• Title/Summary/Keyword: Ns-2

Search Result 1,727, Processing Time 0.034 seconds

A User Interest-based View Synchronization Framework for Real-time Groupware over Wired and Wireless Networks (유무선 네트워크 환경에서 실시간 그룹웨어를 위한 사용자 관심 영역에 기반한 뷰 동기화 프레임워크)

  • 최미진;조은영;강경란;이동만
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.369-380
    • /
    • 2003
  • With the proliferation of a wireless support and the advances of mobile devices, there is a growing need of making it available for a wireless network as well. Low bandwidth of a wireless network is one of the major issues that should be considered for extending a synchronous collaboration system developed for a wired network to supuort a wireless network. We propose a priority-based view synchronization scheme, exploiting the relaxed synchronization. The proposed scheme leverages the fact that mobile users need not have the exactly same view as the users in a wired network since they usually have a limited screen size and thus focus only on part of a whole document. We evaluate the performance of a simple group editor with the propose scheme using ns -2. The performance results show that the proposed scheme keeps the message transmission delay low so that mobile users can have synchronous colloboration with wired users without signification delay. The proposed scheme is designed and implemented as a framework to support various kinds of realtime groupware applications, exploiting the existing groupware framework, Habanero. As a client program, we implemented a simple group text editor.

The Effect of Collagen Peptide Intake on UVB-induced Skin Damage in Hairless mice (콜라겐 펩타이드 섭취 무모생쥐에서 UVB 조사에 의한 피부 손상에 미치는 효과 규명)

  • Shin, Hyun-Jun;Park, Jong il;Kwon, Chang-Ju;Kim, Hwa young;Inoue, Naoki;Koizumi, Seiko;Hwang, Jae Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.611-621
    • /
    • 2016
  • This study examined the effects of collagen peptide intake extracted from the tilapia fish (TFCP) on UVB-induced skin in hairless mice. To cause photoaging, the hairless mice were exposed to UVB irradiation three times a week and TFCP was administered with 545 and 1090 mg/kg once a day for 12 weeks. The level of wrinkle formation, thickness of the skin, acute erythema, skin hydration, amount of hydroxyproline, expression of MMPs and filaggrin were measured. Wrinkle formation, thickness of the skin, and acute erythema were significantly lower and skin hydration was higher in the TFCP intake group compared to the UVB-control mice group. In addition, the amount of the collagen and hydroxyproline of the collagen peptide intake group were much higher than the UVB-control group. Oral administration of TFCP inhibited the expression of the MMP-3 and MMP-13 mRNA level as well as activated MMP-2 and MMP-9 induced by UV irradiation, and increased the protein expression of filaggrin in hairless mice skin. In summary, the oral administration of TFCP can inhibit wrinkle formation and protect the skin from UV-damage. Therefore, this study suggests that TFCP is a potential candidate material for skin functional foods.

A Bit-Map Trie for the High-Speed Longest Prefix Search of IP Addresses (고속의 최장 IP 주소 프리픽스 검색을 위한 비트-맵 트라이)

  • 오승현;안종석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.282-292
    • /
    • 2003
  • This paper proposes an efficient data structure for forwarding IPv4 and IPv6 packets at the gigabit speed in backbone routers. The LPM(Longest Prefix Matching) search becomes a bottleneck of routers' performance since the LPM complexity grows in proportion to the forwarding table size and the address length. To speed up the forwarding process, this paper introduces a data structure named BMT(Bit-Map Tie) to minimize the frequent main memory accesses. All the necessary search computations in BMT are done over a small index table stored at cache. To build the small index table from the tie representation of the forwarding table, BMT represents a link pointer to the child node and a node pointer to the corresponding entry in the forwarding table with one bit respectively. To improve the poor performance of the conventional tries when their height becomes higher due to the increase of the address length, BMT adopts a binary search algorithm for determining the appropriate level of tries to start. The simulation experiments show that BMT compacts the IPv4 backbone routers' forwarding table into a small one less than 512-kbyte and achieves the average speed of 250ns/packet on Pentium II processors, which is almost the same performance as the fastest conventional lookup algorithms.

