• Title/Summary/Keyword: in-network join

Search Result 156, Processing Time 0.028 seconds

A study on the MVNO Wholesale Price in Competitive Communication Service Market (경쟁적인 통신서비스 시장에서 MVNO 도매대가 산정에 관한 연구)

  • Sawng, Yeong-Wha;Bae, Khee-Su;Jeon, Heung-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.2
    • /
    • pp.217-231
    • /
    • 2012
  • In the past, companies should make enormous facility investment and acquire a right to do business in order to join communication markets, but now they can do business without important facilities, such as communication networks. Such a movement to ease regulations about companies which want to newly join the communication industry is expected not only to change a competition frame of the mobile communication market but also to greatly affect the entire communication industry. Through this study aiming to look into a way to calculate a reasonable wholesale price related to the government's introduction of the Mobile Virtual Network Operator (MVNO) system, I came up with a following result. I applied the operating profit percentage and the ratio of operating gain to cost to the cost plus model and retail minus model, respectively, to calculate the wholesale price and found that when I calculated with the cost plus model applying the operating profit percentage, I could get the highest wholesale price. On the other hand, I got the lowest wholesale price with the retail minus model by applying the operating profit percentage. Division of expenses and calculation of profit percentage are important factors in calculating the wholesale price and such results are expected to help accurate calculation of the MVNO wholesale price.

Secondary System Initialization Protocol Using FFT-based Correlation Matching for Cognitive Radio Ad-hoc Networks

  • Yoo, Sang-Jo;Jang, Ju-Tae;Seo, Myunghwan;Cho, Hyung-Weon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.123-145
    • /
    • 2017
  • Due to the increasing demand for spectrum resources, cognitive radio networks and dynamic spectrum access draw a lot of research into efficiently utilizing limited spectrum resources. To set up cluster-based CR ad-hoc common channels, conventional methods require a relatively long time to successfully exchange the initialization messages. In this paper, we propose a fast and reliable common channel initialization protocol for CR ad-hoc networks. In the proposed method, the cluster head sequentially broadcasts a system activation signal through its available channels with a predetermined correlation pattern. To detect the cluster head's broadcasting channels and to join the cluster, each member node implements fast Fourier transform (FFT) and computes autocorrelation of an FFT bin sequence for each available channel of the member node. This is compared to the predetermined reference pattern. The join request and channel decision procedures are also presented in this paper. In a simulation study, the performance of the proposed method is evaluated.

Implementation of Jini based Messaging System in the Wired and Wireless Internet (유무선 인터넷에서 Jini기반 연동 System의 구현)

  • 권영현;이경희;이영준;박원배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.268-270
    • /
    • 2002
  • 홈 네트워크는 가정내의 모든 기기들을 하나의 통신망으로 묶어서 정보를 공유하고 제어하는데, 이 기능을 수행하는 소프트웨어가 홈 네트워크에서의 미들웨어이다 국내에서는 정보가전 미들웨어의 중요성을 인식하고 있으나 기술 개발이 초기단계로 주요한 단체 표준 미들웨어를 외국기술에 의존하고 있어 미들웨어에 대한 종합적인 기술 개발이 시급하다. 미들웨어 기술 중 Jini를 이용하여 유무선 인터넷에서 연동을 시키기에는 KVM기반인 소형 디바이스들에는 무리가 있다. 본 논문에서는 이러한 소형 디바이스들을 Jini Network에 Join하기 위한 System을 구축한다.

  • PDF

Global Networking of Cancer and NCD Professionals Using Internet Technologies: The Supercourse and mHealth Applications

  • Linkov, Faina;Padilla, Nicolas;Shubnikov, Eugene;LaPorte, Ronald
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.6
    • /
    • pp.472-478
    • /
    • 2010
  • Cancer is a leading cause of death around the world. Education is at the core of cancer prevention activities, especially programs targeting empowering existing public health workforce. In the past 10 years, researchers at the University of Pittsburgh have been building the Global Health Network Supercourse project, a library of over 4500 online lectures and a network of nearly 50000 public health professionals in 174 countries. As of November 2010, the overall number of Supercourse participants from Asia exceeds 7000 participants. The Supercourse network has been investigating methods for Internet based recruitment of cancer prevention professionals in order to network cancer experts locally and globally, including the use of mHealth technologies for cancer research education and for NCD registries. Supercourse is a tool that can offer a solution to the challenges of information sharing, especially in the field of NCDs and cancer. In this paper, we highlight the need for the development of Cancer Supercourse with Satellite in Asia and encourage faculty members from Asia to join the network.

