• Title/Summary/Keyword: sender

Search Result 467, Processing Time 0.024 seconds

Transmission status monitoring method for improving the performance of MPTCP in Bufferbloat environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 전송 상태 모니터링 방법)

  • Jung, Il Hyung;Lee, Jae Yong;Kim, Byung Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.259-269
    • /
    • 2018
  • Multipath TCP (MPTCP) can be expected to provide improved network performance because it transmits data through multiple paths. However, Bufferbloat, which unexpectedly occurs in the transmission path, degrades not only the performance of the corresponding path but also the performance of other paths, so that the performance is worse than that of a single TCP. In this paper, we propose the transmission status monitoring method at the sender's MPTCP level and also HoL packets retransmission algorithm in order to solve the Bufferbloat problem. The proposed algorithm enables Bufferbloat detection by the sender side independently, and it can resolve the HoL blocking problem by identifying the HoL packet in the proposed transmission status monitoring buffer and retransmitting it to the normal path. Simulation results based on NS-3 show that the proposed algorithm achieves the improved throughput performance up to 22.8% compared to the existing MPTCP, and the average number of queued packets in the sender and receiver's buffers is decreased to 44.3% and 9.2%, respectively.

A Sender-oriented Automatic Rate Adaptation Scheme in IEEE 802.11 WLANs (IEEE 802.11 WLAN에서 송신단 기반 전송률 적응기법)

  • Lee, Sun-Hun;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.143-152
    • /
    • 2009
  • IEEE 802.11 WLANs provide multiple transmission rates to improve the system throughput by adapting the transmission rate to the current wireless channel conditions. Many rate adaptation schemes have been proposed because IEEE 802.11 standard does not contain any specifications for the rate adaptation scheme. In this paper, in order to overcome limitations of the previous research, we propose a new rate adaptation scheme called SARA(Sender-oriented Automatic Rate Adaptation). The SARA scheme, a proposed rate adaptation scheme, appropriately adjusts the data transmission rate based on the estimated wireless channel conditions, specifically the measured RSSI at the sender-side. Moreover it continuously updates the thresholds for selecting the transmission rate and selectively enforces the RTS/CTS exchanges to adapt the changes in the wireless channel conditions. Through the performance evaluations, we prove that the SARA scheme overcomes the limitations of the previous research and improves the wireless link utilization.

A GA-Based Adaptive Task Redistribution Method for Intelligent Distributed Computing (지능형 분산컴퓨팅을 위한 유전알고리즘 기반의 적응적 부하재분배 방법)

  • 이동우;이성훈;황종선
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1345-1355
    • /
    • 2004
  • In a sender-initiated load redistribution algorithm, a sender(overloaded processor) continues to send unnecessary request messages for load transfer until a receiver(underloaded processor) is found while the system load is heavy. In a receiver-initiated load redistribution algorithm, a receiver continues to send unnecessary request messages for load acquisition until a sender is found while the system load is light. Therefore, it yields many problems such as low CPU utilization and system throughput because of inefficient inter-processor communications in this environment. This paper presents an approach based on genetic algorithm(GA) for adaptive load sharing in distributed systems. In this scheme, the processors to which the requests are sent off are determined by the proposed GA to decrease unnecessary request messages.

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks

  • Zhang, Aiqing;Ye, Xinrong;Chen, Jianxin;Zhou, Liang;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2375-2393
    • /
    • 2016
  • Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics. However, because channels lack randomness, it is difficult for wireless networks with stationary communicating terminals to generate robust keys. In this paper, we propose a Robust Secure Key Agreement (RSKA) scheme from Received Signal Strength (RSS) in stationary wireless networks. In order to mitigate the asymmetry in RSS measurements for communicating parties, the sender and receiver normalize RSS measurements and quantize them into q-bit sequences. They then reshape bit sequences into new l-bit sequences. These bit sequences work as key sources. Rather than extracting the key from the key sources directly, the sender randomly generates a bit sequence as a key and hides it in a promise. This is created from a polynomial constructed on the sender's key source and key. The receiver recovers the key by reconstructing a polynomial from its key source and the promise. Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes.

