• Title/Summary/Keyword: Network Blocking

Search Result 347, Processing Time 0.022 seconds

Flow-Based Admission Control Algorithm in the DiffServ-Aware ATM-Based MPLS Network

  • Lee, Gyu-Myoung;Choi, Jun-Kyun;Choi, Mun-Kee;Lee, Man-Seop;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.1
    • /
    • pp.43-55
    • /
    • 2002
  • This paper proposes a flow-based admission control algorithm through an Asynchronous Transfer Mode (ATM) based Multi-Protocol Label Switching (MPLS) network for multiple service class environments of Integrated Service (IntServ) and Differentiated Service (DiffServ). We propose the Integrated Packet Scheduler to accommodate IntServ and Best Effort traffic through the DiffServ-aware MPLS core network. The numerical results of the proposed algorithm achieve reliable delay-bounded Quality of Service (QoS) performance and reduce the blocking probability of high priority service in the DiffServ model. We show the performance behaviors of IntServ traffic negotiated by end users when their packets are delivered through the DiffServ-aware MPLS core network. We also show that ATM shortcut connections are well tuned with guaranteed QoS service. We validate the proposed method by numerical analysis of its performance in such areas as throughput, end-to-end delay and path utilization.

  • PDF

Performance Analysis of Multi-Media Traffic in Nonhirerachical Structures (비계층적 구조를 갖는 종합정보 통신망에서 다원트래픽 성능분석)

  • 김제숭
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.103-112
    • /
    • 1997
  • In this paper, a nonhierarchial integrated information network with circuit switched and packet switched traffic is considered. It is assumed that circuit switched traffic is allowed to attempt an alternate path if the direct path is blocked, whereas packet switched traffic is not. The network uses a movable boundary scheme to allocate bandwidth dynamically. To analyze the performance of this type of network, EEBP(End to End Blocking Probability) is selected as a measure for circuit switched traffic and average time delay for packet switched traffic, respectively. EEBP and average time delay are derived analytically. Using the two proposed measure, the performance of the network under various bandwidth allocations and arrival patterns are observed. Moreover, the arrival rate of one link for circuit switched traffic is obtained from an approximation formula. Simulation results reveal the validity of the proposed approximation method.

  • PDF

New Path-Setup Method for Optical Network-on-Chip

  • Gu, Huaxi;Gao, Kai;Wang, Zhengyu;Yang, Yintang;Yu, Xiaoshan
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.367-373
    • /
    • 2014
  • With high bandwidth, low interference, and low power consumption, optical network-on-chip (ONoC) has emerged as a highly efficient interconnection for the future generation of multicore system on chips. In this paper, we propose a new path-setup method for ONoC to mitigate contentions, such as packets, by recycling the setup packet halfway to the destination. A new, strictly non-blocking $6{\times}6$ optical router is designed to support the new method. The simulation results show the new path-setup method increases the throughput by 52.03%, 41.94%, and 36.47% under uniform, hotspot-I, and hotspot-II traffic patterns, respectively. The end-to-end delay performance is also improved.

A Study on the ATM Switch Structure Using the GAMMA Network (GAMMA 네트워크를 이용한 ATM 스위치 구조에 관한 연구)

  • 김근배;황성호;송주빈;이종현;임해진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.11
    • /
    • pp.1143-1153
    • /
    • 1991
  • In this paper, we proposed a new ATM switch structure which is based on the GAMMA network, proving multipath between an input and an output port. The size of the proposed new ATM switch will be smaller than the switches based on the BANYAN network, which includes the Sorting network to resolve the blocking in the switch fabric. Also, the validity and the utility of the proposed switch structure is verified through a simulation method.

  • PDF

Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in WLAN

  • Pan, Su;Zhou, Weiwei;Gu, Qingqing;Ye, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.68-86
    • /
    • 2015
  • Future wireless network aims to integrate different radio access networks (RANs) to provide a seamless access and service continuity. In this paper, a new resource denotation method is proposed in the WLAN and LTE heterogeneous networks based on a concept of spectral bandwidth mapping. This method simplifies the denotation of system resources and makes it possible to calculate system residual capacity, upon which an economic model-based network selection algorithm is designed in both under-loaded and over-loaded scenarios in the heterogeneous networks. The simulation results show that this algorithm achieves better performance than the utility function-based access selection (UFAS) method proposed in [12] in increasing system capacity and system revenue, achieving load balancing and reducing the new call blocking probability in the heterogeneous networks.

