• Title/Summary/Keyword: buffer overflow

Search Result 141, Processing Time 0.025 seconds

A Linear System Approach to Serving Gaussian Traffic in Packet-Switching Networks (패킷 교환망에서 가우스 분포 트래픽을 서비스하는 선형 시스템 접근법)

  • Chong, Song;Shin, Min-Su;Chong, Hyun-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.553-561
    • /
    • 2002
  • We present a novel service discipline, called linear service discipline, to serve multiple QoS queues sharing a resource and analyze its properties. The linear server makes the output traffic and the queueing dynamics of individual queues as a linear function of its input traffic. In particular, if input traffic is Gaussian, the distributions of queue length and output traffic are also Gaussian with their mean and variance being a function of input mean and input power spectrum (equivalently, autocorrelation function of input). Important QoS measures including buffer overflow probability and queueing delay distribution are also expressed as a function of input mean and input power spectrum. This study explores a new direction for network-wide traffic management based on linear system theories by letting us view the queueing process at each node as a linear filter.

Performance Analysis of Error Control Techniques Using Forward Error Correction in B-ISDN (B-ISDN에서 Forward Error Correction을 이용한 오류제어 기법의 성능분석)

  • 임효택
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1372-1382
    • /
    • 1999
  • The major source of errors in high-speed networks such as Broadband ISDN(B-lSDN) is buffer overflow during congested conditions. These congestion errors are the dominant sources of errors in 1high-speed networks and result in cell losses. Conventional communication protocols use error detection and retransmission to deal with lost packets and transmission errors. However, these conventional ARQ(Automatic Repeat Request) methods are not suitable for the high-speed networks since the transmission delay due to retransmissions becomes significantly large. As an alternative, we have presented a method to recover consecutive cell losses using forward error correction(FEC) in ATM(Asynchronous Transfer Mode)networks to reduce the problem. The performance estimation based on the cell discard process model has showed our method can reduce the cell loss rate substantially. Also, the performance estimations in ATM networks by interleaving and IP multicast service are discussed.

  • PDF

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System(PartII:Multiple MMBS service schemes for RMIS QoS guarantee) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조(2부:QoS 보장을 위한 다중 MMBS 서비스 구조))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2320-2334
    • /
    • 1999
  • In this paper, we propose multiple IS-MMBS service schemes for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. In MMBS service area, when new arrival RMIMS terminals have real-time traffic characteristic or large traffic bandwidth, only single IS-MMBS service scheme can not guarantee RMIMS terminal's QoS(quality of service) such as buffer overflow or packet loss. In this case, the proposed multiple IS-MMBS service schemes can be effectively used for QoS service of RMIMS terminal. According to clustering method of RMIMS terminals and MMBS segment method, the proposed schemes can be divided into terminal segment method, region segment method, application based segment method, traffic type based segment method, overlapping segment method and hybrid segment method

  • PDF

A Feasible Condition for EDF-based Scheduling of Periodic Messages on a Synchronized Switched Ethernet (동기식 스위칭 이더넷에서 주기적 메시지에 대한 마감시간우선 기반 메시지 스케쥴링을 위한 조건)

  • Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.4
    • /
    • pp.403-410
    • /
    • 2010
  • The switched Ethernet has many features for real-time communications such as providing traffic isolation, large bandwidth, and full-duplex links, and so on. The switched Ethernet, however, cannot guarantee the timely delivery of a real-time message because message delay increases when collisions occurs at the output ports and message loss can even occur due to the overflow at the output buffer. Recently, many research efforts have been done to use the switched Ethernet as an industrial control network. In the industrial control network, sensors periodically sense the physical environment and transmit the sensed data to an actuator, and the periodic messages from sensors to actuators have typically real-time requirements such that those messages must be transmitted within their deadlines. This paper first suggests a feasible condition for EDF (Earliest Deadline First)-based scheduling of periodic messages on a synchronized switched Ethernet and a message scheduling algorithm which satisfies the proposed feasible condition. Pedreiras, et al. [10] suggested a feasible condition for message scheduling on the Ethernet (shared media Ethernet), but there has been no research result on the scheduling condition on the switched Ethernet until now. We compared the real-time message scheduling capacity between the Ethernet and the switched Ethernet by simulation. The simulation result shows that the message scheduling capacity of the Ethernet has almost remained constant as the number of nodes on the network increases, but, in the case of the switched Ethernet, the message scheduling capacity has increased linearly according to the number of nodes on the network.

