• 제목/요약/키워드: Transfer Traffic System

Search Result 186, Processing Time 0.028 seconds

Initial Investigation on Consolidation with Adaptive Dynamic Threshold for ABR Multicast Connections in ATM Networks (비동기 전송모드 망의 점대다중점연결을 위한 적응동적임계치기반 병합알고리즘)

  • Shin, Soung-Wook;Cho, Kwang-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.11
    • /
    • pp.962-966
    • /
    • 2001
  • The major problem at a branch point for point-to-multipoint available bit rate(ABR) services in asynchronous transfer mode (ATM) networks is how to consolidate backward resource management(BRM) cells from each branch for a multicast connection. In this paper, we propose an efficient feedback consolidation algorithm based on an adaptive dynamic threshold(ADT) to eliminate the consolidation noise and the reduce the consolidation delay. The main idea of the ADT algorithm lies in that each branch point estimates the ABR traffic condition of the network through the virtual queue estimation and the transmission threshold of the queue level in branch points is adaptively controlled according to the estimation. Simulation results show that the proposed ADT algorithm can achieve a faster response in congestion status and a higher link utilization compared with the previous works.

  • PDF

Reliable & Sealable Multicast Communication in Real Time Collaborative Systems

  • Patel, Jayesh-M;Shamsul Sahibuddin
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1752-1755
    • /
    • 2002
  • The world wide web (WWW) already accounts f3r more Internee network traffic than any other application, including il and simple file transfer. It is also a collaborative technology in a weak sense of the word - it allows people to share information. Synchronous collaboration is where an interactive activity is simultaneous and in teal-time. Computer based real time collaborative systems like shared whiteboards. collaborative editor etc. are only beginning to emerge recently. These applications invoking more than two users exchanging information, require Multicast communication. Multicast communication is a transmission mode that is now supported by a variety of local and wide area networks. Multicasting enables multiparty communication across a wide area to sparsely distributed groups by minimizing the network load. Multicasting itself is one of the key technologies in the nut generation of the Internet This paper describes the technical issues from the aspect of multicast communication and its reliability in synchronous collaborative application.

  • PDF

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

Wireless Information Transfer System for Blind People (시각장애인들을 위한 무선 정보 전송 시스템)

  • Gil, Ki-Jong;Son, Byoung-June;Shin, Yong-Bin;Kim, Dong-woo;Lee, Su-Jin;Kim, Jong-Wook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.1
    • /
    • pp.63-69
    • /
    • 2017
  • This paper proposes a new device for a portable braille device using Atmega128 and solenoid magnets. This braille device is composed of three panels, and each panel has six solenoid dots. This device aims to help the disabled people who cannot communicate with others. As an application example, when a disabled people approach a traffic light, it sends a message via Bluetooth to the proposed device letting people recognize a dangerous area. The message converted from the database is based on standard braille chart.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

A Study on the security demand and Handoff of the pocket Internet (Wibro) with MIPv6 (MIPv6 의한 휴대인터넷(Wibro)의 보안요구 및 Handoff에 관한 연구)

  • Lee, Cheong-Jin;Kim, Do-Hwan;Kwon, Oh-Heung
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.161-168
    • /
    • 2006
  • Wibro(Wibro - Wireless Broadband Internet ) is a system that can accept effectively the IP-based Wireless data traffic with upward / downward asymmetric transfer characteristic by using a Wirelss broadband transfer technology in OFDMA/TDD (Orthogonal frequency Division Multiple Access/Time Division Duplex). Wibro service should support handover to maintain connection continuously in movement because the service is based on If system which is different from cellular system. Current Micro Mobility system and general Mobile If system has got a problem of delayed speed and lost packets during handover. IETF protocol has been proposed for minimizing this problem and its standardization is under process, mainly focused on Mip4, Mip6 and Mipshop WG. This article studies and analyzes an effective method of minimizing handover delay to improve the problem of WiBro system and its revitalization & outlook.

  • PDF

Queueing Analysis of the Finite Capacity ATM Multiplexer with the ON-OFF Input (ON-OFF 입력을 갖는 유한 크기 ATM 다중화기의 큐잉분석)

  • 김승환;박진수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.6
    • /
    • pp.889-894
    • /
    • 1993
  • Asychronous Transfer Mode (ATM) provides the means to transport different types of bursty traffic such as voice, video, and bulk data. To handle more efficiently the traffic sources and to increase the bandwidth utilization as much as possible, flexible statistical multiplexing schemes must be adopted for the ATM networks. This paper presents an efficient computational procedure to calculate the queue state distribution in a finite buffer queueing system with a number of independent input sources, and the cell loss probability is exactly calculated with the use of this recursion computation method. The cell loss probability is related to a ATM multiplexer with a homogeneous ON-OFF source is also investigated through numerical examples.

