• Title/Summary/Keyword: heterogeneous information network

Search Result 757, Processing Time 0.03 seconds

MARS: Multiple Access Radio Scheduling for a Multi-homed Mobile Device in Soft-RAN

  • Sun, Guolin;Eng, Kongmaing;Yin, Seng;Liu, Guisong;Min, Geyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.79-95
    • /
    • 2016
  • In order to improve the Quality-of-Service (QoS) of latency sensitive applications in next-generation cellular networks, multi-path is adopted to transmit packet stream in real-time to achieve high-quality video transmission in heterogeneous wireless networks. However, multi-path also introduces two important challenges: out-of-order issue and reordering delay. In this paper, we propose a new architecture based on Software Defined Network (SDN) for flow aggregation and flow splitting, and then design a Multiple Access Radio Scheduling (MARS) scheme based on relative Round-Trip Time (RTT) measurement. The QoS metrics including end-to-end delay, throughput and the packet out-of-order problem at the receiver have been investigated using the extensive simulation experiments. The performance results show that this SDN architecture coupled with the proposed MARS scheme can reduce the end-to-end delay and the reordering delay time caused by packet out-of-order as well as achieve a better throughput than the existing SMOS and Round-Robin algorithms.

TCP-RLDM : Receiver-oriented Congestion Control by Differentiation for Congestion and Wireless Losses (TCP-RLDM: Congestion losses과 Wireless losses 구별을 통한 수신측 기반 혼잡제어 방안)

  • 노경택;이기영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.127-132
    • /
    • 2002
  • This paper aims to adjust the window size according to the network condition that the sender determines by making the receiver participating in the congestion levels. TCP-RLDM has the measurement-based transmission strategy based on the data-receiving rate complementing TCP with the property of Additive Increase / Multiplicative Decrease. The protocol can make an performance improvement by responding differently according to the property of errors-whether congestion losses or transient transmission errors - to confront dynamically in heterogeneous environments with wired or wireless networks and delay-sensitive or -tolerant applications. By collecting data-receiving rate and the cause of errors from the receiver and by enabling sender to use the congestion avoidance strategy before occuring congestion possibly, the protocol works well at variable network environments.

  • PDF

Adaptive Online Load Balancing Algorithm for Multimedia Service in Cellular Networks (셀룰러 네트워크 상에서 멀티미디어 서비스 제공을 위한 효율적인 온라인 부하분산 기법에 대한 연구)

  • Kim, Sung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.811-817
    • /
    • 2005
  • Efficient bandwidth management is necessary in order to provide high quality service to users in a multimedia wireless/mobile network. In this paper, I propose an on-line load balancing algorithm with preemption. This technique is able to balance the traffic load among cells accommodating heterogeneous multimedia services while ensuring efficient bandwidth utilization. The most important features of my algorithm are its adaptability, flexibility and responsiveness to current network conditions. In addition, my online scheme to control bandwidth adaptively is a cell-oriented approach. This approach has low complexity making it practical for real cellular networks. Simulation results indicate the superior performance of my algorithm.

A Model for Analyzing the Performance of Wireless Multi-Hop Networks using a Contention-based CSMA/CA Strategy

  • Sheikh, Sajid M.;Wolhuter, Riaan;Engelbrecht, Herman A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2499-2522
    • /
    • 2017
  • Multi-hop networks are a low-setup-cost solution for enlarging an area of network coverage through multi-hop routing. Carrier sense multiple access with collision avoidance (CSMA/CA) is frequently used in multi-hop networks. Multi-hop networks face multiple problems, such as a rise in contention for the medium, and packet loss under heavy-load, saturated conditions, which consumes more bandwidth due to re-transmissions. The number of re-transmissions carried out in a multi-hop network plays a major role in the achievable quality of service (QoS). This paper presents a statistical, analytical model for the end-to-end delay of contention-based medium access control (MAC) strategies. These strategies schedule a packet before performing the back-off contention for both differentiated heterogeneous data and homogeneous data under saturation conditions. The analytical model is an application of Markov chain theory and queuing theory. The M/M/1 model is used to derive access queue waiting times, and an absorbing Markov chain is used to determine the expected number of re-transmissions in a multi-hop scenario. This is then used to calculate the expected end-to-end delay. The prediction by the proposed model is compared to the simulation results, and shows close correlation for the different test cases with different arrival rates.

Authentication Mechanism of Devices in Smart Home Using Internet of Things (사물 인터넷망을 이용한 스마트 홈에서의 기기 인증 메카니즘)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.258-259
    • /
    • 2017
  • Recently, as science and technology is very growing, wire and wireless communication is merged and interconnected. Therefore, advanced internet technology allow all kinds of communication to integrate with heterogeneous device and sensors. The representative example is smart home network based on internet of things. Communication surroundings under IoT services are more complex. Conventional encryption techniques can't provide to IoT application because of its limited resources such as small memory capacity and low computing power. In this paper, we analyzed authentication procedure between home gateway and node in sensor under smart home network.

  • PDF

Implementation of Web-based Service Observation System(SOS) (웹기반 서비스 감시 시스템의 구현)

  • Cho, Seung-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.149-154
    • /
    • 2005
  • Computer center of university or company manages many non fault-tolerant servers and network devices to spare expenses. Because a service fault occurs sometimes by worm virus, system bug etc, we need a technique to detect it for continuing service. This paper introduces design and implementation of the system to observe many heterogeneous services, and web-based interface improving convenience of system manager. A system fault is reported to system managers via email or SMS by introduced service observation system, not service user. Then system managers can recover the system fault by this notification and minimize a fault period.

  • PDF

Technical analysis of Cloud Storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Bae, Yu-Mi;Jung, Sung-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1129-1137
    • /
    • 2013
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

A Study on Implementation of Return Channel for DVB-H with Efficient Interface Selection Algorithm in Heterogeneous Networks (이기종망 환경에서의 효율적인 인터페이스 선택을 통한 DVB-H 리턴채널 구현 방안)

  • Lim Jae-Won;Seo Sung-Hoon;Song Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.533-540
    • /
    • 2006
  • WDMB technology has merits of high bandwidth and high mobility. But WDMB also has uni-directional communication problem. This paper provides solution to supplements uni-directional communication problem of WDMB with embodying return channel using WWAN to offer high quality multimedia service to user. Also this paper proposes intelligent network interface selection algorithm using various network information and return channel type. As a result of simulation, our proposed scheme is better as compared with other handoff scheme in energy efficiency of $7{\sim}8%$ and about two time of handoff number of time decrease.

Study of standardization of coupling PLC Device in Ubiquitous Environment (유비쿼터스 환경에서 PLC 가전기기의 장치연결 표준화에 대한 연구)

  • Jean, Jae-hwan;Oh, Am-suk;Kang, Sung-in;Kim, Gwan-hyung;Choi, Sung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.227-230
    • /
    • 2009
  • This paper presents an architecture of various devices convergence for ubiquitous network. Integration of a variety of devices be can connect to every kind of device should not be constrained. We construct PLC to UPnP protocol architecture and UPnP Bridge Module for interconnecting Non-IP devices with heterogeneous network interfaces to UPnP devices on UPnP networks.

  • PDF