• Title/Summary/Keyword: Sender

Search Result 466, Processing Time 0.029 seconds

Real-time Image Transmission on the Internet Using Wavelet Transform and Neural Network (웨이블릿변환과 신경회로에 의한 칼라 동영상의 실시간 전송)

  • Kim, Jeong-Ha;Kim, Hyeong-Bae;Sin, Cheol-Hong;Lee, Hak-No;Nam, Bu-Hui
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.203-206
    • /
    • 2003
  • In this paper we discuss an algorithm for a real time transmission of moving color images on the TCP/IP network using wavelet transform and neural network. The image frames received from the camera are two-level wavelet-transformed in the server, and are transmitted to the client on the network. Then, the client performs the inverse wavelet-fransform using only the received pieces of each image frame within the prescribed time limit to display the moving images. When the TCP/IP network is busy, only a fraction of each image frame will be delivered. When the line is free, the whole frame of each image will be transferred to the client. The receiver warns the sender of the condition of traffic congestion in the network by sending a special short frame for this specific purpose. The sender can respond to this condition of warning by simply reducing the data rate which is adjusted by a back-propagation neural network. In this way we can send a stream of moving images adaptively adjusting to the network traffic condition.

  • PDF

A Representative-based Multicast Congestion Control for Real-time Multimedia Applications (실시간 멀티미디어 응용을 위한 대표자 기반의 멀티캐스트 혼잡 제어)

  • Song, Myung-Joon;Cha, Ho-Jung;Lee, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.58-67
    • /
    • 2000
  • The paper presents a representative-based feedback mechanism and rate adaptation policy for congestion control in multicast traffic for multimedia applications. In multicast congestion control, feedback implosion occurs as many receivers send feedback to a sender. We propose to use representatives to avoid the feedback implosion. In our scheme, receivers feedback packet loss information periodically and a sender adapts the sending rate based on the information collected through a hierarchy of representatives. A representative is selected in each region and roles as a filter to decrease the number of feedbacks. The simulation results show that the proposed scheme solves the feedback implosion problem and well adapts in a congested situation.

  • PDF

Application Layer Multicast Tree Constructing Algorithm for Real-time Media Delivery (실시간 미디어 전송을 위한 응용계층 멀티캐스트 트리 구성 알고리즘)

  • Song Hwangjun;Lee Dong Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.991-1000
    • /
    • 2004
  • This paper presents an application layer multicast tree constructing algorithm to minimize the average time delay from the sender to end-systems for the effective real-time media delivery. Simultaneously, the proposed algorithm takes into account the computing power and the network condition of each end-system as a control variable and thus avoids the undesirable case that loads are concentrated to only several end-systems. The multicast tree is constructed by clustering technique and modified Dijkstra's algorithm in two steps, i.e. tree among proxy-senders and tree in each cluster. By the experimental results, we show that the proposed algorithm can provide an effective solution.

Transmission of Moving Image on the Internet Using Wavelet Transform and Neural Network (웨이블릿변환과 신경회로를 이용한 동영상의 실시간 전송)

  • Kim, Jeong-Ha;Lee, Hak-No;Nam, Boo-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1077-1081
    • /
    • 2004
  • In this Paper we discuss an algorithm for a real-time transmission of moving color image on the TCP/IP network using wavelet transform and neural network. The Image frames received from the camera are two-level wavelet-transformed in the server, and are transmitted to the client on the network. Then, the client performs the inverse wavelet-transform using only the received pieces of each image frame within the prescribed time limit to display the moving images. When the TCP/IP network is busy, only a fraction of each image frame will be delivered. When the line is free, the whole frame of each image will be transferred to the client. The receiver warns the sender of the condition of traffic congestion in the network by sending a special short frame for this specific purpose. The sender can respond to this information of warning by simply reducing the data rate which is adjusted with a neural network or fuzzy logic. In this way we can send a stream of moving images adaptively adjusting to the network traffic condition.

