• Title/Summary/Keyword: Network Type Distributed Control

Search Result 41, Processing Time 0.027 seconds

Enhancements of the Modified PCF in IEEE 802.11 WLANs

  • Kanjanavapastit Apichan;Landfeldt Bjorn
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.313-324
    • /
    • 2005
  • The success of the IEEE 802.11 standard has prompted research into efficiency of the different medium access methods and their support for different traffic types. A modified version of the point coordination function (PCF) called modified PCF has been introduced as a way to improve the efficiency over the standard method. It has been shown through a simulation study and a mathematical analysis that channel utilization can be much improved compared to the standard, in case there is no so-called hidden station problem. However, under the hidden station problem, the efficiency of the modified PCF would obviously decrease. In this paper, some enhancements of the modified PCF are introduced. Firstly, we propose a retransmission process to allow frames involved in collisions to be retransmitted. Then, we propose a collision resolution mechanism to reduce the frame collision probability due to the hidden station problem. In addition, we propose a priority scheme to support prioritization for different traffic types such as interactive voice and video, and real-time data traffic in the modified PCF. To prevent the starvation of one low priority traffic, minimum transmission period is also guaranteed to each traffic type via an admission control algorithm. We study the performance of the modified PCF under the hidden station problem and the performance of the modified PCF with priority scheme through simulations. To illustrate the efficiency of the priority scheme, we therefore compare its simulation results with those of some standardized protocols: The distributed coordination function (DCF), the enhanced distributed channel access (EDCA), the PCF, and our previously proposed protocol: The modified PCF without priority scheme. The simulation results show that the increment of delay in the network due to the hidden station problem can be reduced using the proposed collision resolution mechanism. In addition, in a given scenario the modified PCF with priority scheme can provide better quality of service (QoS) support to different traffic types and also support a higher number of data stations than the previous proposals.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

A study on the design of a VODB using different kinds of protocol (이종 프로토콜을 이용한 VODB 설계 관한 연구)

  • 박세승;노영주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1343-1355
    • /
    • 1997
  • Full motion video data is the most effective data type that transmits information in multimedia enviornment. VOD service is system that uses network to transmit full motion video data interactively. Therefore VOD service system must satisfy the following requirements. First, it should transmit high quality full motion video. Second, it should be able to control a large quantity of full motion video. Third, a user should be able to retrieve the full motion vide effectively. However the existing VOD service system is established based n file system that not only does it have disadvantages in managment such as transaction control but also it is not suitable for distributed multimedia environment. The goal of this research is to build a VOD service system that provides high-quality full motion video assuming information retrieval. In order to mainly search video data's bibliographical information and to manage related information, VOD service system and DBMS system are to be closely related. Also, to transmit high quality full motion video data, we use MTP$^{TM}$(Media Transfer Protocol) developed by StarLight. MTP$^{TM}$ guarantees high bandwidth that is necessary to tansmit high quality full motion video data effectively. In other hand TCP/IP which is used for information search does not guarentee high bandwidth as that in MTP$^{TM}$. Therfore VOD service system that seraches information managed by DBMS and transmits requried full motion video data should control different kinds of protocol simultaneously. This paper describes the configuration of VODB system that has solved these problems, implementation and efficiency of data applied system.stem.

  • PDF

The Optimal Operation for Community Energy System Using a Low-Carbon Paradigm with Phase-Type Particle Swarm Optimization

  • Kim, Sung-Yul;Bae, In-Su;Kim, Jin-O
    • Journal of Electrical Engineering and Technology
    • /
    • v.5 no.4
    • /
    • pp.530-537
    • /
    • 2010
  • By development of renewable energy and more efficient facilities in an increasingly deregulated electricity market, the operation cost of distributed generation (DG) is becoming more competitive. International environmental regulations of the leaking carbon become effective to reinforce global efforts for a low-carbon paradigm. Through increased DG, operators of DG are able to supply electric power to customers who are connected directly to DG as well as loads that are connected to entire network. In this situation, a community energy system (CES) with DGs is a new participant in the energy market. DG's purchase price from the market is different from the DG's sales price to the market due to transmission service charges and other costs. Therefore, CES who owns DGs has to control the produced electric power per hourly period in order to maximize profit. Considering the international environment regulations, CE will be an important element to decide the marginal cost of generators as well as the classified fuel unit cost and unit's efficiency. This paper introduces the optimal operation of CES's DG connected to the distribution network considering CE. The purpose of optimization is to maximize the profit of CES. A Particle Swarm Optimization (PSO) will be used to solve this complicated problem. The optimal operation of DG represented in this paper would guide CES and system operators in determining the decision making criteria.

Performance Analysis of Drone-type Base Station on the mmWave According to Radio Resource Management Policy (무선자원 운용방안에 따른 밀리미터파 대역에서의 드론형 기지국 성능분석)

  • Jeong, Min-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.917-926
    • /
    • 2019
  • At present, TICN has been developed and distributed for military command control. TICN is known as the 3.5G mobile communication technology based on WiBro, which shows technical limitation in the field operation situation. Accordingly, the drone-type base station platform is attracting attention as an alternative to overcome technical limitations such as difficulty in securing communication LoS and limiting expeditious network configuration. In this study, we performed simulation performance evaluation of drone-type base station operation in 28 GHz that is considered most suitable for cellular communication within mmWave frequency band. Specifically, we analyzed the changes in throughput and fairness performance according to radio resource management policies such as frequency reuse and scheduling in multi-cell topology. Through this, we tried to provide insights on the operation philosophy on drone-type base station.

