• Title/Summary/Keyword: provisioning

Search Result 377, Processing Time 0.022 seconds

A Predictive Connection Admission Control Using Neural Networks for Multiclass Cognitive Users Radio Networks (멀티 클래스 인지 사용자 네트워크에서 신경망을 이용한 예측 연결수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.435-441
    • /
    • 2013
  • This paper proposes a neural net based-predictive connection admission control (CAC) scheme for multiclass users in wireless cognitive radio networks. We classifies cognitive users(cu) into real and non real time services, and then permit only real time services to reserve the demanded resource for spectrum handoff in guard channel for provisioning the desired QoS. Neural net is employed to predict primary user's arrival on time and demanded channels. Resource scheduling scheme is based on $C_IA$(cognitive user I complete access) shown in this paper. For keeping primary users from interference, the CAC is performed on only cognitive user not primary user. Simulation results show that our schemes can guarantee the desired QoS by cognitive real time services.

Decreasing Transmission Power with Provisioning Quality of Experience in Mobile Communication Networks (이동통신망에서 송신전력 절감 및 QoE 보장을 위한 전력관리 방안)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2219-2225
    • /
    • 2016
  • Mobile communication systems should be able to support multimedia traffics with limited transmit power due to the frequency reuse for maximizing the channel accommodation. Real-time data is very sensitive to delay, and they need to be transmitted instantly. On the other hand, non-real time data is less sensitive to delay, and their packet loss can be handled more flexibly. Therefore an adaptive resource management scheme is essentially required which enables to keep the minimal power allocated in the base station while guaranteeing the user requirements for QoE within a permissible range. Power-saving techniques are required in order to support multimedia services in the mobile networks because the power consumption increases greatly with the transmission rate increase. This paper proposes a novel scheme which enables to keep the allocated power minimal while guaranteeing the user requirements for QoE within a permissible range.

A Study on Development of A GPS navigation system based on RFID which contains location information (위치정보가 기록된 RFID를 이용한 택배차량용 내비게이션 시스템 개발에 관한 연구)

  • Shim, Jin-Bum;Han, Yeong-Geun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.113-118
    • /
    • 2010
  • "Domestic delivery service" is defined the service to deliver goods or packages from point of senders to point of receiver. With the characteristics of door to door, it is must a service provider should know the exact location of destination assuring best utilization of moving path. Generally, location information consist of postal code and address only, which result in difficulties to identify the precise location of destination. It is relatively less correlated between the information that address refers and practical location in Korea address system. For example, the next door to house number 100 is not always house number 101. Therefore, a delivery man additionally uses a paper map or a GPS navigation which carry extra job to input every code of location to the device in order to know precise location. It is also very inconvenient that every delivery man identify the location that address information refers and make a personal decision of the optimum moving path dropping each destination without calculating provisioning process of whole delivery path. As explained above, it is inefficient to find information delivery service required and to generate the optimum path. In results, these difficulties bring in delay of service and increase of cost. In this point, the contents of the thesis suggest a GPS navigation system easy to obtain accuracy of delivery information which enables to automate optimum moving path based on RFID which contains location information.

A Hybrid Cloud-P2P Architecture for Scalable Massively Multiplayer Online Games (확장가능한 대규모 멀티플레이어 온라인 게임을 위한 클라우드와 P2P 하이브리드 구조)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.73-81
    • /
    • 2020
  • Today's massively multiplayer online games(MMOGs) can contain millions of synchronous players scattered across the world and participating with each other within a single shared game. The increase in the number of players in MMOGs has led to some issues with the demand of server which generates a significant increase in costs for the game industry and impacts to the quality of service offered to players. In dealing with a considerable scale of MMOGs, we propose a cloud computing and peer-to-peer(P2P) hybrid architecture in this paper. Given the two nearly independent functionalities of P2P and cloud architectures, we consider the possibility of fusing these two concepts and researching the application of the resultant amalgamation in MMOGs. With an efficient and effective provisioning of resources and mapping of load, the proposed hybrid architecture relieves a lot of computational power and network traffic, the load on the servers in the cloud while exploiting the capacity of the peers. The simulation results show that MMOGs based on the proposed hybrid architecture have better performance and lower traffic received compared with MMOGs based on traditional client-server system.

