• Title/Summary/Keyword: Traffic information processing

Search Result 1,252, Processing Time 0.028 seconds

Efficient Support for Adaptive Bandwidth Scheduling in Video Servers (비디오 서버에서의 효율적인 대역폭 스케줄링 지원)

  • Lee, Won-Jun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.297-306
    • /
    • 2002
  • Continuous multimedia applications require a guaranteed retricval and transfer rate of streaming data, which conventional file server mechanism generally does not provide. In this paper we describe a dynamic negotiated admission control and dick bandwidth scheduling framework for Continuous Media (CM : e.g., video) servers. The framework consists of two parts. One is a reserve-based admission control mechanism and the other part is a scheduler for continuous media streams with dynamic resource allocation to achieve higher utilization than non-dynamic scheduler by effectively sharing available resources among contending streams to improve overall QoS. Using our policy, we could increase the number of simultaneously running: clients that coo]d be supported and cot]d ensure a good response ratio and better resource utilization under heavy traffic requirements.

The RTP Payload Format for Telepointing (원격지정을 위한 RTP 페이로드 형식)

  • Jeon, Jae-U;Baek, Hui-Suk;O, Sam-Gwon;Im, Gi-Uk
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.29-36
    • /
    • 2002
  • For the efficient collaboration awareness, the CSCW (Computer-Supported Cooperative Work) systems provide functions such as telepointing, snap-shot, and document/project tracking. Among these, telepointing allows an event occurrence on the shared window of a local computing system to be presented in remote computing systems. Although telepointing has been mentioned in the literature, few research papers deal with the functional requirements and protocols for telepointing. This parer describes the functional requirements and payload format for RTP (Real-Time Transport Protocol)-based telepointing. In order to evaluate the performance of the proposed RTP-barred telepointing, we have implemented a whiteboard and compared it with that of the Microsoft Netmeeting. The evaluation results show that the proposed telepointing performs better in terms of CPU usage and the amount of network traffic.

R-CAT: Resilient Capacity-Aware Multicast Tree Construction Scheme (R-CAT : P2P기반 스트리밍 환경에서 노드의 능력을 고려한 내구적 멀티캐스트 트리 생성 기법)

  • Kim Eun-Seok;Han Sae-Young;Park Sung-Yong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.147-156
    • /
    • 2006
  • Recently, streaming service accounts for large part of internet traffic and it is becoming the most popular service. Because of P2P's scalability, P2P-based streaming system is proposed. There are frequent leave and join of a node. To overcome the group dynamics, Multiple Multicast Trees Methods were suggested. However, since they did not consider discrepancy in peers' capacity, it may cause the trees to be long and unstable. So we suggest Resilient Capacity-Aware Multicast Tree construction scheme (R-CAT) that promotes superior peer to upper position in the tree and construct more stable and short multicast trees. By simulation we can show that R-CAT cost more overhead packets for tree joining process, but it reduce the end-to-end delay of the resulting tree and the number of packets lost during the node joining and leaving processes much more than SplitStream.

Performance Analysis of TCP using DSR Routing Protocols in Ad-hoc Mobile Network (DSR 라우팅 프로토콜을 사용한 Ad-hoc 무선망에서의 TCP 성능 분석)

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.647-654
    • /
    • 2002
  • Ad-hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other supporting communication facilities (such as base stations, etc.). Therefore, the topology of an Ad-hoc network frequently changes due to the movement of mobile host, which nay lead to sudden packet loss. Recently, the large amount of research has focused on the routing protocols needed in such an environment. In this paper, TCP Reno, Sack, and Tahoe versions are analysed using DSR protocol which is the representative On-Demand routing protocol in Ad-hoc wireless network. As the result of this simulation, we know that TCP Reno relatively has higher throughput than that of Sack and Tahoe, and TCP Reno has more stable performance than that of TCP Tahoe and Sack, regardless of the speed of mobile node and the size of topology.

Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile (모바일 상에서 비트율이 낮은 비디오 콘텐츠의 강인성을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.

Discovery of Frequent Sequence Pattern in Moving Object Databases (이동 객체 데이터베이스에서 빈발 시퀀스 패턴 탐색)

  • Vu, Thi Hong Nhan;Lee, Bum-Ju;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.179-186
    • /
    • 2008
  • The converge of location-aware devices, GIS functionalities and the increasing accuracy and availability of positioning technologies pave the way to a range of new types of location-based services. The field of spatiotemporal data mining where relationships are defined by spatial and temporal aspect of data is encountering big challenges since the increased search space of knowledge. Therefore, we aim to propose algorithms for mining spatiotemporal patterns in mobile environment in this paper. Moving patterns are generated utilizing two algorithms called All_MOP and Max_MOP. The first one mines all frequent patterns and the other discovers only maximal frequent patterns. Our proposed approach is able to reduce consuming time through comparison with DFS_MINE algorithm. In addition, our approach is applicable to location-based services such as tourist service, traffic service, and so on.

