• Title/Summary/Keyword: Mobile host

Search Result 377, Processing Time 0.022 seconds

Performance Improvement Methods of Multicast using FEC and Local Recovery based on Sever in Mobile Host (이동 호스트에서 FEC와 서버기반 지역복구를 이용한 멀티캐스트 성능 향상 방안)

  • Kim, Hoe-Ok;Yang, Hwan-Seok;Lee, Ung-Gi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.589-596
    • /
    • 2002
  • Tn the data transmission service of the mobile host, it is needed to reduce the bandwidth and to make a reliable error recovery. there are two appropriate methods in that. One is FEC which retransmits the parity of error recovery, in case of happening of the loss after forming the parity of error recovery by grouping original data. The other is local recovery based on server which can block the implosion of transmission. The use of FEC and local recovery based on server at the same time enables the reliable multicast. This paper suggests algorithm that recovers the loss by FEC and local recovery based on server through the solution of the problems about triangle routing, tunnel convergence by dividing mobile host into two parts-the sender and the receiver. This model about the loss of algorithm tested the efficiency of performance by the homogeneous independent loss, the heterogeneous independent loss, the shared source link loss model. The suggested algorithm confirms effectiveness in the environment where there are much data and many receivers in mobile host.

Performance analysis of Mobile Hosts based on On-Demand Ad-Hoc Networks (On-Demand Ad-Hoc망에서의 이동 호스트의 성능분석)

  • 하윤식;송창안;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.213-217
    • /
    • 2003
  • An Ad-Hoc networks is a set of wireless mobile host which forms temporary networks without any concentrated controls or any helps of standard support services. Mobile host' routers are operated by their mobile hosts without fixed routers, therefore, the original routing protocol algorithm are not effective. There are two major Protocols in Ad-Hoc Network. A Table-Driven algorithm and an On-Demand, but the latter is presented more effective. We try to compare and analyze the performances of each protocol's host in this thesis.

  • PDF

A Handoff Improvement Method of High Speed Mobile Host to use LiFA (LIFA를 이용한 고속 이동체의 핸드오프 개선 방안)

  • 김동근;정상운;김상복;김용수
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.1
    • /
    • pp.105-113
    • /
    • 2003
  • In CDMA cellular system, inefficient Channel assignment for high-speed mobile host increase call blocking probability For it has been method proposed to guarantee QoS upon tn the speed of hierarchical cell that is allocated Queues and dedicated channels of high speed mobile host's speed. In this paper, We allocated the dedicated channel of high-speed handoff In FA (Foreign Agent), only if the receive signal strength of mobile host in current cell that there is low traffic in HA (Home Agent). also, we created new Circular queue LiFA (Limited Foreign Agent) for high-speed handoff call that signal strength is weak in certain FA, and had this High-speed handoff call to be ready for Life time to the new Circular queue LiFA. Thus improve the rate of the forced call termination.

  • PDF

Secure Execution Assurance Mechanism of Mobile Agent from Truncation Attack in Free-Roaming Environments (Free-Roaming 실행 환경에서 절단공격으로부터 이동에이전트의 안전한 실행 보장 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.97-108
    • /
    • 2010
  • The data security of free-roaming mobile agent is a problem which hasn't been resolved to the mobility and inter-host mapping. totally, especially in theaspect of keeping away truncation attacks. Therefore, when the agent is utilized for user oriented applied technique, the secure execution guarantee of agent is essential. In this paper, it guarantees safe execution from security threats generated by malicious host during the agent's execution. And the secure execution guarantee mechanism of agent is proposed from favorable host is maliciously abused by attacker. Thus, the execution trace protocol mechanism proposed as secure mobile agents execution guarantee. As security analysis of the safety analysis.

Multicast Routing and Cost Model with Source Mobility in Mobile IPv6 Networks (Mobile IPv6망에서 소스 이동성을 갖는 멀티캐스트 라우팅 및 비용모델)

  • Park Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.197-203
    • /
    • 2004
  • In mobile network, the maintenance o( host grouping or the multicast delivery tree for multicasting algorithm becomes a major issues. In this paper, we explore the issues of mobile Multicast scheme using Mobile-IPv6, and addresses case when a mobile host is a source as well as a recipient of a given multicast operation using MLD(Multicast Listener Discovery) scheme, and the proposed MLD-based multicasting protocol asks its HA(Home Agent) to stop forwarding multicast for group using tunneling. We examine and compare our model to existing approaches by proposed cost model, and observe an improved ferformacne.

  • PDF

Design and Evaluation of an Efficient Seamless Communication Technique for Mobile Wireless Networks (이동 무선망을 위한 효율적인 무단절 통신 기법의 설계 및 평가)

  • 배인한;김윤정
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.3
    • /
    • pp.280-289
    • /
    • 2000
  • This paper presents an efficient method to provide seamless communication in mobile wireless networks. The goal of seamless communication is to provide disruption free service to a mobile user. A disruption in service could occur due to active handoffs. There are many user applications that do not require a total guarantee for disruption free service but would also not tolerate very frequent disruptions. This paper proposes an extended staggered multicast that provides a probabilistic guarantee for disruption free service. The proposed multicast forecasts the direction and velocity for a mobile host. It is possible that data packets for a mobile host are multicasted to not all neighbor cells but a par\ulcorner of neighbor cells those the mobile host will be handoff potentially on the basis of these information. Therefore, the extended staggered multicast significantly reduces the static network bandwidth usage also provides a probabilistic guarantee for disruption free service.