End-Host Multicast Tree Protocol in Overlay Multicast Networks (오버레이 멀티캐스트 네트워크에서 종단 호스트 멀티캐스트 트리 프로토콜 기법에 관한 연구)

  • 노경택;이기영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.126-131
    • /
    • 2003
  • While the advantages of multicast delivery over multiple unicast deliveries is undeniable, the deployment of the IP multicast protocol has been limited to network domains under single administrative control. Deployment of inter-domain multicast delivery has been slow due to both technical and administrative reasons. For this reasons overlay multicasting technologies are recently proposed. We propose a End-Host Multicast Tree Protocol (EMTP) that searches two levels of the tree at a time until reaching to a leaf node and can select the nearest node that a new node try to join in the tree. Even if there is no available degree of the desirable node that a new node want to join, selecting the node as a potential parent by EMTP can reduce the number of tree switching with robustness of the tree and bring to ruduce the data delivery time.

  • PDF

Multicast Support in DiffServ Using Mobile Agents

  • El Hachimi, Mohamed;Abouaissa, Abdelhafid;Lorenz, Pascal
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.13-21
    • /
    • 2005
  • Many multicast applications, such as video-on-demand and video conferencing, desire quality of service (QoS) support from an underlying network. The differentiated services (DiffServ) approach will bring benefits for theses applications. However, difficulties arise while integrating native IP multicasting with DiffServ, such as multicast group states in the core routers and a heterogeneous QoS requirement within the same multicast group. In addition, a missing per-flow reservation in DiffServ and a dynamic join/leave in the group introduce heavier and uncontrollable traffic in a network. In this paper, we propose a distributed and stateless admission control in the edge routers. We also use a mobile agents-based approach for dynamic resource availability checking. In this approach, mobile agents act in a parallel and distributed fashion and cooperate with each other in order to construct the multicast tree satisfying the QoS requirements.

  • PDF

Secure Discovery Method of Devices based on a Home Server (홈서버기반의 유효한 디바이스 검색 방법)

  • Kim Do-Woo;Kim Geon-Woo;Lee Jun-Ho;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.745-748
    • /
    • 2006
  • With a home network, a device can dynamically join a home network, obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.

  • PDF

Mobile IP Multicast Protocol Losing Local Broadcast (로컬 브로드캐스트를 이용한 이동 IP 멀티캐스트 프로토콜)

  • 차용주;김화종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.208-217
    • /
    • 2001
  • In mobile Internet environment, providing multicast requires much more complex mechanism comparing with the unicast Mobile IP routing protocol. This is because multicast datagrams are sent to a group address that do not belong to a specific network. The IETF Mobile IP suggested two approaches for mobile multicasting, namely remote subscription and hi-directional tunneling. In remote subscription, a mobile node may join a group via a local multicast router on the visited subnet. Therefore remote subscription may cause much datagram loss while reconstructing the delivery tee. In bi-directional tunneling, a mobile node may join a group via a hi-directional tunnel to its home agent. Bi-directional tunneling may suffer from inefficient routing. In this paper, we proposed a new mobile multicasting protocol, Mobile If Multicast using Local Broadcast(MIMLB) which can receive multicast datagrams as fast as possible and optimize routing path for multicast delivery. The MIMLB protocol uses hi-directional tunneling to receive multicast datagrams. And the MIMLB protocol can resolve datagram duplicated problem and optimize routing path by using local broadcast. Simulation results show that MIMLB reduces delivery path length and optimizes multicast routing path when a mobile nod? moves into a foreign network.

  • PDF

A Method to Measure Damage Areas by the types of Railroad Hazardous Material through GIS Spatial Analysis (GIS 공간 분석기법을 통한 철도사고위험물질별 피해규모 자동추출방안)

  • Kim, Sang-Gyun;Kim, Si-Gon;Lee, Won-Tea
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1769-1778
    • /
    • 2009
  • Due to the industrialization and urbanization, the transport of hazardous materials increases, which rises possibilities in occurring prospective accidents in terms of hazardous material transport as well. This study applied the model developed from the previous research to analyze the scale of damage areas from the accidents related to hazardous material accidents, as well as suggested a method to measure automatically the scale of accident including casualties and environmental damage based on the guideline which suggests the quantities of hazardous materials exposed from an accident and was defined in the study of standardization for hazardous material classification. A buffering analysis technique of Geographic Information System (GIS) was applied for that. To apply the model which evaluates the scale of population and exposure to environment on each link, rail network, zones, rail accident data, rail freight trips, and locations of rivers etc were complied as a database for GIS analysis. In conclusion, a method to measure damage areas by the types of hazardous materials was introduced using a Clip and a Special Join technique for overlay analysis.

  • PDF

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.