• Title/Summary/Keyword: VBR

Search Result 240, Processing Time 0.027 seconds

Design and Analysis of a VOD Buffer Scheduler Using a Fixed Prefetch and Media Drop (고정 선반입과 미디어 Drop을 이용한 VOD 버퍼 스케쥴러의 설계 및 분석)

  • 문병철;박규석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.110-112
    • /
    • 2000
  • VBR로 압축된 멀티미디어 데이터는 비트 변화율이 매우 큰 편차로 변하기 때문에 자원 예약 관리가 매우 힘들다. 따라서 MPEG데이터의 참조 패턴을 오프라인으로 분석한 메타 테이블을 근거로 과부하 구간에서 미리 선반입하여 시스템의 활용율을 높이는 선반입 기법을 사용하고 있으나, 기존의 선반입 기법은 상영실패는 발생하지 않지만 선반입 임계슬롯이 증가하면서 버퍼 점유량이 증가되어 최소의 적재시간과 적재비용을 유지할 수 없다. 따라서 본 논문에서는 선반입 구간을 고정함으로써 적재비용과 적재시간을 일정한 범위 이하로 유지하면서 시스템 자원의 활용율을 높이는 방법을 제안한다. 그리고 고정 선반입 구간을 사용할 경우 발생하는 상영 실패를 GOP내의 B프레임에 한정하며, Drop모듈을 이용하여 미디어 질 저하를 전체 사용자에게 분산시키는 방법을 제안한다.

  • PDF

An Efficient Scheduling Scheme based on Fuzzy Prediction for IEEE 802.11e WLAN (IEEE 802.11e WLAN을 위한 효율적인 퍼지 예측 기반 스케줄링 방법)

  • Heo, Jong-Man;Lee, Kam-Rok;Kim, Nam-Hun;Kwon, Wook-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.1045-1046
    • /
    • 2006
  • The IEEE 802.11e medium access control (MAC) is an emerging standard to support Quality of Service (QoS). A HCCA (HCF controlled channel access) scheduler of the standard IEEE 802.11e is only efficient for flows with strict constant bit rate (CBR) characteristics. In this paper, we propose a new HCCA scheduling scheme that aims to be efficient for both CBR and VBR flows. The proposed scheme uses fuzzy queue length predictions to tune its time allocation to stations. We present a set of simulations and provide performance comparisons with the reference HCCA scheduler.

  • PDF

Analysis and response of Petya to Ransomware (랜섬웨어 Petya에 대한 분석과 대응방안)

  • Kim, Seon-Yong;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.425-426
    • /
    • 2017
  • Ransomware has caused a lot of damage by attacking disks of government agencies, financial institutions and corporations. This has been exploited for monetary damages and Taking personal information. In this paper, we describe the NTFS. Also describe Petya as the example of Ransomware. We used forensic techniques to analyze post-infection status and describes the method for MBR area recovery.

  • PDF

A Design and Evaluation of Protocol for VBR Service in Wireless Multimedia Network (멀티미디어 무선 네트워크에서 가변비트율 서비스를 위한 프로토콜의 설계 및 성능평가)

  • Lim Jae-Hwan
    • Journal of Digital Contents Society
    • /
    • v.2 no.1
    • /
    • pp.93-102
    • /
    • 2001
  • In this paper we proposed a wireless MAC Protocol called DTDD/PS (Dynamic Time Division Duplex using Poll/Select scheme), and throughput performance is evaluated using computer simulation. Simulation results indicate that the proposed DTDD/PS protocol increases the limitation of allowable loads that guarantee duality of services by dynamic allocation of slot based on the system status. Also the proposed protocol is shown to maintain stable throughput even in the case of traffic variations.

  • PDF

Characterization of Adaptive Modulators in Fixed Wireless ATM Networks

  • Mohammadi, Abbas;Kumar, Surinder
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.123-132
    • /
    • 2004
  • The various challenges to realize a fixed wireless ATM network are discussed and some solutions for these challenges are presented. In this paper, the capacity allocation in wireless ATM, the wireless link impact on ATM traffic, and the optimum utilization of the wireless network resonrces for a line of sight (LOS) winless ATM link are studied. An adaptive MQAM modulator is introduced to provide a suitable solution to these issues. The modulator level is adjusted using a unique QoS metric in a wireless network. The metric, termed modified effective bandwidth, takes into account the bandwidth demand, QoS requirements, and outage conditions of the wireless ATM link. A performance study using VBR MPEG-l video traffic in a fixed wireless channel (Ricean channel) demonstrates the advantages of the proposed system.

