• Title/Summary/Keyword: Multicast Group

Search Result 321, Processing Time 0.036 seconds

An Efficient Host Mobility Supporting in Hierarchical Multicast Route Reconstructions (계층적 멀티캐스트 경로 재설정을 이용한 효율적 호스트 이동성 지원)

  • Kim, Sun-Jib;Song, Se-Bong;Cho, Min-Woong;Shin, Yong-Tae
    • Annual Conference of KIPS
    • /
    • 2000.10b
    • /
    • pp.997-1000
    • /
    • 2000
  • 무선 인터넷 서비스에 대한 요구가 무선기술의 발전과 더불어 증가되고 있다. 하지만 현재의 인터넷 프로토콜인 IPv4에서는 IP의 이동 환경을 지원하지 못한다. 이에 여러 연구가 진행되고 있으며, IETF의 Mobile IP Working Group에서는 기존의 IPv4를 사용하면서도 이동환경을 지원하기 위한 이동 IP에 대한 연구를 진행하고 있다. 이에 본 논문에서는 인터넷에서 계층적이며 효율적인 이동성 지원을 위하여 영역과 도메인, 인터 도메인으로 세분화된 환경에서의 이동성 지원을 위한 기법을 제안한다. 본 논문에서는 하나의 이동 호스트가 특정 멀티캐스트 주소로 인식되어 멀티캐스트 라우팅 프로토콜에 의한 데이터 전송 서비스를 받는다. 이에 지속적인 이동성을 가진 이동 호스트에게 절단점 없는 서비스를 제공하기 위하여 동적 멀티캐스트 경로를 재설정 함으로서 경로 설정에 의한 오버헤드와 데이터전송의 지연을 최소화한다. 이러한 방법은 영역과 도메인, 인터 도메인의 계층적인 이동성을 지원함으로서 핸드오프 지연을 감소시키며. 홈 에이전트와 대응 노드에 부가되는 부하를 줄 일 수 있다.

  • PDF

The Design of Seamless Handoff Algorithm based on Multicast Group Mechanism for Micro Mobility (Micro Mobility 지원을 위한 멀티캐스트 그룹 메커니즘 Seamless 핸드오프 알고리즘 설계)

  • Shin, Dong-Jin;Choi, Sang-Ho;Lim, Sun-Bae;Oh, Jae-Yoon;Song, Byung-Kwon;Jeong, Tae-Eui
    • Annual Conference of KIPS
    • /
    • 2001.04a
    • /
    • pp.523-526
    • /
    • 2001
  • 3GPP2 방식에서는 Macro Mobility 지원을 위하여 MIP를 이용하며 PDSN은 FA의 기능을 수행한다. 이때 하나의 PDSN에서 다른 PDSN으로 MS가 이동할 경우 지원되는 이동성을 Macro Mobility라 하며, POSN 관리 영역 내의 하나의 RN에서 다른 RN으로 이동시에 지원되는 이동성을 Micro Mobility라 한다. 본 논문은 Micro Mobility를 지원하기 위한 멀티캐스트 그룹 메커니즘 기반의 Seamless 핸드오프 알고리즘을 제안하고 있다. 제안된 알고리즘은 MS의 이동방향과 속도를 계산하여, 예상 이동경로에 인접한 RN들을 멀티캐스트 그룹으로 구성하고, 그룹 조인 시점을 최대한 늦춤으로서 망의 효율성을 높인다. 또한, 기존의 멀티캐스트 연결 방법이 가지고 있는 버퍼 오버헤드에 대한 문제점을 해결하기 위해, PDSN은 예상 핸드오프 시간 이후의 데이터만을 전송하며, RN 또한 예상 핸드오프 시간 이후의 데이터만을 버퍼링 한다. 제안된 알고리즘의 Dead Lock Free, Liveness 및 Reliability를 검증하기 위해 State Transition Diagram을 작성하고, 페트리 네트를 이용하였다.

  • PDF

Group Key Management Scheme for Batch Operation (효율적인 Batch 처리를 위한 그룹키 관리 기술)

  • Kim, Dae-Youb;Huh, Mi-Suk;Ju, Hak-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.189-193
    • /
    • 2008
  • Digital Contents Services based on Internet are developing into an ubiquitous television that allows subscribers to be able to enjoy digital contents anytime and anywhere However, illegal copies and distributions of digital contents are also increasing proportionally. To guarantee the stability of contents service, many technologies are being developed and installed. The efficient scheme to manage content encryption keys is one of them. In this paper, we propose an improved key management scheme to manage the members of groups. The proposed scheme has a minimized transmission overhead for batch operation to renew content encryption keys.

An Efficient Feedback Collection for Multimedia Multicast (멀티미디어 멀티캐스트를 위한 효율적인 피드백 정보 수집)

  • Kung, Sang-Hwan;Kang, Min-Gyu;Koo, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.751-762
    • /
    • 1998
  • The purpose of this study is to enhance the quality of multimedia service under the heterogeneous end-terminals and network environment by monitoring the data receiving status of the group members regularly when the sender multicasts real-time multimedia data to a group. Especially, it focuses to reduce the total number of status information responded to the sender from the receivers. Accordingly. it upgrades the sender's performance by suppressing the number of status information packets generated by the receivers. The key idea of this study starts from how we profile the activity of all the members in a group. We assume that the receiver status in the worst status, so called primary receiver, represents the status of the whole group. This means that the whole group is assumed as being degraded in performance if the primary receiver is degraded, and that the whole group is assumed as being upgraded if the primary one is upgraded. In this algorithm, the primary receiver announces its status information to the whole group prior to other receivers, ana every receiver listening to the primary and other receivers' status compares its own status with them. Accordingly, any receiver may give up the status notification in case its status is not worse than others, resulting in the reduction of unnecessary responses to the sender.

