인 탐색을 위한 위상 인지 Chord 시스템)

  • Kim, Jun-Hong;Jo, In-June;Kim, Seung-Hae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.89-92
    • /
    • 2005
  • Centralized P2P system, Napster and Unstructured P2P system, Gnutella accomplish main current. Centralized system and unstructured system have a restriction in a scalability. To solve the this problem, structured system is appeared. CAN, Chord, Pastry and Tapestry are delegation of this system. Although structured system don't aware physical proximity of node because it uses Distribute Hash Table. In proposing system, a node can communicate with physical proximity of node using concept of LAN. Internet traffic is also decreased because communication in the Chord network divide in two(original network and sub network).

  • PDF

Logical Link-Based Multicasting Services in Ethernet Passive Optical Networks (이더넷 수동형 광가입자망에서 논리적 링크 기반의 멀티캐스팅 서비스)

  • Choi Su-il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.722-729
    • /
    • 2005
  • Ethernet passive optical networks (EPONs) are an emerging access network technology which has a point-to-multipoint topology. EPONs operate point-to-multipoint in the OLT-ONU direction, and point-to-point in the ONU-OLT direction. To support point-to-point emulation and shared LAM emulation, EPONs use multi-point control protocol (MPCP). The MPCP uses logical link identification (LLID) field for frame tagging and filtering between the OLT and ONUs. In this paper, I propose logical-group identification (LGID) for logical link-based multicasting or VLAN services in EPONs. Using LGID with new frame tagging and filtering rules, EPONs support differentiated multimedia broadcasting or multicasting services. Additionally, EPONs can support logical link-based VLAN services that divides ONUs into several subsets.

A Compact LTCC Dual-Band WLAN Filter using Two Notch Resonators

  • Park, Jun-Hwan;Cheon, Seong-Jong;Park, Jae-Yeong
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.168-175
    • /
    • 2013
  • This paper presents compact dual-band WLAN filter and filter module. They were developed by embedding all of the passive lumped elements into a LTCC substrate. In order to reduce the size/volume of the filter and avoid EM parasitic couplings between the passive elements, the proposed filter was designed using a 3rd order Chebyshev circuit topology and J-inverter transformation technology. The 3rd order Chebyshev bandpass filter was firstly designed for the band-selection of the 802.11b and was then transformed using finite transmission zeros technologies. Finally, the dual-band filter was realized by adding two notch resonators to the 802.11b filter circuit for the band-selection of the 802.11a/g. The maximum insertion losses in the lower and higher passbands were better than 2.0 and 1.3 dB with minimum return losses of 15 and 14 dB, respectively. Furthermore, the filter was integrated with a diplexer to clearly split the signals between 2 and 5 GHz. The maximum insertion and minimum return losses of the fabricated module were 2.2 and 14 dB at 2.4 - 2.5 GHz, and 1.6 and 19 dB at 5.15 - 5.85 GHz, respectively. The overall volume of the fabricated filter was $2.7{\times}2.3{\times}0.59mm^3$.

A Performance Analysis of Random Linear Network Coding in Wireless Networks (무선 환경의 네트워크에서 랜덤 선형 네트워크 코딩 적용 성능 분석)

  • Lee, Kyu-Hwan;Kim, Jae-Hyun;Cho, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10A
    • /
    • pp.830-838
    • /
    • 2011
  • Recently, studies for the network coding in the wireless network to achieve improvement of the network capacity are conducted. In this paper, we analysis considerations to apply RLNC in the wireless network. First of all, we verify whether the RLNC method in multicast is applied to distributed wireless network. In simulation results, the decoding failure can occur in the original manner of multicast. In RLNC which conducts encoding and decoding in X topology to gets rid of the decoding failure, the RLNC gain is insignificant. In this paper we also discuss considerations such as the hidden node problem, the occurrence of coding opportunity, and the RLNC overhead which are practical issues in the wireless network.

Leader Decision Protocol for Dynamic Changing Topology in Mobile Ad hoc Networks (모바일 ad hoc 네트워크에서 동적인 토폴로지 변화에 따른 리더 결정)

  • Kim, Young-Lan;Han, Hyun-Goo;Park, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4543-4552
    • /
    • 2010
  • A leader is a special process who roles as the coordinator within multiple processes of a group. In a distributed system, leader election is the procedure of electing a coordinator. This is a very important issue for building fault-tolerant distributed systems. When two normal mobile ad hoc networks are merged, there are two leaders. This violates the safety property, so a mechanism to detect and handle are required. In mobile ad hoc distributed computing system, we propose a leader competition protocol and to prove the temporal logic to it. This solution is based on the group membership detection algorithm.