Multihoming Effect of SCTP Over TCP in the Link-down Environment (링크다운 환경에서 TCP어| 대한 SCTP의 멀티호밍 효과)

  • Choi, Yong-Woon;Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.73-83
    • /
    • 2009
  • TCP(Transmission Control Protocol) is currently used connection-oriented protocol as a typical transport layer protocol in the Internet. However, it has deficiency not be able to communicate with other TCP entities when any link included in the path is down because of single-homing on single path. SCTP(Stream Control Transmission Protocol) suggested as the new transport layer protocol supports multi-homing feature, which provides several paths between source and destination. It can communicate with other SCTP entities using alternate path even when any link on the primary path is down. This paper aims to measure and analyze the multi-homing effect of SCTP over TCP in case of link-down using NS-2 simulator. We classify SCTP into $SCTP_{single-homing}$ and $SCTP_{multi-homing}$ because SCTP with single-homing can also be used like TCP. We measured throughput and bandwidth utilization varying link-down duration, bandwidth, and RTT(round trip time), Simulation results show that throughput of $SCTP_{multi-homing}$ is more than that of TCP by 18 % on average. It is also shown that $SCTP_{multi-homing}$ on varying RTT and bandwidth increases the throughput of TCP by 'l7% and 9% on average, respectively in the link-down environment. In above cases, more or less difference between $SCTP_{single-homing}$ and TCP on throughput and bandwidth utilization was found To summarize, multi-homing effect of SCTP over TCP on throughput is about 18 % on average in the link-down environment This experimental result can be used as the benchmark in order to estimate the multi-homing effect of SCTP over TCP when the link-down happens in the real Internet.

Shared Resource Management Scheme in Advance and Immediate Reservations for Effective Resource Allocation (효율적인 자원 할당을 위한 사전 예약과 즉석 예약 간 공유 자원 관리)

  • 이동훈;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.685-696
    • /
    • 2004
  • Real-time multimedia applications that require large amount of bandwidth need resource reservation before starting service for providing the QoS(i.e., Quality of Service). To reserve resources in advance, each reservation request has to notify its expectation on the required amount of resources and service duration. Using this information, a resource manager can schedule advance reservations. However, most existing resource management systems are adopting straightforward call admission control process (i.e., only immediate reservation) by checking currently available resources without considering the service duration. Hence, the resource management system that supports advance reservation has to manage confliction caused by indefinite service duration of immediate reservation. Even though the separation of resource pool according to type of reservation can prevent the confliction, it causes low resource utilization. In this paper, we propose an effective resource management scheme that supports both immediate and advance reservations by sharing resources dynamically. Using network cost function, the proposed scheme determines and adaptively adjusts resource boundary according to the confliction rate by varying weight parameters. And also, we define user utility function to quantify user satisfaction based on how well the reserved resource is guaranteed during service time. Simulation results using NS-2 network simulator show that the proposed scheme can achieve better resource utilization with preferable QoS than other schemes like static resource partitioning.

HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks (HIMIPv6: 광대역 무선 통신 네트워크를 위한 효율적인 IP 이동성 관리 프로토콜)

  • Jeong Hyeon-Gu;Kim Young-Tak;Maeng Seung-Ryoul;Chae Young-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.291-302
    • /
    • 2006
  • With the increasing deployment of mobile devices and the advent of broadband wireless access systems such as WiBro, WiMAX, and HSDPA, an efficient IP mobility management protocol becomes one of the most important technical issues for the successful deployment of the broadband wireless data networking service. IETF has proposed the Mobile IPv6(MIPv6) as the basic mobilitymanagement protocol for IPv6 networks. To enhance the performance of the basic MIPv6, researchers have been actively working on HMIPv6 and FMIPv6 protocols. In this paper, we propose a new mobility management protocol, HIMIPv6 (Highly Integrated MIPv6), which tightly integrates the hierarchical mobility management mechanism of the HMIPv6 and the proactive handover support of the FMIPv6 to enhance the handover performance especially for the cellular networking environment with high frequent handover activities. We have performed extensive simulation study using ns-2 and the results show that the proposed HIMIPv6 outperforms MIPv6, FMIPv6 and HMIPv6 in terms of signaling overhead, service interruption and packet lost during handovers.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Power-aware Dynamic Path Selection Scheme in AOMDV(Ad hoc On-demand Distance Vector) (AOMDV(Ad hoc On-demand Multipath Distance Vector)에서의 전력을 고려한 동적 경로 선택 기법)