Implementation of Bandwidth Broker and Router for End-to-end QoS in Differentiated Service Networks (종단간 QoS 보장을 위한 차별화 서비스 지원 대역 브로커 및 라우터 구현)

  • 최영수;박기현;이성협;이강원;채희성;한태만;조유제
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.125-135
    • /
    • 2003
  • In this paper, we developmed and implemented router and bandwidth broker that provides end-to-end QoS in differentiated service IP networks. Our design goal is to provide end-to-end premium service using the EF PHB. The bandwidth broker and router were implemented in the FreeBSD 4.6 platform. For the DiffServ router, we implemented QoS daemon, rollback managment routine, monitoring, and COPS-PR client. Also, Ive implemented bandwith broker which has SLS and resource management function, and signaling protocols for interfacing intra-and inter-domain. On the testbed, we have validated and evaluated the performance of the implemented DiffServ router and bandwidth broker using the inter-domain signaling protocol client in MS Windows platform. The test results show that the end-to-end QoS can be guaranteed for the inter-domain diffServ by the implemented system.

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

A Policy on WLAN MAC Parameters Usage for QoS Provisioning (QoS 지원을 위한 WLAN MAC 파라미터 운용 방안)

  • Jeong, Dae-In;Hong, Chang-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.698-706
    • /
    • 2005
  • In this paper, we investigate the parameters of the IEEE 802.11e MAC protocol, CWmin and AIFS, in terms of their capability of QoS control. The delay and the bandwidth performances are selected as the QoS medics to examine the characteristics of those parameters. A policy on MAC parameters usage, thereby, is proposed. We regard the MAC-level traffic classification as the differentiation in the channel accessibility, and thus the delay differentiation is referred to a main issue of the class-level QoS control. Realizing the tight relationship between the delay performance and the parameter AIFS, we derive an analytical expression of their relationship through an analysis of the MAC mechanism. Various simulations are examined which show the validity of our assertions, and a policy on the parameters usage is proposed based on those observations.

Multiuser Resource Allocation Scheme Considering Link Layer Effective Capacity in OFDMA Systems (직교 주파수 분할 다원 접속 시스템에서 실효 링크 계층 용량을 고려한 다중 사용자 자원 할당 기법)

  • Sung Si-Hwan;Yoo Myung-Sik;Shin Yo-An;Lee Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.508-516
    • /
    • 2006
  • The explosive growth of wireless network users and the existence of various wireless services have demanded high rate throughput as well as user's QoS guarantees. Towards this, this paper proposes QoS-oriented subcarrier allocation scheme considering the QoS provisioning of multiple users, which is major requirement for wireless network design point of view. This paper introduces joint RR/K&H combined with M-LWDF(Modified Largest Weighted Delay First) scheme throughout observing statistical channel behavior and real time queuing analysis for appropriate resource allocation tightly connected to multiuser scheduling. Accordingly, the system throughput can be enhanced, and the QoS demanded for delay sensitive services can be satisfied. Furthermore, the proposed scheme is applied for OFDMA(Orthogonal Frequency Division Multiple Access) systems to allocate sub-carriers in optimal way. The simulation results verify plausible performances of proposed resource allocation scheme via showing superior effective capacity under time-varying physical-layer channel behaviors.

Implementation of On-demand QoS management System for Bandwidth Resource Allocation (대역폭 자원 할당을 위한 주문형 Qos 관리 시스템 구현)

  • Lee, Dongwook;Yi, Dong-Hoon;Kim, Jongwon;Sanggil Jung;Okhwan Byun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.444-454
    • /
    • 2004
  • To support diverse transmission requirements of multimedia applications, Quality of Service (QoS) should be provided in the Internet, where only the best-effort service is available. In this paper, we describe our recent effort on the implementation and verification of an extendable and flexible QoS allocation and resource management system based on the bandwidth broker model for realizing the IETF differentiated service (DiffServ). Focusing on the bandwidth issue over single administrative domain, the implemented system provides real-time resource reservation and allocation, delayed call admission control, simple QoS negotiation between sewer and users, and simple resource monitoring. The implemented system is verified by evaluating the performance of a resource-intensive application over the real-world testbed network.