• Title/Summary/Keyword: overhead saving

Search Result 40, Processing Time 0.022 seconds

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

Improving Energy Consumption of Directed Diffusion with Mobile Sinks By Prefetching and Pruning (이동 싱크 환경에서 사전경로설정과 가지치기를 이용한 Directed Diffusion의 에너지 소모 개선)

  • Kim, Sung-Hoon;Lee, Sang-Mok;Yang, Hyun;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • In dynamic wireless sensor networks where sources and sinks are moving or are created/died, control overheads for route establishment are increased and thus become one of the major factors for energy consumption. This study introduces prefetching and pruning for Directed Diffusion to remove redundant control messages. Prefetching collects path information for each event with "AnyEvent" in advance and gives quick responses without further flooding of requests. Pruning accumulates history information from previous requests and replies, and then stops forwarding a request towards where the event does not exist. Simulation results with ns show that it is possible to build implicit and soft infrastructures within a Directed Diffusion system through these active collection and passive accumulation and they improve energy consumption more as control overhead goes higher.

Segment-based Buffer Management for Multi-level Streaming Service in the Proxy System (프록시 시스템에서 multi-level 스트리밍 서비스를 위한 세그먼트 기반의 버퍼관리)

  • Lee, Chong-Deuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.135-142
    • /
    • 2010
  • QoS in the proxy system are under heavy influence from interferences such as congestion, latency, and retransmission. Also, multi-level streaming services affects from temporal synchronization, which lead to degrade the service quality. This paper proposes a new segment-based buffer management mechanism which reduces performance degradation of streaming services and enhances throughput of streaming due to drawbacks of the proxy system. The proposed paper optimizes streaming services by: 1) Use of segment-based buffer management mechanism, 2) Minimization of overhead due to congestion and interference, and 3) Minimization of retransmission due to disconnection and delay. This paper utilizes fuzzy value $\mu$ and cost weight $\omega$ to process the result. The simulation result shows that the proposed mechanism has better performance in buffer cache control rate, average packet loss rate, and delay saving rate with stream relevance metric than the other existing methods of fixed segmentation method, pyramid segmentation method, and skyscraper segmentation method.

An Estimation of Performance Test and Uncertainty of Measurement for a Large Axial-flow Fan Based on ANSI/AMCA 210 Standard (ANSI/AMCA 210 기준에 의한 대형 축류 송풍기의 성능시험 및 측정 불확도 평가)

  • Ko, Hee-Hwan;Chung, Cheol-Young;Kim, Kyung-Yup
    • The KSFM Journal of Fluid Machinery
    • /
    • v.17 no.2
    • /
    • pp.24-29
    • /
    • 2014
  • In general, a large-capacity axial flow fan is used for industrial processes or ventilation in a social overhead capital infrastructure. The main characteristics of the large axial-flow fan need a lot of electrical power consumption and operate 24 hours a day, 365 days a year. Since the large axial flow fan consumes several hundreds to thousands kW per hour, both manufacturer and consumer are struggling to select high efficiency products for saving energy and reducing operation cost. Therefore, the performance testing should be accurately conducted in experimental equipments. The performance estimation and uncertainty of measurement of the axial-flow fan gathered from the result from nozzle shaped testing equipments certified with ANSI/AMCA standard and duct shaped testing equipment under the same experimental condition. The experimental results from both facilities have maximum 17% differences in performance evaluation and uncertainty of measurement. As considering that the differences, it is doubt about the reliability of testing result. The test was repeated with the specific term during 12 months because it is important to fully reflect the real conditions and to decide the repeatability of data. The evaluation of duct type testing facilities was failed to get an uncertainty measure. Testing results were previously published. As a series of previous paper, axial fan (∅1690 mm) and duct type testing facilities were fabricated. The purpose of fabricating testing equipment was testing an uncertainty measurement under the controlled environments.

New Approach to MAC Protocol for Multiple AUV (수중 Multiple AUV를 위한 MAC 프로토콜 설계)

  • Cho, A-Ra;Park, Jong-Won;Kim, Seung-Geun;Choi, Young-Chol;Lim, Yong-Kon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.213-216
    • /
    • 2007
  • The paper deals with a approach to underwater acoustic based Ad-hoc communication, which allows major design strategies for Media Access Control (MAC) within a group of the autonomous underwater vehicles(AUV). The proposed MAC aims at deploying AUV-centric star topology, which minimizes overhead of sensor nodes and improves energy-efficiency. Furthermore, that is also well under long and unknown propagation delays of the underwater acoustic medium. The implemented MAC protocol makes it easier to achieve frame synchronization than TDMA due to deploying localized schedule time, in addition to saving energy consumption by letting nodes sleep. It is also superior to MACA and MACAW in terms of propagation delay. This scalable centralized protocol has the potential to serve as a primer for development of MAC protocol for future underwater acoustic based ad-hoc networks.