Dynamic Service Binding Method for Device-to-Device(D2D) Communication Based Cooperative Services (단말 간 직접 통신(D2D) 기반 협력 서비스를 위한 동적 서비스 바인딩 기법)

  • Lee, Meeyeon;Baek, Dusan;Lee, Jung-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.455-462
    • /
    • 2014
  • In recent years, various services in mobile environments due to the growth of mobile devices and related techniques like wireless networks. Furthermore, as the increasing communication traffic in cellular networks has become a new significant issue, many studies for device-to-device(D2D) communication and D2D-based cooperative services have been performed recently. In this paper, we design a smart agent system for D2D-based cooperative services and propose a dynamic service binding method based on service ontology. We classify roles of mobile devices for cooperative services by defining three types of smart agents, and construct a knowledge base in order to describe properties of 'service' unit. The proposed knowledge model, D2D cooperative service ontology, can enable a autonomous cooperative services between mobile devices by binding a requested service to the appropriate member device according to the real-time context in mobile environments.

Black Ice Formation Prediction Model Based on Public Data in Land, Infrastructure and Transport Domain (국토 교통 공공데이터 기반 블랙아이스 발생 구간 예측 모델)

  • Na, Jeong Ho;Yoon, Sung-Ho;Oh, Hyo-Jung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.257-262
    • /
    • 2021
  • Accidents caused by black ice occur frequently every winter, and the fatality rate is very high compared to other traffic accidents. Therefore, a systematic method is needed to predict the black ice formation before accidents. In this paper, we proposed a black ice prediction model based on heterogenous and multi-type data. To this end, 12,574,630 cases of 46 types of land, infrastructure, transport public data and meteorological public data were collected. Subsequently, the data cleansing process including missing value detection and normalization was followed by the establishment of approximately 600,000 refined datasets. We analyzed the correlation of 42 factors collected to predict the occurrence of black ice by selecting only 21 factors that have a valid effect on black ice prediction. The prediction model developed through this will eventually be used to derive the route-specific black ice risk index, which will be utilized as a preliminary study for black ice warning alart services.

A Study on Ground and Object Separation Techniques Utilizing 3D Point Cloud Data in Urban Air Mobility (UAM) Environments (UAM 환경에서의 3D Point Cloud Data 지면/객체 분리 기법 연구)

  • Bon-soo Koo;In-ho choi;Jae-rim Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.481-487
    • /
    • 2023
  • Recently, interest in UAM (Urban Air Mobility) has surged as a critical solution to urban traffic congestion and air pollution issues. However, efficient UAM operation requires accurate 3D Point Cloud data processing, particularly in separating the ground and objects. This paper proposes and validates a method for effectively separating ground and objects in a UAM environment, taking into account its dynamic and complex characteristics. Our approach combines attitude information from MEMS sensors with ground plane estimation using RANSAC, allowing for ground/object separation that isless affected by GPS errors. Simulation results demonstrate that this method effectively operates in UAM settings, marking a significant step toward enhancing safety and efficiency in urban air mobility. Future research will focus on improving the accuracy of this algorithm, evaluating its performance in various UAM scenarios, and proceeding with actual drone tests.

Data Central Network Technology Trend Analysis using SDN/NFV/Edge-Computing (SDN, NFV, Edge-Computing을 이용한 데이터 중심 네트워크 기술 동향 분석)

  • Kim, Ki-Hyeon;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.1-12
    • /
    • 2019
  • Recently, researching using big data and AI has emerged as a major issue in the ICT field. But, the size of big data for research is growing exponentially. In addition, users of data transmission of existing network method suggest that the problem the time taken to send and receive big data is slower than the time to copy and send the hard disk. Accordingly, researchers require dynamic and flexible network technology that can transmit data at high speed and accommodate various network structures. SDN/NFV technologies can be programming a network to provide a network suitable for the needs of users. It can easily solve the network's flexibility and security problems. Also, the problem with performing AI is that centralized data processing cannot guarantee real-time, and network delay occur when traffic increases. In order to solve this problem, the edge-computing technology, should be used which has moved away from the centralized method. In this paper, we investigate the concept and research trend of SDN, NFV, and edge-computing technologies, and analyze the trends of data central network technologies used by combining these three technologies.