• Title/Summary/Keyword: MULTICAST

Search Result 1,185, Processing Time 0.03 seconds

Design of a Three Dimensional Audio System for Multicast Conferencing (멀티캐스트 화상회의를 위한 3-D 음향시스템 설계)

  • 김영오;고대식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.71-76
    • /
    • 2000
  • On multimedia teleconferencing system existing a number of participants, face of the participants can beperceived by visual image. However, differentiation of each participant's voice and spaciousness sense are very hard since voice of all participants is processed with one dimensional data. In this paper, we implemented three dimensional audio rendering system using the HRTF(Head Related Transfer Function) and distance sense reproduction method and determined the optimal location of the participants for teleconferencing system. In the results of the listening test using elevation and azimuth angle, we showed that directional perception of the azimuth angles were better than that of the elevation angles. Specially, we showed that participant location using the HRTFS of the azimuth angle 10" , 90" , 270" and350" was efficient in teleconferencing system existing four participants. We also proposed that distance cue was used for enhancement of the reality and location of many participants more than five.ipants more than five.

  • PDF

P2Prefix : Efficient Broadcasting Streaming Scheme Based on P2P Caching (P2Prefix : P2P 캐싱 기반의 효율적인 브로드캐스트 스트리밍 기법)

  • Lee, Chi-Hun;Choi, Young;Choi, Hwang-Kyu
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.77-87
    • /
    • 2007
  • A typical VOD service allows that a number of remote clients playback a desired video from a large collection of videos stored in one or more video servers. The main bottleneck for a VOD service is the network bandwidth connecting to the VOD server to the client due to the high bandwidth requirements. Many previous researches have shown that VOD server can be greatly improved through the use of multicast, broadcast, or P2P scheme. Broadcast is one of the most efficient techniques because it can transmit a stream to many users without additional network bandwidth. But the broadcast has long latency time. In order to overcome the drawback, in this paper, we propose P2Prefix broadcast scheme that can solve the service latency time, which is the problem of broadcast scheme, by using P2P caching as well as minimizing the client buffer requirement.

  • PDF

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

A Study on Rate-Based Congestion Control Using EWMA for Multicast Services in IP Based Networks (IP 기반 통신망의 멀티캐스팅 서비스를 위한 지수이동 가중평판을 이용한 전송률기반 폭주제어에 관한 연구)

  • Choi, Jae-Ha;Lee, Seng-Hyup;Chu, Hyung-Suk;An, Chong-Koo;Shin, Soung-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.39-43
    • /
    • 2007
  • In high speed communication networks, the determination of a transmission rate is critical for the stability of a closed-loop network system with the congestion control scheme. In ATM networks, the available bit rate (ABR) service is based on a feedback mechanism, i.e., the network status is transferred to the ABR source by a resource management (RM) cell. RM cells contain the traffic information of the downstream nodes for the traffic rate control. However, the traffic status of the downstream nodes can not be directly transferred to the source node in the IP based networks. In this paper, a new rate-based congestion control scheme using an exponential weighted moving average algorithm is proposed to build an efficient feedback control law for congestion avoidance in high speed communication networks. The proposed congestion control scheme assures the stability of switch buffers and higher link utilization of the network. Moreover, we note that the proposed congestion scheme can flexibly work along with the increasing number of input sources in the network, which results in an improved scalability.

  • PDF

Reducing Transmit Power and Extending Network Lifetime via User Cooperation in the Next Generation Wireless Multihop Networks