  • PDF

A case study of life cycle cost analysis on high pressure sodium lamp and LED lamp for tunnel lighting (터널 조명 고압나트륨램프와 LED램프의 LCC 분석 사례 연구)

  • Lee, Gyu-Phil;Kim, Jeong-Heum
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.5
    • /
    • pp.315-323
    • /
    • 2021
  • Tunnel is the most energy-consuming structure in road due to the characteristic of using artificial lighting during day and night. Therefore, tunnel lights are being replaced by LED lamp that have advantages with respect to low power consumption. The best use of social overhead capital can be expected by considering the life cycle cost, because to tunnel structures are accompanied by a series of medium-to-long-term and continuous processes of replacing auxiliary facilities. In this study, the saving effect by LCC analysis was quantitatively analyzed by replacing tunnel light sources from high-pressure sodium lamps to LED lamps. The effect of reducing the replacement cycle by increasing the life of the lamps and the resulting maintenance cost is very significant, on replacing tunnel lighting light sources with LED lamp.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

A Study on the Lightweight Encryption Method for Secure MQTT Communication (안전한 MQTT 통신을 위한 경량 암호화 방법에 관한 연구)

  • Jeon, Yu-ran;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.82-84
    • /
    • 2022
  • In recent years, research has been actively conducted to solve overhead problems caused by the increase in the number of IoT devices. MQTT, one of the IoT lightweight protocols for resolving performance degradation in IoT environments, is standardized to enable efficient operation in many-to-many communication environments, but there is a security vulnerability as it does not provide encryption by default. Although TLS communication technology can be applied to solve these problems, it is difficult to meet IoT's lightweight power-saving requirements. This paper introduces the latest MQTT communication encryption trends and analyzes IoT applicability by comparing TLS encryption and payload encryption methods.

  • PDF

Design and Implementation of 3D Studio Max Plug-In in Collaborative Systems (협력시스템에서 3D 스튜디오 맥스 플러그인 설계 및 개발)

  • Kwon, Tai-Sook;Lee, Sung-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.5
    • /
    • pp.498-509
    • /
    • 2001
  • Collaborative systems allow users, who may be far removed from each other geographically, to do collaborative work such as 3D animation, computer game, and industrial design in a single virtual space. This paper describes our experience to develop a collaborative system framework that aims at expanding the some functions of a stand-alone visual modeling tool, called 3D Studio Max, into those of the distributed collaborative working environments. The paper mainly deals with design and implementation of a 3D shared-object Plug-In with respect to the 3D Studio Max Plug-In Software Development Kit in the distributed collaborative system developed by the authors. There are two major functions of the proposed scheme; one is to write 3D object-information to the shared memory after extracting it from the 3D Studio Max, the other is to create 3D objects after retrieving them from the shared memory. Also, the proposed scheme provides a simple way of storing 3D objects that have variable size, by means of shared memory which located in between the collaborative system clients and 3D studio Max. One of the remarkable virtures of the Plug-In is to reduce a considerable amount of shared object data which in consequence can mitigate the network overhead. This can be achieved by the fact that the system is able to extract a minimum amount of 3D objects that are required to transmit. Also, using the proposed scheme, user can facilitate 3D Studio Max into distributed collaborative working environments. This, in consequence give many benefits such as saving time as well as eliminating space constraints in the course of 3D modeling when we are under industrial design process.

  • PDF

An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database (스마트폰 데이터베이스 환경에서 암호화된 데이터에 대한 효율적인 키워드검색 기법)

  • Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.739-751
    • /
    • 2014
  • We are using our smartphone for our business as well as ours lives. Thus, user's privacy data and a company secret are stored at smartphone. By the way, the saved data on smartphone database can be exposed to a malicous attacker when a malicous app is installed in the smartphone or a user lose his/her smartphone because all data are stored as form of plaintext in the database. To prevent this disclosure of personal information, we need a database encryption method. However, if a database is encrypted, it causes of declining the performance. For example, when we search specific data in condition with encrypted database, we should decrypt all data stored in the database or search sequentially the data we want with accompanying overhead[1]. In this paper, we propose an efficient and searchable encryption method using variable length bloom filter under limited resource circumstances(e.g., a smartphone). We compare with existing searchable symmetric encryption. Also, we implemented the proposed method in android smartphone and evaluated the performance the proposed method. As a result through the implementation, We can confirm that our method has over a 50% improvement in the search speed compared to the simple search method about encrypted database and has over a 70% space saving compared to the method of fixed length bloom filter with the same false positive rate.