A Study on Nurses Role Conflict in a Hospital University (일 종합병원 간호원의 역할갈등에 관한 연구)

  • 이유순
    • Journal of Korean Academy of Nursing
    • /
    • v.11 no.1
    • /
    • pp.29-44
    • /
    • 1981
  • Nursing role tends to be more complex then before because of the increased number of health professionals and of the health needs of patient. Accordingly, nursing role expectations are various and sometimes conflict by its role set. There are various literatures on role conflict of nurses and discussed how to eliminate the conflict in order to improve nursing service particularly in the hospital organization. This study was designed to determine if role conflict exist among nurses who work in a hospital and if so what resolution were most frequently selected by the nurses to the role conflict. The study population was fifty six registered nurses of K university hospital. The fifty six was defined and selected by nonproportional stratified sampling method to obtain subjects who are from uniform role set. A questionnaire, a list of role connect, stimulated by the literature review, knowledge based on several years' experience in nursing was formulated by the author and administered to the study population. The questionnaire included twenty nine closed question items of role conflict and classified according to the intra sender conflict, intersender conflict, person conflict and interperson conflict. The response choices to the questions range on a scale continuum with degrees of conflict from one to five: never - 0, seldom - 1, occasionally - 2, frequently - 3, and mostly -4. Per cent, means, standard deviation, and x² -test were used to analyze data. The findings of the study could be summarized as follows. 1. General characterstics of the study population: Most of the population were between the age of 22-27 and are not married. 2. Analysis of Role conflict Existence of Role conflict of nurses was found by the total mean conflict score, 2.06. Inter Sender Role conflict revealed the most high mean conflict score and the lowest one was inter person role conflict. Among the five role senders of nurses: Physician, patient and hi9 family, peer and superior, nursing students and hospital administrator, nurses showed the highest conflict mean score for physicians and the lowest score for Nursing student. 3. Analysis of role conflict resolution. Compromise through discussion with the role sender was the most frequently selected method by the respondents. The result also showed that the respondents tend to resolve the conflicting situation created by patient or his family by persuation. On the o thor hand, Avoidance and ignorance was frequently chosen for the conflicting role expectations from the hospital administrator.

  • PDF

TCP Throughput Analysis in the Portable Internet Wireless Environment with Consideration of Mobility (휴대 인터넷 무선 환경에서 이동성을 고려한 TCP 처리율 분석)

  • 원기섭;조용범;노재성;조성준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.399-403
    • /
    • 2004
  • In this paper, we have analyzed the TCP throughput of Portable Internet system in 2.3GHz wireless environment with considering user's mobility speed. As the Portable Internet uses large cells compared to wireless LAM and supports user's nobility, we have adapted different wireless channel model to derive the TCP throughput of the system. We have assumed wireless channel is Rayleigh fading channel and the channel is modeled as two-state Markov model with which user's nobility speed can be considered by varying transition matrix of the model. from the simulation results, we have known that higher TCP throughput under the slow fading than under the fast fading. Because the TCP throughput is closely related to the sender's congestion control, the more congestion control is done by the sender, the lower TCP throughput we have. The more congestion control is caused in the sender under the fast fading than the slow fading so the lower TCP throughput is resulted in the fast fading environment.

  • PDF

Portable system module for wireless based on mountain climbing safety using 447 MHz band FSK (447MHz 대역 FSK방식을 이용한 무선 통신 기반 산행 안전을 위한 휴대 시스템)

  • Lim, Jae Don;Kim, Jung Jip;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1428-1433
    • /
    • 2019
  • Interest in mountain accidents among the technical trends of disasters in Korea is increasing continuously. When accidents occur, the most common methods are location tracking and accident reporting using smartphones, and rescue activities are being carried out by using them. In this paper, we proposed an improvement of wireless safety system for mountain climbing safety using 447 FSK. Using the 447 MHz band transmitter / receiver, it accumulates position coordinates and data through position transmission and rescue signal transmission in case of anomalies. If a sender is out of the threshold of the set area range, a danger warning notification can be generated to quickly exit the danger zone. Provide services. In addition, it is considered that the health condition of the sender is continuously checked and the receiver is warned when the specified threshold is exceeded, so that it is possible to respond to the sender's disaster.