  • PDF

Group Key Management Scheme for Access Control with Reactive Approach (접근 제어를 위한 반응적 방식의 그룹키 관리 기법)

  • Kim, Hee-Youl;Lee, Youn-Ho;Park, Yong-Su;Yoon, Hyun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.589-598
    • /
    • 2007
  • In the group communication which has multiple data streams and various access privileges, it is necessary to provide group access control. The group members having the same access privilege are classified into one class, and the classes form a hierarchy based on the access relations. Then each class is assigned to a secret key. In the previous schemes, a single logical key graph is constructed from the hierarchy and each member always holds all secret keys of the classes he can access in the proactive manner. Thus, higher-privileged members hold more keys then lower-privileged members. However, if the hierarchy is large, each member manages too many keys and the size of multicast message in rekeying increases in proportion to the size of the hierarchy. Moreover, most of the members access a small portion of multiple data streams simultaneously. Therefore, it is redundant to receive rekeying message and update the keys in which he is not currently interested. In this paper, we present a new key management scheme that takes a reactive approach in which each member obtains the key of a data stream only when he wants to access the stream. Each member holds and updates only the key of the class he belongs. If he wants to get the key of other class, he derives it from his key and the public parameter. Proposed scheme considerable reduces the costs for rekeying, especially in the group where access relations are very complex and the hierarchy is large. Moreover, the scheme has another advantage that it easily reflects the change of access relations.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

An Efficient P2P Based Proxy Patching Scheme for Large Scale VOD Systems (대규모 VOD 시스템을 위한 효율적인 P2P 기반의 프록시 패칭 기법)

  • Kwon, Chun-Ja;Choi, Hwang-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.341-354
    • /
    • 2005
  • The main bottleneck for large scale VOD systems is bandwidth of storage or network I/O due to the large number of client requests simultaneously, and then efficient techniques are required to solve the bottleneck problem of the VOD system. Patching is one of the most efficient techniques to overcome the bottleneck of the VOD system through the use of multicast scheme. In this paper, we propose a new patching scheme, called P2P proxy patching, for improving the typical patching technique by jointly using the prefix caching and P2P proxy. In our proposed scheme, each client plays a role in a proxy to multicast a regular stream to other clients that request the same video stream. Due to the use of the P2P proxy and the prefix caching, the client requests that ive out of the patching window range can receive the regular stream from other clients in the previous patching group without allocating the new regular channels from the VOD server to the clients. In the performance study, we show that our patching scheme can reduce the server bandwidth requirement about $33\%$ less than that of the existing patching technique with respect to prefix size and request interval.

Multicast Routing Protocol for Multimedia Applications (멀티미디어 응용을 위한 멀티캐스트 라우팅 프로토콜)

  • Lee, Kwang-Il;Cho, Pyoung-Dong;Kim, Kyoung-Il;Kim, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1274-1284
    • /
    • 1998
  • Multicasting plays an important role in providing multimedia services like audio and video conferencing and has been actively studied for many years. The study of multicasting has been mainly focused on finding a low-cost tree on the assumption that every edge of the tree has enough link capacity to be allocated to the amound of bandwidth required by a service. In some cases, however, a multicasting tree whose some edges do not have enough bandwidth to be allocated may exist. A typical example of this case is to multicast among the group users located in the different sub-networks in the interconnected networks composed of the high bandwidth networks such as B-ISDN and the low bandwidth networks such as PSTN and PSDN. This paper proposes a novel multicasting protocol for providing multimedia services in a wide area network interconnected by multiple heterogeneous networks. First, the paper discusses the inherent limitation of present multicasting protocols for the case. Second, se introduce a new concept, multiple QoS's for a service, which extends the implicit assumption that only one QoS is assigned to a service in order to overcome this limitation. Third, our multicasting protocol is designed based on the current Internet protocol stacks. Last, we perform simulations for possible scenarios to provide multimedia services in the network and analyze their pros and cons.

  • PDF

Causal Information Transmission Protocol Between Publishers and Subscribers for Overlapping Groups (중복 그룹을 위한 공급자와 소비자 간 인과관계 정보 전송 프로토콜)

  • Kim, Cha-Young;Ahn, Jin-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.215-221
    • /
    • 2011
  • Communication infrastructure of wireless sensor networks significantly tends to depend on application requirements. Gossip communication is becoming one of the promising solutions for addressing its scalability problems in providing information propagation functionality based on the P (publish)/S (subscribe) paradigm. In particular, despite the importance of both guaranteeing message delivery order required and supporting overlapping groups in sensor networks, there exist little research works on development of gossip-style dissemination protocols to satisfy all these requirements. In this paper, we present the latest causal information transmission protocol between publishers and subscribers for overlapping groups. In this protocol, sensor leaders as publishers might guarantee consistently causally ordered message delivery among themselves by aggregating causality information. On the other hand, only the latest causal information piggybacked on each multicast message is transmitted from publishers to subscribers through gossip-style dissemination. Its scalability feature might be highly suitable for the area of the applications requiring only the minimum meaningful information.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.