  • Lee, Jang-Su;Kim, Sung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.42-50
    • /
    • 2008
  • Unlike a cellular network, a mobile ad hoc network(MANET) is constructed only by mobile nodes without access point. Mobile nodes in MANET operate with scarce resources and restricted battery. If battery of intermediate node is exhausted, overall network might be diverged. Therefore, power-aware is really important. An on-demand multipath routing protocol which is proposed to compensate for shortcoming of on-demand single path routing protocol can reduce mute discovery overhead because route discovery starts only when all routes are disconnected. AOMDV(Ad hoc On-demand Multipath Distance Vector) which is on-demand multipath routing protocol based on AODV, reduces 40% of route discovery frequency. However, AOMDV have none of power-aware. So AOMDV have problem that route discovery for power exhaustion is not reduced at all. This paper proposes new power-aware path selection algorithm for AOMDV and scheme that broadcast REER packets when mobile node's battery can be gone. Performance comparison of proposed algorithm with AOMDV using ns-2 simulator shows that route discovery of proposed algorithm is reduced maximally 36.57% than AOMDV's.

New Contention Window Control Algorithm for TCP Performance Enhancement in IEEE 802.11 based Wireless Multi-hop Networks (IEEE 802.11 기반 무선 멀티홉 망에서 TCP의 성능향상을 위한 새로운 경쟁 윈도우 제어 알고리즘)

  • Gi In-Huh;Lee Gi-Ra;Lee Jae-Yong;Kim Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.165-174
    • /
    • 2006
  • In this paper, we propose a new contention window control algorithm to increase TCP performance in wireless multi-hop networks. The new contention window control algorithm is suggested to reduce the hidden and exposed terminal problems of wireless multi-hop networks. Most of packet drops in wireless multi-hop networks results from hidden and exposed terminal problems, not from collisions. However, in normal DCF algorithm a failed user increases its contention window exponentially, thus it reduces the success probability of fined nodes. This phenomenon causes burst data transmissions in a particular node that already was successful in packet transmission, because the success probability increases due to short contention window. However, other nodes that fail to transmit packet data until maximum retransmission attempts try to set up new routing path configuration in network layer, which cause TCP performance degradation and restrain seamless data transmission. To solve these problems, the proposed algorithm increases the number of back-of retransmissions to increase the success probability of MAC transmission, and fixes the contention window at a predetermined value. By using ns-2 simulation for the chain and grid topology, we show that the proposed algorithm enhances the TCP performance.

Congestion Control Algorithms Evaluation of TCP Linux Variants in Dumbbell (덤벨 네트워크에서 TCP 리눅스 변종의 혼잡 제어 알고리즘 평가)

  • Mateen, Ahamed;Zaman, Muhanmmad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.139-145
    • /
    • 2016
  • Dumbbell is the most basic topology that can be used in almost all kind of network experiment within it or just by little expansion. While Transmission Control Protocol TCP is the basic protocol that is used for the connectivity among networks and stations. TCP major and basic goal is to provide path and services to different applications for communication. For that reason TCP has to transfer a lot of data through a communication medium that cause serious congestion problem. To calculate the congestion problem, different kind of pre-cure solutions are developer which are Loss Based Variant and Delay Based Variant. While LBV keep track of the data that is going to be passed through TCP protocol, if the data packets start dropping that means congestion occurrence which notify as a symptom, TCP CUBIC use LBV for notifying the loss. Similarly the DBV work with the acknowledgment procedure that is used in when data ACK get late with respect to its set data rate time, TCP COMPOUND/VAGAS are examples of DBV. Many algorithms have been purposed to control the congestion in different TCP variants but the loss of data packets did not completely controlled. In this paper, the congestion control algorithms are implemented and corresponding results are analyzed in Dumbbell topology, it is typically used to analyze the TCP traffic flows. Fairness of throughput is evaluated for different TCP variants using network simulator (NS-2).