  • PDF

A Method for Maintaining Mobile Transaction Serializability using Lock Operation and Serialization Graph in Mobile Computing Environments (이동 컴퓨팅 환경에서 록 연산과 직렬화 그래프를 이용한 이동 트랜잭션의 직렬성 유지 방법)

  • Kim, Dae-In;Hwang, Bu-Hyeon;Hwang, Bu-Hyeon
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.9
    • /
    • pp.1073-1084
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 이동 호스트는 제한된 대역폭을 효율적으로 사용하고 이동 트랜잭션의 응답 시간을 향상시키기 위하여 캐쉬를 이용한다. 그리고 이동 호스트에 캐슁된 데이타가 이동 지구국에서 갱신되면 이동 호스트의 캐쉬 일관성을 유지하기 위하여 이동 지구국은 무효화 메시지를 방송한다. 그러나 이동 지구국에서 주기적으로 무효화 메시지를 방송하는 방법은 이동 트랜잭션의 빠른 처리를 위하여 이동 지구국으로부터 데이타를 즉시 캐슁하는 경우에 이동 트랜잭션의 직렬가능한 수행을 보장할 수 없는 경우가 발생한다. 본 연구에서는 캐슁된 데이타를 이용하여 이동 트랜잭션을 수행하는 경우에 록을 이용하여 이동 트랜잭션의 직렬가능한 수행을 보장하는 UCL-MT 방법과 록 관리 방법을 제안한다. 제안하는 UCL-MT 방법은 이동 트랜잭션을 완료하기 이전에 이동 트랜잭션이 접근한 데이타 정보를 이용하여 지구국에서 사이클을 탐지함으로써 이동 트랜잭션의 직렬가능한 수행을 보장한다. 또한 제안하는 록 관리 방법은 이용할 수 있는 대역폭의 크기에 따른 무효화 메시지 내용의 변화에 유연하게 적용될 수 있다. Abstract In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time of a mobile transaction. If the cached data in mobile host is updated at a mobile support station, the mobile support station broadcasts an invalidation message for maintaining the cache consistency of a mobile host. But when a mobile transaction accesses the data which is not in cache, if a mobile host caches the data immediately from a mobile support station for processing a mobile transaction rapidly, the method that a mobile support station broadcasts an invalidation message periodically, happens to the case that can not guarantee the serializable execution of a mobile transaction. In this paper, we propose the UCL-MT method and lock management method, as a mobile transaction is executed using cached data. Since, using the data a mobile transaction accessed, the UCL-MT method detects a cycle in a mobile support station before the completion of the mobile transaction, it guarantees the serializable execution of the mobile transaction. Also, proposing lock management method can be adapted flexibly at the change of invalidation message content, according to the available bandwidth.

Performance Comparison of Message Log Methods for Stable Recovery of Mobile Host (모바일 호스트의 안정적인 복구를 위한 메시지 로그 기법들의 성능비교)

  • Choi, Ga-Hyun;Hwang, Byung-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.27-30
    • /
    • 2004
  • 모바일 컴퓨팅 환경은 네트워크가 손상되기 쉬우며, MH(Mobile Host)를 지원하는 MSS(Mobile Support Station)가 안정적이지 못하기 때문에, 이런 상황을 고려하여 시스템 환경을 모델링 한다. 메시지 전송 시 에러가 발생했을 경우 복구 기법으로 체크포인팅 기법과 메시지 로깅 기법을 추가적으로 사용하게 된다. 본 논문에서는 움직임을 기반으로 한 모바일 시스템 환경에서 체크포인트와 함께 메시지 로그를 사용하는 기법의 성능을 비교하고자 한다.

  • PDF

A Strategy to maintain Cache Consistency in Mobile Computing Environments using the Asynchronous Broadcasting (비동기적 방송을 사용하는 이동 컴퓨팅 환경에서 캐쉬 일관성 유지 정책)

  • Kim, Dae-Ong;Park, Seong-Bae;Hwang, Bu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2763-2775
    • /
    • 1998
  • In mobile computing environments, to efficiently use the narrow bandwidth of wireless networks a mobile host caches the data that are frequently accessed. But, because the cached data can be inconsistent with the data n a server due to the host mobility and the disconnection from a server, the usefullness of cached data may be losted. The traditional methods emphasize on the cache consistency and assume that broadcasting times are synchronized at all mobile supprot stations. In this paper, we propose a strategy to maintain cache consistency, which resolves the problems that be caused by the migration of mobile host. The proposed strategy has asynchronous broadcasting time and reduces the communication overhead caused by the synchronization. Also, by preventing the unnecessary messages transmitting from the mobile support station to a mobile host, this strategy can reduce the communication cost and use the narrow bandwidth of wireless networks efficiently.

  • PDF

Stable Recovery Strategy According to Mobility of Mobile Host (모바일 호스트의 이동성에 따른 안정적인 복구 기법)

  • Choi Ca-Hyun;Hwang Byung-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.953-960
    • /
    • 2005
  • The Network can be easily damaged in the mobile computing environment. Mobile Support Station (MSS) which supports the Mobile Host(MH) could also be unstable too. Therefore, when a critical error occurs the repairing cost can be high. For stable repair, the hand-off strategy should be considered to save the continuing message and checkpoint information, and to reduce the cost of network repair. In this paper, we propose the Switching Trickle(ST) strategy which reduces the repairing cost for the MH's mobility. ST strategy changes the way which stores the information in connection with the number of write events(r) that occur from the hands-off strategy. Accumulated cost by increased mobility has been simulated too. From the results of simulation, the proposed strategy has shown more cost effective than the conventional strategy. The proposed strategy also has shown very supportive in saving checkpoint and message log information stably.

  • PDF