A Study on Interconnectioned LAN of Token Ring Network (토큰링 네트워크가 상호 연결된 근거리 통신망에 관한 연구)

  • 이상훈;김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1206-1218
    • /
    • 1992
  • Token ring systems which control to switch the data stream of networks by passing the token have been widely used to medium access controls in many ring or bus topology LANs. The system could be modeled for analysis as single-server-multi-queue system of the cyclic service method. These concepts could be expanded to multi-token ring systems interconnected with single ring consisting of bridges implemented simply to be stored and transmitted. In the proposal for the performance analysis of the interconnected token ring system, in has been assumed M/G/1 queueing model that frame arrivals are the Poisson process at each station queue and frame sizes are independently and identically distributed. And the average time delays were analyzed mathematically for arbitrary frame transferred from source station to destination area. The time delay of the frame transmission could be explained as the sum of the average time which the token passed from arbitrary position to source station, such as the waiting time in the source station transferring the previous arrival frames, and the propagation time from source station to interdestinated point. These delays were given as the sum of the duration from inner and outer bridge queues, the time delays from inner and outer bridge queues, and the time from outer bridge queue to destination station. These results were investigated by varing parameters effected to total time delays. In the results, those factors to be effected to dominant the total time delays were increased were in the cases of the high arrival rates and the high ration of destination of the other outerring. The system were shown the time delays increased exponentially in spite of the priority service policy. In order to decreasing the number of outerrings and increasing the number of nodes in backbone relatively, so the systems could be decreased the total delay in the interconnected token ring system.

  • PDF

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

Design and Evaluation of a Distributed Mutual Exclusion Algorithmfor Hypercube Multicomputers (하이퍼큐브 멀티컴퓨터를 위한 분산 상호배제 알고리즘의 설계 및 평가)

  • Ha, Sook-Jeong;Bae, Ihn-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2221-2234
    • /
    • 1997
  • Distributed mutual exclusion algorithms have employed two approaches to achieve mutual exclusion and can be divided into two broad classes:token-based and permission-based. Token-based algorithms share a unique token among the nodes and a node is allowed to access its common resources if it possesses the token. Permission-based algorithms require one or more successive rounds of message exchanges among the nodes to obtain the permission to access the common resources. A hypercube architecture has earned wide acceptance in multiprocessor systems in the past few years because of its simple, yet rich topology. Accordingly, we study distributed permission-based mutual exclusion algorithms for hypercubes, and design a distributed permission-based mutual exclusion algorithm based on a new information structure adapted to the hypercubes. The new information structure is a request set of T-pattern from a logical mesh that is embedded into a hypercube. If a node wants to access the common resources, it sends request message to all nodes in the request set by Lan's multicast algorithm. Once the node receives a grant message from all nodes in the request set, it accesses the common resource. We evaluate our algorithm with respect to minimum round-trip delay, blocking delay, and the number of messages per access to the common resource.

  • PDF

Performance Analysis of the IEEE 802.11 Broadcast Scheme in a Wireless Data Network (무선 데이터 망에서 IEEE 802.11 브로드캐스트 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.56-63
    • /
    • 2009
  • The IEEE 802.11 standard has been used for wireless data networks such as wireless LAN, ad-hoc network, and vehicular ad-hoc network. Thus, the performance analysis of the IEEE 802.11 specification has been one of the hottest issues for network optimization and resource management. Most of the analysis studies were performed in a data plane of the IEEE 802.11 unicast. However, IEEE 802.11 broadcast is widely used for topology management, path management, and data dissemination. Thus, it is important to understand the performance of the broadcast scheme for the design of efficient wireless data network. In this contort, we analyze the IEEE 802.11 broadcast scheme in terms of the broadcast frame reception probability according to the distance from a sending node. Unlike the other works, our analysis framework includes not only the system parameters of the IEEE 802.11 specification such as transmission range, data rate, minimum contention window but also the networking environments such as the number of nodes, network load, and the radio propagation environments. Therefore, our analysis framework is expected to be used for the development of protocols and algorithms in a dynamic wireless data network.

Performance Analysis of Routing Protocols for WLAN Mesh Networks (WLAN Mesh 망을 위한 라우팅 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.417-424
    • /
    • 2007
  • Mesh networks using WLAN technology have been paid attention as a key wireless access technology. However, many technical issues still exist for its successful deployment. One of those issues is the routing problem that addresses the path setup through a WLAN mesh network for the data exchanges between a station and a wired network. Since the characteristics of a WLAN mesh network can be very dynamic, the use of single routing protocol would not fit for all environments whether it is reactive or proactive. Therefore, it is required to develop an adaptive routing protocol that modifies itself according to the changes in the network parameters. As a logical first step for the development, an analytical model considering all the dynamic features of a WLAN mesh network is required to evaluate the performance of a reactive and a proactive routing scheme. In this paper, we propose an analytical model that makes us scrutinize the impact of the network and station parameters on the performance of each routing protocol. Our model includes the size of a mesh network, the density of stations, mobility of stations. and the duration of network topology change. We applied our model to the AODV that is a representative reactive routing protocol and DSDV that is a representative proactive routing protocol to analyze the tradeoff between AODV and DSDV in dynamic network environments. Our model is expected to help developing an adaptive routing protocol for a WLAN mesh network.