  • PDF

A Design Focuses on the Internal Structure of Double-level Tunnel (도심지 대심도 복층터널의 내부구조물 계획)

  • Park, Shin-Young;Jeong, Jae-Ho;Cho, Nam-Kak;Shin, Il-Jae;Sim, Dong-Hyun
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.1314-1321
    • /
    • 2010
  • The west express way which links south west area of the central city of Seoul has been notorious for extremely heavy traffics since its first opening in 1991(i.e. the average vehicle speed is less than 25km/h, a daily traffic is 112,000 and among them, more than 94% of the vehicles are the light vehicles). The city government recently initiated a new BTO(Build-Transfer-Operate) project as an alternative in releasing heavy traffic and a high construction cost. The proposed underground express road is the first double-level tunnel (i.e. a total length of road is 10,91km and the tunnel is 9.308km long) ever built in South Korea, while such tunnel system is not new worldwide as such A86 East tunnel in France, SMART tunnel in Malaysia, and Fuxing tunnel in China. This paper discusses major design issues regarding the internal structures such as deck slab, and secondary liner.

  • PDF

Targeted Nanomedicine that Interacts with Host Biology

  • Ju, Jin-Myeong
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2017.05a
    • /
    • pp.81-81
    • /
    • 2017
  • Nanotechnology is of great importance to molecular biology and medicine because life processes are maintained by the action of a series of molecular nanomachines in the cell machinery. Recent advances in nanoscale materials that possess emergent physical properties and molecular organization hold great promise to impact human health in the diagnostic and therapeutic arenas. In order to be effective, nanomaterials need to navigate the host biology and traffic to relevant biological structures, such as diseased or pathogenic cells. Moreover, nanoparticles intended for human administration must be designed to interact with, and ideally leverage, a living host environment. Inspired by nature, we use peptides to transfer biological trafficking properties to synthetic nanoparticles to achieve targeted delivery of payloads. In this talk, development of nanoscale materials will be presented with a particular focus on applications to three outstanding health problems: bacterial infection, cancer detection, and traumatic brain injury. A biodegradable nanoparticle carrying a peptide toxin trafficked to the bacterial surface has antimicrobial activity in a pneumonia model. Trafficking of a tumor-homing nanoprobes sensitively detects cancer via a high-contrast time-gated imaging system. A neuron-targeted nanoparticle carrying siRNA traffics to neuronal populations and silences genes in a model of traumatic brain injury. Unique combinations of material properties that can be achieved with nanomaterials provide new opportunities in translational nanomedicine. This framework for constructing nanomaterials that leverage bio-inspired molecules to traffic diagnostic and therapeutic payloads can contribute on better understanding of living systems to solve problems in human health.

  • PDF

A Survey on actual state or patients visited one emergency medical center (일개 응급센타에 내원한 일부 내원자의 실태조사)

  • Kwon, Seon Suk;Kim, Jin Hue
    • The Korean Journal of Emergency Medical Services
    • /
    • v.1 no.1
    • /
    • pp.11-19
    • /
    • 1997
  • We have reviewed 2.876 patients who visited the emergency room from May, 1996 to september, 1996 in order to look for a more appropriate management of the emergency medical system. The result were summarized as followings; 1. Considering sexual distribution, male patients were 59.6% more than female patients 40.4% and according to age categories, first decade of life was most frequent. 2. Distribution according to ca use is most common for the disease 79.8%, and next injury and traffic accident is 11.6%, 6.8%, respectively. 3. According to the department distribution, pediatrics accounted for 37.4%, internal medicine 21.1%, and emergency medicine 10.0%, and these three departments was 66.3% of total number of patients. 4. 67.0% of patients visited emergency room were discharged. Arrived time in emergency room, patients of 41.9% was visited from 17 to 1 hours. 5. Among 196 patients of traffic accident, 160 were male(81.5%) and 36 were female (18.5%). Distribution of the age is most common in 3rd and 4th decade for 63.2%, and region of injury were face 33.3%, head 22.2%, and chest 22.2% and follow-up measures after visiting emergency room is most common transfer hospital 40.8%.

  • PDF