MPEG-4 Rate Control Method with Spatio-Temporal Trade-Offs (시공간 화질의 절충을 고려한 MPEG-4 비트율 제어 알고리즘)

  • Lee Jeong-Woo;Ho Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.1
    • /
    • pp.47-56
    • /
    • 2004
  • This paper describes a new bit allocation algorithm that can achieve a constant bit rate when coding multiple video objects, while improving rate-distortion (R-D) performance over the VM5 method for MPEG-4 object-based video coding. In particular, we propose two models to estimate the rate-distortion characteristics of coded objects as well as skipped objects. Based on the proposed models, we present several R-D coding modes with spatio-temporal trade-offs to improve coding efficiency. The proposed algorithm is performed at the object level for object-based video coding. Simulation results demonstrate moderate improvement at low as well as high bit rates. The proposed algorithm can produce the actual coded bits very close to the target bits over a wide range of bit rates. Consequently, the proposed algerian has not experienced any buffer overflow or underflow over the bit rates between 32 kbps and 256 kbps.

An Analysis of Potential Environmental Impact Reduction for Combined Sewer Overflow Project using a LCA Methodology (LCA 기법을 활용한 합류식 하수도 월류수 사업의 잠재적 환경영향 저감효과 분석)

  • Jo, Hyun-Jung;Song, Jang-Hwan;Hwang, Yong-Woo;Park, Ji-Hyoung
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.25 no.6
    • /
    • pp.885-892
    • /
    • 2011
  • In this study, LCA(Life Cycle Assessment) on 'Saemangum CSO Project' was carried out to evaluate environmental impact which occurred during the construction and operation periods and the potential environmental impact reduction was analyzed by comparing production and reduction level of pollution loads. LCA was conducted out according to the procedure of ISO14040 which suggested Goal and Scope Definition, Life Cycle Inventory Analysis, Life Cycle Impact Assessment and Interpretation. In the Goal and Scope Definition, the functional unit was 1 m3 of CSO, the system boundary was construction and operation phases, and the operation period was 20 years. For the data collection and inventory analysis, input energies and materials from civil, architecture, mechanical and electric fields are collected from design sheet but the landscape architecture field is excepted. LCIA(Life Cycle Impact Assessment) was performed following the procedure of Eco-Labelling Type III under 6 categories which were resource depletion, eutrophication, global warming, ozone-layer destruction, and photochemical oxide formation. In the result of LCA, 83.4% of environmental impact occurred in the construction phase and 16.6% in the operation phase. Especially 78% of environmental impact occurred in civil works. The Global warming category showed the highest contribution level in the environmental impact categories. For the analysis on potential environmental impact reduction, the reduction and increased of environmental impact which occurred on construction and operation phases were compared. In the case of considering only the operation phase, the result of the comparison showed that 78% of environmental impact is reduced. On the other hand, when considering both the construction and operation phases, 50% of environmental impact is increase. Therefore, this study showed that eco-friendly material and construction method should be used for reduction of environmental impact during life cycle, and it is strongly necessary to develop technology and skills to reduce environmental impact such as renewable energies.