Hybrid Cryptosystem providing Implicit Authentication for sender (송신자에 대한 묵시적 인증을 제공하는 하이브리드 암호 시스템)

  • Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.71-80
    • /
    • 2002
  • To provide the confidentiality of messages transmitted over the network, the use of cryptographic system is increasing gradually and the hybrid cryptosystem, which combines the advantages of the symmetric cryptosystem and the public key cryptosystem is widely used. In this paper, we proposes a new hybrid cryptosystem capable of providing implicit authentication for the sender of the ciphertext by means of the 1-pass key distribution protocol that offers implicit key authentication, hash function and symmetric cryptosystem. Also, we describe some examples such as the Diffie-Hellman based system and the Nyberg-Ruppel based system. The proposed hybrid cryptosystem is an efficient more than general public key cryptosystems in the aspect of computation work and provides implicit authentication for the sender without additional increase of the communication overhead.

A study on the conceptualization and cases of "receiver-centered public diplomacy": Focusing on SNS analysis of the US Embassy Seoul ("수신자중심 공공외교"의 개념화 및 사례에 관한 연구: 주한미국대사관의 SNS 분석을 중심으로)

  • Sunjae Kim
    • Analyses & Alternatives
    • /
    • v.8 no.1
    • /
    • pp.111-135
    • /
    • 2024
  • This paper classifies the main directions of public diplomacy as 'sender-centered public diplomacy' and 'receiver-centered public diplomacy' and attempts to conceptualize them in the initial stage. In the process, the paper evaluates the specific cases and performance of 'receiver-centered public diplomacy' for posts uploaded by the U.S. Embassy in Seoul on SNS (Facebook) over the past year in 2021. Receiver-centered public diplomacy aims to win the favor of foreign citizens by introducing and experiencing the culture and specificity of the other country. As a result of the analysis, the U.S. Embassy in Seoul is striving to win the favor of the Korean people by directly introducing and experiencing Korean major issues and trends as well as Korean traditional culture such as kimchi and traditional liquor. Furthermore, it can be seen that the values and policies pursued by the United States are effectively promoted through this method. Korea's public diplomacy, which is still in the 'sender-centered', needs to establish a more effective strategy by referring to the case of the United States.

A Sender-based Packet Loss Differentiation Algorithm based on Estimating the Queue Usage between a TCP sender/receiver (TCP 송수신자간의 큐사용률 추정을 이용한 송신자 기반의 패킷손실 구별기법)

  • Park, Mi-Young;Chung, Sang-Hwa;Lee, Yun-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.133-142
    • /
    • 2011
  • When TCP operates in multi-hop wireless networks, it suffers from severe performance degradation due to the different characteristics of wireless networks and wired networks. This is because TCP reacts to wireless packet losses by unnecessarily decreasing its sending rate assuming the losses as congestion losses. Although several loss differentiation algorithms (LDAs) have been proposed to avoid such performance degradation, their detection accuracies are not high as much as we expect. In addition the schemes have a tendency to sacrifice the detection accuracy of congestion losses while they improve the detection accuracy of wireless losses. In this paper, we suggest a new sender-based loss differentiation scheme which enhances the detection accuracy of wireless losses while minimizing the sacrifice of the detection accuracy of congestion losses. Our scheme estimates the rate of queue usage which is highly correlated with the congestion in the network path between a TCP sender and a receiver, and it distinguishes congestion losses from wireless losses by comparing the estimated queue usage with a certain threshold. In the extensive experiments based on a network simulator, QualNet, we measure and compare each detection accuracy of wireless losses and congestion losses, and evaluate the performance enhancement in each scheme. The results show that our scheme has the highest accuracy among the LDAs and it improves the most highly TCP performance in multi-hop wireless networks.