액티브 보안 기술

  • 방효찬;나중찬;손승원;박치항
    • Information and Communications Magazine
    • /
    • v.19 no.8
    • /
    • pp.128-136
    • /
    • 2002
  • It is an active security that has the research field which has more powerful responding mechanism comparing to current network security technology, has an ability to introduce new security mechanism according to changing our environments, and can support effective security management. Our goal is to introduce a new category of internet security technologies on network survivability: active security technology. It is a new security technology that blocking network or computers. before malicious traffics are reached to them, including protecting hosts or small area network from hackers.

Super-resolution of compressed image by deep residual network

  • Jin, Yan;Park, Bumjun;Jeong, Jechang
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.59-61
    • /
    • 2018
  • Highly compressed images typically not only have low resolution, but are also affected by compression artifacts. Performing image super-resolution (SR) directly on highly compressed image would simultaneously magnify the blocking artifacts. In this paper, a SR method based on deep learning is proposed. The method is an end-to-end trainable deep convolutional neural network which performs SR on compressed images so as to reduce compression artifacts and improve image resolution. The proposed network is divided into compression artifacts removal (CAR) part and SR reconstruction part, and the network is trained by three-step training method to optimize training procedure. Experiments on JPEG compressed images with quality factors of 10, 20, and 30 demonstrate the effectiveness of the proposed method on commonly used test images and image sets.

  • PDF

Performance Analysis of Wavelength Assignment Signaling Protocol with Priority (Priority를 제공하는 파장 할당 시그널링 프로토콜의 성능 분석)

  • Kim, Min-Sik;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4B
    • /
    • pp.351-360
    • /
    • 2003
  • All-optical network provede unlimited for bandwidth, the very low bit error rate, and the transparency to IP. Optical networks promise to be the next generation networks that can meet the higher bandwidth demands. However, the number of wavelengths is often not large enough to help a large amount of nodes. The blocking by wavelength contention can be reduced by wavelength conversion, which can't perfectly resolve all situations. Because of that, a lot of groups have proposed unique wavelength assingment algorithms and protocols. Most schemes don't support the priority concepts. This paper describes the unique priority scheme based on the throughput. In this paper, we apply our priority scheme to SWAP(Simple Wavelength Assignment Protocol) and show the performance of the proposed priority scheme. Our proposed priority scheme can be a better solution to solve an important problem about the blocking by wavelength contention into WDM optical networks.

A Blocking Algorithm of a Target Object with Exposed Privacy Information (개인 정보가 노출된 목표 객체의 블로킹 알고리즘)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.43-49
    • /
    • 2019
  • The wired and wireless Internet is a useful window to easily acquire various types of media data. On the other hand, the public can easily get the media data including the object to which the personal information is exposed, which is a social problem. In this paper, we propose a method to robustly detect a target object that has exposed personal information using a learning algorithm and effectively block the detected target object area. In the proposed method, only the target object containing the personal information is detected using a neural network-based learning algorithm. Then, a grid-like mosaic is created and overlapped on the target object area detected in the previous step, thereby effectively blocking the object area containing the personal information. Experimental results show that the proposed algorithm robustly detects the object area in which personal information is exposed and effectively blocks the detected area through mosaic processing. The object blocking method presented in this paper is expected to be useful in many applications related to computer vision.

Performance Analysis of Gigabit Network in Campus (캠퍼스 기가비트 네트워크 성능분석)

  • 지홍일;이준희;이재영;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.96-104
    • /
    • 2002
  • This paper has done a network performance test as well as result analysis of the test in a real campus gigabit network The inner network backbone consists of gigabit ethernet . The mean ratio of network use is below 1% age, and the maximum one comes to 10%. The floating capacity is still good enough to meet network flowing because the mean ratio of inner campus network as outer ones is 30.4% and the maximum one is merely 38.3%. But there appears a security problem. We must make a device blocking illegal approach to the client form outer network It is important that we can a away to manage the campus gigabit network efficiently on the basis of the given data from this performance test.

  • PDF