TCP-RLDM : Receiver-oriented Congestion Control by Differentiation for Congestion and Wireless Losses (TCP-RLDM: Congestion losses과 Wireless losses 구별을 통한 수신측 기반 혼잡제어 방안)

  • 노경택;이기영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.127-132
    • /
    • 2002
  • This paper aims to adjust the window size according to the network condition that the sender determines by making the receiver participating in the congestion levels. TCP-RLDM has the measurement-based transmission strategy based on the data-receiving rate complementing TCP with the property of Additive Increase / Multiplicative Decrease. The protocol can make an performance improvement by responding differently according to the property of errors-whether congestion losses or transient transmission errors - to confront dynamically in heterogeneous environments with wired or wireless networks and delay-sensitive or -tolerant applications. By collecting data-receiving rate and the cause of errors from the receiver and by enabling sender to use the congestion avoidance strategy before occuring congestion possibly, the protocol works well at variable network environments.

  • PDF

Performance Analysis of Physical Layer Security based on Decode-and-Forward using Jammer and Diversity (재머와 다이버시티를 사용하는 복호 후 재전송 기반 물리 계층 보안의 성능 분석)

  • Park, Sol;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.49-54
    • /
    • 2018
  • In this paper, we study the secrecy outage probability when using cooperative diversity and jammer in a relay system based on decode-and-forward. MRC method is used in receiver and eavesdroppers to obtain cooperative diversity. To use the MRC technique, direct links between the sender and receiver, and between the sender and the eavesdropper are used, respectively. Jammers are used to generate intentional noise siganls to increase security capacity. Jammers generate intentional noise, degrading the channel quality of the eavesdropper and helping physical layer security be realized. The secrecy outage probability is used to evaluate security performance. Assume that the system is under the Rayleigh fading channel.

Hybrid Cryptosystem based on Diffie-Hellman over Elliptic Curve (타원 곡선 상의 Diffie-Hellman 기반 하이브리드 암호 시스템)

  • 정경숙;정태충
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.104-110
    • /
    • 2003
  • In this paper, we proposed hybrid cryptosystem of Diffie-Hellman base in Elliptic Curve, and explained for specific protocol design. The proposed system is efficient hybrid cryptosystems system that offer implicit key authentication about sender and receiver unlike existing hybrid system. This system increased safety generating session key using pseudo-random number generator by cryptographic. Because the system is hybrid system, it is more efficient in calculation amount aspect supplementing merit and fault of public key system and secret key system. Also, the system can not get right plaintext except receiver even if sender's secret key is revealed and impersonation attack is impossible. And the system offers security on known keys without influencing in safety of other session's cryptogram even if session key is exposed. And the system is provided safety about mutual entity authentication and replay attack.

  • PDF

The Dynamic load Balancing Algorithm Method for Heterogeneous Distributed Systems (이종 분산 시스템을 위한 동적 부하균등 알고리즘기법)

  • 장순주
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.53-61
    • /
    • 2002
  • This paper propose an dynamic load balancing algorithm for heterogeneous distributed systems. The algorithm allows this tasks to be relocated. The key of the algorithm is to transfer a suitable amount of processing demand from senders to receivers. This amount is determined dynamically during sender-receiver negotiations. Factors considered when this amount is determined include processing speeds of different nodes, the current load state of both sender and receiver, and the processing demands of tasks eligible for relocation. This paper also propose a load state measurement scheme which is designed particularly for heterogeneous systems. This results of the study show that the proposed algorithm outperforms the existing algorithms and is stable over a range of system attributes.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

An Intelligent Reservation Algorithm for Workload Distribution (부하 분산을 위한 지능형 예약 알고리즘)

  • Lee Jun-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1142-1148
    • /
    • 2005
  • We proposes an algorithm of measuring computation loads to distribute workload of clients. The key of the algorithm is to transfer a suitable amount of processing demand from senders to receivers in relocating intrinsically. This amount is determined dynamically during sender-receiver negotiations. Factors considered when this amount is determined include processing speeds of different nodes, the current load state of both sender and receiver, and the processing demands of tasks eligible for relocation. We also propose a load state measurement scheme which is designed particularly for heterogeneous systems. Based on this analysis, we design new algorithm for supporting heterogeneous distributed web server system, and compare their performance against other existing algorithms. We show that the new algorithm improve the performance of CPU utilization and response time.