An Adaptive Contention Windows Adjustment Scheme Based on the Access Category for OnBord-Unit in IEEE 802.11p (IEEE 802.11p에서 차량단말기간에 혼잡상황 해결을 위한 동적 충돌 윈도우 향상 기법)

  • Park, Hyun-Moon;Park, Soo-Hyun;Lee, Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.28-39
    • /
    • 2010
  • The study aims at offering a solution to the problems of transmission delay and data throughput decrease as the number of contending On-Board Units (OBU) increases by applying CSMA medium access control protocol based upon IEEE 802.11p. In a competition-based medium, contention probability becomes high as OBU increases. In order to improve the performance of this medium access layer, the author proposes EDCA which a adaptive adjustment of the Contention Windows (CW) considering traffic density and data type. EDCA applies fixed values of Minimum Contention Window (CWmin) and Maximum Contention Window (CWmax) for each of four kinds of Access Categories (AC) for channel-specific service differentiation. EDCA does not guarantee the channel-specific features and network state whereas it guarantees inter-AC differentiation by classifying into traffic features. Thus it is not possible to actively respond to a contention caused by network congestion occurring in a short moment in channel. As a solution, CWminAS(CWmin Adaptation Scheme) and ACATICT(Adaptive Contention window Adjustment Technique based on Individual Class Traffic) are proposed as active CW control techniques. In previous researches, the contention probabilities for each value of AC were not examined or a single channel based AC value was considered. And the channel-specific demands of IEEE 802.11p and the corresponding contention probabilities were not reflected in the studies. The study considers the collision number of a previous service section and the current network congestion proposes a dynamic control technique ACCW(Adaptive Control of Contention windows in considering the WAVE situation) for CW of the next channel.

Development of component architecture to support IoT management (IoT 및 네트워크 관리 지원을 위한 컴포넌트 아키텍처 개발)

  • Seo, Hee Kyoung
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.42-49
    • /
    • 2017
  • It is important to realize automation services by communicating in IoT with humans, objects & objects, and forming a common network. People used web like the most powerful network way to sharing things and communication. Therefore the efficiency method communication between each device and the web in IoT could be different from ones. The best method for high quality software product in web applications is software reuse ; Modules, classes, patterns, frameworks, and business components are reusable elements of various perspectives. Components is plugged with others through well-defined interfaces, which can overcome the operation and complexity of application development. A web-based distributed environment for IoT applications is a standard architecture use information collected from various devices for developing and using applications. For that reason, the network management which manages the constituent resources for the best service control in IoT application is required as a sub-layer support service in most applications as well as individual applications. In this paper, we measure to develop a network management system based not only by components but on heterogeneous internetworks. For procedure this, we clarify a component architecture for classifying and classify also the component needed in the IOT and network domain or order the type of real network management system.

Theory and practice of the interlibrary loan service (상호대차(相互貸償) 제도의 이론(理論)과 응용)

  • Chun Myung Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.13
    • /
    • pp.39-71
    • /
    • 1986
  • Interlibrary loan has been a very common library service in the developed countries but it is yet to be actualized formerly in Korea. As Korea is moving toward an information society where all the individual user's request in the library should be met, we need to understand, in detail, the theory and practice of interlibrary loan service. As various information technology has been applied to the libraries, the libraries became the open system. Thus, the libraries become more cooperative, form networks, and make interlibrary loan service available. This study is based on the following three hypothesis formulated from the systems theory. 1. If libraries cooperate each other and form some kind of networks by mail, computers or telecommunications, they become the open system. 2. If a library develops as the open system, interlibrary loan becomes available in the library. 3. If the interlibrary loan system works, the role of the librarians will be changed. The research was carried out by analyzing the various studies about interlibrary loan service and by examining the interlibrary loan systerns presently working in the U.S.. The conclusions are reached deductively from the data. Some of the terminology used are defined as follows: System: a network of interrelated procedures that are joined together to perform an activity or to accomplish a specific objective. It is, in effect, all the ingredient which make up the whole. Cooperation: Working together to benefit participant libraries. Network: a much more structured type of cooperation in which definite regions or areas are connected by electronic or other means to promote interlibrary loaning of materials, in-service traing & other sharing of resources. Interlibrary loan: the lending of books between libraries. The model of cooperation or networks was used to be (1) a star type, (2) a hieranchical type, (3) a distributed type or (4) the combination of aforementioned three. However, the development of the telecommunications and computers enables all kinds of libraires cooperate together. Interlibrary loan service starts with the needs of user's information. The information have to be logically accessed through bibliographies, computers, electronic mails and satellite communications. And the logical access requires the information technology and the libraries become cooperative. The physical access to the information follows next but only traditional method of mail and some commercial service are currently available for this purpose. Therefore, researches are needed to develop this physical access. If the libraries form networks, the microaspect of library changes accordingly as the macroaspect changes. If the libraries . cooperate to become one large world library, the librarians plan, organize, control library operations and report the results. And the librarians work inside and outside of the library to cooperate with other libraries. Only the cooperation of the libraries will enhance interlibrary loan and the Korean librarians have to be prepared to accept the new role of librarianship for the interlibrary loan service.

  • PDF

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.