• Title/Summary/Keyword: SEND

Search Result 1,446, Processing Time 0.031 seconds

The Performance Improvement of a Clustering based Wireless internet Proxy Server (클러스터링 기반의 무선 인터넷 프록시 서버 성능 개선)

  • 곽후근;한경식;정규식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.403-405
    • /
    • 2004
  • TranSend는 클러스터링 기반의 우선 프록시 서버로 제안된 것이나 시스템적인(Systematic) 방법으로 확장성을 보장하지 못하고 불필요한 모듈간의 통신구조로 인해 복잡하다는 단점을 가진다. 기존 연구에서 시스템적인 방법으로 확장성을 보장하는 All-in-one 이라는 구조를 제안하였으나 이 역시 모듈간의 통신구조가 복잡하다는 단점을 가진다. 이에 본 논문에서는 시스템적으로 확장성을 보장하고 모듈간의 단순한 통신 구조를 가지는 클러스터링 기반의 무선 인터넷 프록시 서버를 제안한다. 16대의 컴퓨터를 사용하여 실험을 수행하였고 실험결과 TranSend 시스템과 All-in-one 시스템에 비해 각각 105.69%, 39.93%의 성능 향상을 보였다.

  • PDF

CAPTURE OF YELLOW DUST BLOW BY MODIS DATA

  • Song, Jie;Park, Jong-Geol;Yasuda, Yoshizumi
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.920-922
    • /
    • 2003
  • Large plumes of yellow send or yellow dust blow out over the Sea of Japan and the Japanese archipelago from mainland of China. In this study, the methodology to capture the perspective on the large Yellow dust storm by using MODIS data is discussed. As the typical image of yellow send, MODIS data obtained of April 8, 2002 were used in this study.

  • PDF

An Efficient CGI Gateway in the UNIX System (유닉스 시스템에서 효율적인 CGI 게이트웨이)

  • 이형봉
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.66-74
    • /
    • 2004
  • To get changing data or retrieved information in a web service environment, we need the CGI method in which we designate an executable file and receive the output of the executable file as a document. But the original CGI method has some performance pitfalls caused by the native condition that a process for the requested executable file should be created every time it is requested. Several approaches that make the process as a daemon wholly or partly have been made to solve those problems and they have exclusive strength and weakness. So, many developers are confused when they have to choose which of the CGI methods. We proposed an efficient CGI gateway design called SendFD that the main part of CGI gateway was separated as a daemon and taken over the communication channel by the other small part forked whenever it was requested. Then we testified the efficiency of SendFD styled CGI gateway in real web service environment and it showed about 3% performance improvement compared to the conventional socket pipe method.

A Same-Priority Collision-Avoidance Algorithm Using RTS/CTS Frame in IEEE 802.11e EDCA under Network Congested Condition (IEEE 802.11e EDCA 네트워크 혼잡 환경에서 RTS/CTS 프레임을 이용한 동일 우선순위 충돌 회피 알고리즘)

  • Kwon, YongHo;Rhee, Byung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.5
    • /
    • pp.425-432
    • /
    • 2014
  • The Enhanced Distributed Channel Access (EDCA) function of IEEE 802.11e standard defines contention window (CW) for different Access Category (AC) limits to support Quality-of-Service (QoS). However, it have been remained the problem that the collision probability of transmission is increasing in congested network. Several different solutions have been proposed but the collision occurs among same priority queue within the same station to compete the channel access. This paper presents an APCA (Advanced Priority Collision Avoidance) algorithm for EDCA that increases the throughput in saturated situation. The proposed algorithm use reserved field's bits of FC(Frame Control) using IEEE 802.11e standard's RTS/CTS (Request to Send / Clear to Send) mechanism to avoid data collision. The simulation results show that the proposed algorithm improves the performance of EDCA in packet loss. Using Jain's fairness index formula, we also prove that the proposed APCA algorithm achieves the better fairness than EDCA method under network congested condition.

Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks (수중 모바일 애드 혹 네트워크를 위한 MAC 프로토콜 설계 및 구현)

  • Lee, Jin-Young;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.76-89
    • /
    • 2014
  • In this paper, we propose a MAC(Media Access Control) protocol based on flexible RWT(RTS Waiting Time) for underwater mobile ad-hoc networks with a three-way handshaking mechanism. This protocol can solve a problem of collision between RTS(Request-To-Send) and CTS(Clear-To-Send) packets in existing MACA(Multiple Access with Collision Avoidance) protocol. This proposed MAC protocol is also an effective protocol which can apply to underwater mobile ad-hoc networks in a real field by using implementable technologies. We set flexible RTS Waiting Time called RWT, considering various characteristics of underwater environment. It is possible to support variable network size according to node mobility. Finally, we conduct a performance evaluation between proposed MAC protocol and existing MACA based MAC protocol through practical implementation and experiment. As a result, we verify the superiority of our proposed MAC protocol in terms of throughput, packet drop rate, average transmission time, energy consumption and channel utilization.