A Study on the Long-range Dependence and Self- similar Characteristic of Real-time Ethernet Traffic Trace (실시간 운영중인 Ethernet 트래픽의 장기간 의존성 및 Self-similar 특성에 대한 연구)

  • 김창호;이동철;박기식;류용희;최삼길;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.331-335
    • /
    • 1999
  • LAN, WAN 및 VBR 트래픽 특성에 관한 최근의 실험적 연구들은 기존의 Poisson 가정에 의한 모델들이 네트워크 트래픽의 장기간 의존성 및 self-similar 특성들을 과소평가 함으로써, 실제 트래픽의 특성을 제대로 나타낼 수 없다는 것을 지적해 왔다. 본 본문에서는 실시간 운영중인 Ethernet 트래픽을 측정하여, 통계학적인 접근법들을 통해 이러한 self-similar 특성들에 대해 평가하였다. 그리고 exactly self-similar 모델링인 Pareto-like ON/OFF 소스 모델링에 의한 트래픽과 기존의 Poisson 모델링을 비교 분석함으로써, self-similar 트래픽이 실제의 Ethernet 트래픽 특성을 잘 반영한다는 것을 보였다.

  • PDF

Region-based H.263 Video Codec with Effective Rate Control Algorithm for Low VBR Video

  • Song, Hwangjun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1755-1766
    • /
    • 1999
  • A region-based video codec based on the H.263+ standard is examined and its associated novel rate control scheme is proposed in this work. The region-based coding scheme is a hybrid method that consists of the traditional block DCT coding and the object-based coding. Basically, we adopt H.263+ as the platform, and develop a fast macroblock-based segmentation method to implement the region-based video codec. The proposed rate control solution includes rate control in three levels: encoding frame selection, frame-layer rate control and macroblock-layer rate control. The goal is to enhance the visual quality of decoded frames at low bit rates. The efficiency of proposed rate control scheme applied to the region-based video codes is demonstrated via several typical test sequences.

  • PDF

Variable Queue Sharing Mechanism for ATM Traffic (ATM 트래픽을 위한 가변큐공유(VQS) 메카니즘)

  • An, Jeong-Hui;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.742-749
    • /
    • 1999
  • This paper proposes the mechanism of cell buffering in the output buffer of ATM switch for the traffic with the different QOS in the ATM environment. The proposed mechanism, VQS(Variable Queue Sharing) can minimize the cell loss ratio(CLR) of bursty traffic through the sharing of CBR queue, VBR queue, ABR queue to maximize the utilization of queue resource. To evaluate VQS performance, we make simulator using Visual Slam 2.0. We compare the CLP and cell average delay of VQS and HOL, QLT_HOL using the bursty traffic patterns.

  • PDF

A Study on Adaptation of ATM Switch Queue under Self-Similar Traffic (Self-Similar 트래픽하에서 ATM 스위치 큐의 적응성에 관한 연구)

  • Jin, Seong-Ho;Im, Jae-Hong;Kim, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.327-334
    • /
    • 2001
  • 네트워크를 설계하고 서비스를 구현하는데 있어서 중요한 변수중의 하나는 트래픽의 특성을 파악하는 것이다. 기존의 트래픽 예측과 분석은 포아송(Poisson) 또는 마코비안(Markovian)을 기본으로 하는 모델을 사용하였다. LAN, WAN 및 VBR(Variable Bit Rate) 트래픽 특성에 관한 최근의 실험적 연구들은 기존의 포아송 가정에 의한 모델들이 네트워크 트래픽의 장기간 의존성 및 self-similar 특성들을 과소평가 함으로써 실제 트래픽의 특성을 제대로 나타낼 수 없다는 것을 지적해 왔다. 따라서 최근 실제 트래픽 모델과 유사한 모델로서 self-similarity 특성을 이용한 접근법이 대두되고 있다. 본 논문에서는 self-similarity 트래픽의 정의에 대해서 논한다. 그리고 실제 트래픽을 수집하고, 인위적으로 self-similarity한 트래픽과 포아송 모델을 적용시킨 트래픽을 발생시켜 비교한 다음 ATM 스위치의 큐(Queue)에 적용하였다. 본 논문에서는 ATM 스위치의 큐에 self-similarity 트래픽을 적용했을 경우 low bound상에서 버퍼 오버플로우 확률 및 셀 손실 확률에 대해 평가하였다.

  • PDF

Performance Analysis of ABR Congestion Control Algorithm using Self-Similar Traffic

  • Kim, Dong-Il;Jin, Sung-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.1
    • /
    • pp.15-21
    • /
    • 2004
  • One of the most important issues in designing a network and realizing a service is dealing with traffic characteristics. Recent experimental research on LAN, WAN, and VBR traffic properties has highlighted that real traffic specificities can not be displayed because the current models based on the Poisson assumption under estimate the long range dependency of network traffic and self-similar peculiarities. Therefore, a new approach using self-similarity characteristics as a real traffic model was recently developed. In This paper we discusses the definition of self-similarity traffic. Moreover, real traffic was collected and we generated self-similar data traffic like real traffic to background load. On the existing ABR congestion control algorithm transmission throughput with the representative ERICA, EPRCA and NIST switch algorithm show the efficient reaction about the burst traffic.