A Bitrate Control considering Interframe Variance of Image for H.264/AVC (화면간 영상 변화량을 고려한 H.264/AVC 비트율 제어 방법)

  • Son Nam-Rye;Lee Guee-Sang
    • The KIPS Transactions:PartB
    • /
    • v.13B no.3 s.106
    • /
    • pp.245-254
    • /
    • 2006
  • In this work, a new rate control algorithm for transmission of H.264/AVC video bit stream through CBR(constant bit rate) channel is proposed. The proposed algorithm predicts target bit rate and MAD(mean of absolute difference) for current frame considering image complexity variance between neighboring backward and current images. In details, respective linear regression analysis for MAD and encoded bit rate against image complexity variance produce correlation parameters. Additionally, it uses frame skip technique to maintain bit stream within a manageable range and protect buffer from overflow or underflow. Implementation and experimental results show that the proposed algorithm can provide accurate bit allocation, and can effectively visual degradation after scene changes. Also our proposed algorithm encodes the video sequences with less frame skipping compared to the existing rate control for H.264/AVC.

Content-based Rate control for Hybrid Video Transmission (혼합영상 전송을 위한 내용기반 율제어)

  • 황재정;정동수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8B
    • /
    • pp.1424-1435
    • /
    • 2000
  • A bit-rate controller that can achieve a constant bit rate when coding object-based video sequences is an important part to achieve an adaptation to bit-rate constraints, desired video quality, distribution of bits among objects, relationship between texture and shape coding, and determination of frame skip or not. Therefore we design content-based bit rate controller which will be used for relevant bit-rate control. The implementation is an extension of MPEG-4 rate control algorithm which employs a quadratic rate-quantizer model. The importance of different objects in a video is analyzed and segmented into a number of VOPs which are adaptively bit-allocated using the object-based modelling. Some test sequences are observed by a number of non-experts and interests in each object are analysed. The initial total target bit-rate for all objects is obtained by using the proposed technique. Then the total target bits are jointly analyzed for preventing from overflow or underflow of the buffer fullness. The target bits are distributed to each object in view of its importance, not only of statistical analysis such as motion vector magnitude, size of object shape, and coding distortion of previous frame. The scheme is compared with the rate controller adopted by the MPEG-4 VM8 video coder by representing their statistics and performance.

  • PDF

Modeling Heavy-tailed Behavior of 802.11b Wireless LAN Traffic (무선 랜 802.11b 트래픽의 두꺼운 꼬리분포 모델링)

  • Yamkhin, Dashdorj;Won, You-Jip
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.357-365
    • /
    • 2009
  • To effectively exploit the underlying network bandwidth while maximizing user perceivable QoS, mandatory to make proper estimation on packet loss and queuing delay of the underling network. This issue is further emphasized in wireless network environment where network bandwidth is scarce resource. In this work, we focus our effort on developing performance model for wireless network. We collect packet trace from actually wireless network environment. We find that packet count process and bandwidth process in wireless environment exhibits long range property. We extract key performance parameters of the underlying network traffic. We develop an analytical model for buffer overflow probability and waiting time. We obtain the tail probability of the queueing system using Fractional Brown Motion (FBM). We represent average queuing delay from queue length model. Through our study based upon empirical data, it is found that our performance model well represent the physical characteristics of the IEEE 802.11b network traffic.

  • PDF

Detection Mechanism against Code Re-use Attack in Stack region (스택 영역에서의 코드 재사용 공격 탐지 메커니즘)

  • Kim, Ju-Hyuk;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3121-3131
    • /
    • 2014
  • Vulnerabilities related to memory have been known as major threats to the security of a computer system. Actually, the number of attacks using memory vulnerability has been increased. Accordingly, various memory protection mechanisms have been studied and implemented on operating system while new attack techniques bypassing the protection systems have been developed. Especially, buffer overflow attacks have been developed as Return-Oriented Programing(ROP) and Jump-Oriented Programming(JOP) called Code Re-used attack to bypass the memory protection mechanism. Thus, in this paper, I analyzed code re-use attack techniques emerged recently among attacks related to memory, as well as analyzed various detection mechanisms proposed previously. Based on the results of the analyses, a mechanism that could detect various code re-use attacks on a binary level was proposed. In addition, it was verified through experiments that the proposed mechanism could detect code re-use attacks effectively.