• Title/Summary/Keyword: Traffic information processing

Search Result 1,254, Processing Time 0.026 seconds

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

Network Management for the GSMP Open Interface in the MPLS (MPLS의 GSMP 개방형 인터페이스를 위한 망 관리)

  • Cha, Yeong-Uk;Kim, Jin-Nyeon;Kim, Chun-Hui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.227-234
    • /
    • 2002
  • MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.

Efficient Support for Adaptive Bandwidth Scheduling in Video Servers (비디오 서버에서의 효율적인 대역폭 스케줄링 지원)

  • Lee, Won-Jun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.297-306
    • /
    • 2002
  • Continuous multimedia applications require a guaranteed retricval and transfer rate of streaming data, which conventional file server mechanism generally does not provide. In this paper we describe a dynamic negotiated admission control and dick bandwidth scheduling framework for Continuous Media (CM : e.g., video) servers. The framework consists of two parts. One is a reserve-based admission control mechanism and the other part is a scheduler for continuous media streams with dynamic resource allocation to achieve higher utilization than non-dynamic scheduler by effectively sharing available resources among contending streams to improve overall QoS. Using our policy, we could increase the number of simultaneously running: clients that coo]d be supported and cot]d ensure a good response ratio and better resource utilization under heavy traffic requirements.

The RTP Payload Format for Telepointing (원격지정을 위한 RTP 페이로드 형식)

  • Jeon, Jae-U;Baek, Hui-Suk;O, Sam-Gwon;Im, Gi-Uk
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.29-36
    • /
    • 2002
  • For the efficient collaboration awareness, the CSCW (Computer-Supported Cooperative Work) systems provide functions such as telepointing, snap-shot, and document/project tracking. Among these, telepointing allows an event occurrence on the shared window of a local computing system to be presented in remote computing systems. Although telepointing has been mentioned in the literature, few research papers deal with the functional requirements and protocols for telepointing. This parer describes the functional requirements and payload format for RTP (Real-Time Transport Protocol)-based telepointing. In order to evaluate the performance of the proposed RTP-barred telepointing, we have implemented a whiteboard and compared it with that of the Microsoft Netmeeting. The evaluation results show that the proposed telepointing performs better in terms of CPU usage and the amount of network traffic.

R-CAT: Resilient Capacity-Aware Multicast Tree Construction Scheme (R-CAT : P2P기반 스트리밍 환경에서 노드의 능력을 고려한 내구적 멀티캐스트 트리 생성 기법)

  • Kim Eun-Seok;Han Sae-Young;Park Sung-Yong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.147-156
    • /
    • 2006
  • Recently, streaming service accounts for large part of internet traffic and it is becoming the most popular service. Because of P2P's scalability, P2P-based streaming system is proposed. There are frequent leave and join of a node. To overcome the group dynamics, Multiple Multicast Trees Methods were suggested. However, since they did not consider discrepancy in peers' capacity, it may cause the trees to be long and unstable. So we suggest Resilient Capacity-Aware Multicast Tree construction scheme (R-CAT) that promotes superior peer to upper position in the tree and construct more stable and short multicast trees. By simulation we can show that R-CAT cost more overhead packets for tree joining process, but it reduce the end-to-end delay of the resulting tree and the number of packets lost during the node joining and leaving processes much more than SplitStream.

Performance Analysis of TCP using DSR Routing Protocols in Ad-hoc Mobile Network (DSR 라우팅 프로토콜을 사용한 Ad-hoc 무선망에서의 TCP 성능 분석)

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.647-654
    • /
    • 2002
  • Ad-hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other supporting communication facilities (such as base stations, etc.). Therefore, the topology of an Ad-hoc network frequently changes due to the movement of mobile host, which nay lead to sudden packet loss. Recently, the large amount of research has focused on the routing protocols needed in such an environment. In this paper, TCP Reno, Sack, and Tahoe versions are analysed using DSR protocol which is the representative On-Demand routing protocol in Ad-hoc wireless network. As the result of this simulation, we know that TCP Reno relatively has higher throughput than that of Sack and Tahoe, and TCP Reno has more stable performance than that of TCP Tahoe and Sack, regardless of the speed of mobile node and the size of topology.

Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile (모바일 상에서 비트율이 낮은 비디오 콘텐츠의 강인성을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.

Discovery of Frequent Sequence Pattern in Moving Object Databases (이동 객체 데이터베이스에서 빈발 시퀀스 패턴 탐색)

  • Vu, Thi Hong Nhan;Lee, Bum-Ju;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.179-186
    • /
    • 2008
  • The converge of location-aware devices, GIS functionalities and the increasing accuracy and availability of positioning technologies pave the way to a range of new types of location-based services. The field of spatiotemporal data mining where relationships are defined by spatial and temporal aspect of data is encountering big challenges since the increased search space of knowledge. Therefore, we aim to propose algorithms for mining spatiotemporal patterns in mobile environment in this paper. Moving patterns are generated utilizing two algorithms called All_MOP and Max_MOP. The first one mines all frequent patterns and the other discovers only maximal frequent patterns. Our proposed approach is able to reduce consuming time through comparison with DFS_MINE algorithm. In addition, our approach is applicable to location-based services such as tourist service, traffic service, and so on.

Dynamic Service Binding Method for Device-to-Device(D2D) Communication Based Cooperative Services (단말 간 직접 통신(D2D) 기반 협력 서비스를 위한 동적 서비스 바인딩 기법)

  • Lee, Meeyeon;Baek, Dusan;Lee, Jung-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.455-462
    • /
    • 2014
  • In recent years, various services in mobile environments due to the growth of mobile devices and related techniques like wireless networks. Furthermore, as the increasing communication traffic in cellular networks has become a new significant issue, many studies for device-to-device(D2D) communication and D2D-based cooperative services have been performed recently. In this paper, we design a smart agent system for D2D-based cooperative services and propose a dynamic service binding method based on service ontology. We classify roles of mobile devices for cooperative services by defining three types of smart agents, and construct a knowledge base in order to describe properties of 'service' unit. The proposed knowledge model, D2D cooperative service ontology, can enable a autonomous cooperative services between mobile devices by binding a requested service to the appropriate member device according to the real-time context in mobile environments.

Black Ice Formation Prediction Model Based on Public Data in Land, Infrastructure and Transport Domain (국토 교통 공공데이터 기반 블랙아이스 발생 구간 예측 모델)

  • Na, Jeong Ho;Yoon, Sung-Ho;Oh, Hyo-Jung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.257-262
    • /
    • 2021
  • Accidents caused by black ice occur frequently every winter, and the fatality rate is very high compared to other traffic accidents. Therefore, a systematic method is needed to predict the black ice formation before accidents. In this paper, we proposed a black ice prediction model based on heterogenous and multi-type data. To this end, 12,574,630 cases of 46 types of land, infrastructure, transport public data and meteorological public data were collected. Subsequently, the data cleansing process including missing value detection and normalization was followed by the establishment of approximately 600,000 refined datasets. We analyzed the correlation of 42 factors collected to predict the occurrence of black ice by selecting only 21 factors that have a valid effect on black ice prediction. The prediction model developed through this will eventually be used to derive the route-specific black ice risk index, which will be utilized as a preliminary study for black ice warning alart services.