  • Catovic, Amer;Tekinay, Sirin;Otsu, Toru
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.351-362
    • /
    • 2002
  • In this paper, we introduce a new approach to the minimum energy routing (MER) for next generation (NG) multihop wireless networks. We remove the widely used assumption of deterministic, distance-based channel model is removed, and analyze the potentials of MER within the context of the realistic channel model, accounting for shadowing and fading. Rather than adopting the conventional unrealistic assumption of perfect power control in a distributed multihop environment, we propose to exploit inherent spatial diversity of mobile terminals (MT) in NG multihop networks and to combat fading using transmit diversity. We propose the cooperation among MTs, whereby couples of MTs cooperate with each other in order to transmit the signal using two MTs as two transmit antennas. We provide the analytical framework for the performance analysis of this scheme in terms of the feasibility and achievable transmit power reduction. Our simulation result indicate that significant gains can be achieved in terms of the reduction of total transmit power and extension of network lifetime. These gains are in the range of 20-100% for the total transmit power, and 25-90% for the network lifetime, depending on the desired error probability. We show that our analytical results provide excellent match with our simulation results. The messaging load generated by our scheme is moderate, and can be further optimized. Our approach opens the way to a new family of channel-aware routing schemes for multihopNG wireless networks in fading channels. It is particularly suitable for delivering multicast/ geocast services in these networks.

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Dsign of Virtual Manufacturing Device for MMS Operations in MAP Network (MAP네트웨크에서 MMS운영을 위한 가상 제조 기기의 설계)

  • Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.397-405
    • /
    • 1995
  • In order to operate the automatic devices of manufacturing process more efficiently and to solve the needs of the resource sharing,network technology is applied to the unit control devices located in common manufacturing zone and operated by connecting them.In this paper,functional standard of the network operation layer is set as MAP standard application layer of MMS(manufacturing message standard)for the cell or group,which is suggested by CIM (computer integrated manufacturing) standardization as common manufacturing zone.MMS is composed of abstract message which is not consider specific devices.Then,specific message standard must be defined to operate MMS.It is designed as VMD (virtual manufacturing device)objects which are abstract objects to perform group management based on the companion standard.Also they are operated in the group management model system.Group management operation takes multicast communication method which is the communication from single source to the multiple sinks, and the group management system and unit control devices are performed as VMD and real device mapping.

  • PDF

Performance evaluation of fully-interconnected ATM switch (part II: for bursty traffic andnonuniform distribution) (완전 결합형 ATM 스위치의 성능분석 (II부 : 버스티 트래픽 및 비균일 분포에 대하여))

  • 전용희;박정숙;정태수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.1926-1940
    • /
    • 1998
  • This paper is the part II of research results on the performance evaluation of fully interconnected ATM switch, and includes the performance evaluation results for bursty traffic and nonuniform distribution. The switch model is a fyully interconnected switch type proposed by ETRI and is the proper architecutre for a small-sized switch element. The proposed switch consists of two steps of buffering scheme in the switch fabric in order to effectively absorb the effect of bursty nature of ATM traffic. The switch uses bit addressing method for addressing shcmeme and thus it is easy to implement multicasting function without adding additional functional block. In order to incorporate the bursty nature of traffic in ATM networks, we use IBP(Interrupted Bernoulli Process) model as an input traffic model as well as random traffic model which has been used as a traditional traffic model. In order to design the various scenarios for simulation, we considered both uniform and nonuniform output distribution, and also implemented multicast function. In this paper, we presented the simulation results in diverse environments and evaluated the performance of the switch.

  • PDF

Transmission Performance Analysis of VCCN with SUMO depending on Packet Size and Participating Number of Clients (SUMO를 이용한 VCCN에서 패킷의 크기와 참여한 클라이언트 수에 따른 전송 성능에 대한 연구)

  • Yeon, Seunguk;Chae, Ye-Eun;Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.285-290
    • /
    • 2018
  • Vehicular ad hoc network (VANET) is one of the future communication technologies in which it offers safe-driving information and Internet access for both drivers and passengers by communicating among cars on the road. In case of applying Content Centric Network (CCN) rather than TCP/IP over VANET, called VCCN, it can provide efficient multicast communication of shared information among participating cars as well as offer corresponding one-to-one communications. This paper introduces SUMO for simulating traffic flows, VANET for car-to-car ad hoc communications, and CCN for a future Internet architecture. In addition, it compares and analyses the transmission performance of moving cars over VCCN. According to the simulation results using SUMO and VCCN, the larger the packet size, the better the transmission performance. In addition, VCCN provides higher packet transmission rate than that of TCP/IP when the clients shares the same contents. Furthermore, the overall data reception rate exceeds the physical transmission channel rate.