Efficient and Scalable Overlay Multicast Mechanism for Real-time Tree Construction (효율적이고 확장성 있는 실시간 트리 구성을 위한 오버레이 멀티캐스트 메커니즘)

  • Nam, Yun-Seung;Im, Dong-Gee;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1399-1406
    • /
    • 2009
  • In the internet broadcast, efficient and scalable mechanism of multicast is needed for the communication between groups. Furthermore, Optimization of the multicast tree is required to improve the performance of overlay multicast. This optimization is well-known as NP-complete. If a node in the tree has limited out-degree, a user who wants to join the group has to find parent user who has already joined. In this paper, the users who want to join the group need to setup their level using delay test from source node. And then new users can find candidate parent nodes effectively using ACK-SEND approach and take proper position by comparing level. The closer node of the user to root node should be located in lower level. Also, even if a barrier is caused, fast recovery will be guaranteed using ACK-SEND approach. Through this, the newcomer node can fine their location in the multicast tree and join the group fast and effectively.

A Performance Improvement Method with Considering of Congestion Prediction and Packet Loss on UDT Environment (UDT 환경에서 혼잡상황 예측 및 패킷손실을 고려한 성능향상 기법)

  • Park, Jong-Seon;Lee, Seung-Ah;Kim, Seung-Hae;Cho, Gi-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.69-78
    • /
    • 2011
  • Recently, the bandwidth available to an end user has been dramatically increasing with the advancing of network technologies. This high-speed network naturally requires faster and/or stable data transmission techniques. The UDT(UDP based Data Transfer protocol) is a UDP based transport protocol, and shows more efficient throughput than TCP in the long RTT environment, with benefit of rate control for a SYN time. With a NAK event, however, it is difficult to expect an optimum performance due to the increase of fixed sendInterval and the flow control based on the previous RTT. This paper proposes a rate control method on following a NAK, by adjusting the sendInterval according to some degree of RTT period which calculated from a set of experimental results. In addition, it suggests an improved flow control method based on the TCP vegas, in order to predict the network congestion afterward. An experimental results show that the revised flow control method improves UDT's throughput about 20Mbps. With combining the rate control and flow control proposed, the UDT throughput can be improved up to 26Mbps in average.

A Consolidated Wireless Internet Proxy Server Cluster Architecture (통합형 무선 인터넷 프록시 서버 클러스터 구조)

  • Kwak Hu-Keun;Chung Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.3 s.100
    • /
    • pp.231-240
    • /
    • 2006
  • In this paper, wireless internet proxy server clusters are used for the wireless internet because their caching, distillation, and clustering functions are helpful to overcome the limitations and needs of the wireless internet. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the CD-A structure which can be scalable in a systematic way but it also has disadvantages; its communication structure among modules is partly complex. In this paper, we proposed a consolidated scheme which has a systematic scalability and an efficient communication structure among modules. We performed experiments using 16 PCs and experimental results show 196% and 40% performance improvement of the proposed system compared to the TranSend and the CD-A system, respectively.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.

Design of Shielded Encircling Send-Receive Type Pulsed Eddy Current Probe Using Numerical Analysis Method

  • Shin, Young-Kil
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.33 no.6
    • /
    • pp.505-510
    • /
    • 2013
  • An encircling send-receive type pulsed eddy current (PEC) probe is designed for use in aluminum tube inspection. When bare receive coils located away from the exciter were used, the peak time of the signal did not change although the distance from the exciter increased. This is because the magnetic flux from the exciter coil directly affects the receive coil signal. Therefore, in this work, both the exciter and the sensor coils were shielded in order to reduce the influence of direct flux from the exciter coil. Numerical simulation with the designed shielded encircling PEC probe showed the corresponding increase of the peak time as the sensor distance increased. Ferrite and carbon steel shields were compared and results of the ferrite shielding showed a slightly stronger peak value and a quicker peak time than those of the carbon steel shielding. Simulation results showed that the peak value increased as the defect size (such as depth and length) increased regardless of the sensor location. To decide a proper sensor location, the sensitivity of the peak value to defect size variation was investigated and found that the normalized peak value was more sensitive to defect size variation when the sensor was located closer to the exciter.