• Title/Summary/Keyword: virtual backbone

Search Result 38, Processing Time 0.022 seconds

A Lossless Multicast Handoff Method for Wireless ATM Networks (무선 ATM 망을 위한 손실없는 멀티캐스트 핸드오프 기법)

  • 하은용
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.88-96
    • /
    • 2001
  • Future mobile communication networks, which consist of ATM-based B-ISDN backbone networks and wireless ATM networks, will provide u user with broadband connection and QoS service. These network systems need the lossless handoff methods which support user mobility, satisfy ATM features such as ATM cell ordering and no ATM cell duplication and minimize buffer requirement for ATM cell buffering. In this paper we suggest a multicast-based handoff method to supp$\alpha$t lossless connection as well as to minimize buffer overhead. It establishes a dynamic multicast connection between source terminal and wireless member AP (access point)s. When the mobile terminal receives data packet correctly, it notifies the positive acknowledgement of the packet to all member APs. And member APs then release the MT related temporary buffer space for MT's future movement. Therefore member APs can eliminate unnecessary buffer usage and manage the buffer space efficiently. Analysis result shows that our handoff method has better performance in buffer requirement for lossless and seamless connection services over VCT (virtual connection tree) method and other dynamic multicast-based handoff methods.

  • PDF

A Distributed Bandwidth-Interference aware CDS (BI CDS) Construction Scheme in Wireless Mesh Network (무선 메쉬 네트워크에서 최소 간섭과 최적의 주파수 대역폭을 이용한 CDS 구성)

  • Yang, Jun-Mo;Kim, Bo-Nam;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.53-59
    • /
    • 2009
  • As a special type of Wireless Ad Hoc Networks, Wireless Mesh Networks (WMNs) have become the comer stone of research issues. Due to the limited operational environment of WMNs, an efficient connected dominating set (CDS) construction scheme is an important concern since it has been found extremely useful in broadcasting, routing and virtual backbone construction. In this paper, we propose a distributed Bandwidth-Interference aware CDS construction scheme to improve the network performance via two parameters such as node's number of neighbor and link bandwidth. Our CDS construction scheme selects the node that has more neighbors and enough bandwidth to support more end-devices in order to enhance overall network throughput and reliability. We confirm through simulations and show that our scheme constructs the CDS with the small subset of DS and the link that has better bandwidth.

TECDS Protocol for Wireless Ad Hoc Networks (무선 에드혹 네트워크를 위한 타이머를 이용한 CDS 구축)

  • Kim, Bo-Nam;Yang, Jun-Mo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.365-370
    • /
    • 2007
  • Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.

The Boundary Conditions of Free-to-Play Business Model in the Economic Perspective: a case study (경제학 관점에서 부분유료화 게임 비즈니스 모델 분석 및 사례 연구)

  • Yoo, Changsok;Jung, Jaeki;Lee, Sachiko
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.883-892
    • /
    • 2014
  • Free-to-play business model, which first commercialized in Korea, now becomes crucial sales drivers in the game industry, but the theoretical background is not well known that most of free-to-play content business models are developed based on the guts and trial-and-errors. In this study, we verified that the price discrimination theory in economics is the backbone of the free-to-play business model, and we also derived the three boundary conditions that should be satisfied in the business model design. We reviewed the three boundary conditions of free-to-play business model using case studies of previous games, and showed how the boundary conditions should work in the actual business. Through case studies, we tried to suggest the theoretical basis of free-to-play business model design, and sales enhancing techniques in free-to-play business.

A Study on Changes in the Fashion Market Viewed from the Perspective of Big Blur (빅블러 관점으로 바라본 패션 시장의 변화에 관한 연구)

  • Park, Yonjin;Kan, Hosup
    • Journal of Fashion Business
    • /
    • v.24 no.4
    • /
    • pp.144-160
    • /
    • 2020
  • Today, the development of innovative technologies is accompanied by changes in the industrial structure and the Big Blur phenomenon, where the boundaries in various fields are blurred. The purpose of this study was to view the Big Blur phenomenon as a big paradigm shift in the 21st century and derive environmental changes and characteristics of the Korean fashion market. The research method included an analysis of the fashion brands after 2015. Through this study, we intended to establish a framework for understanding the changes in the fashion market from the perspective of Big Blur and discuss the direction of brand marketing. The research results showed the hyperlinks, connectivity, openness, homeostasis, synchronicity, mobility, interactivity, and brand experience of online and offline spaces beyond the boundaries of virtual space and offline physical spaces such as online physical and spatial viewpoints. It also showed the characteristics. The characteristics from the socio-cultural point of view were characteristic of diversity, mixture, coexistence, composability, and pluralism beyond the traditional socio-cultural and regulatory scopes. Hip hop fashion, street fashion, unisex, genderless, androgynous fashion, and kid fashion are the backbone of the Big Blur and are becoming important factors in fashion. The characteristics of the market and economic viewpoint are prosumers that play roles both as producers and consumers. It shows the extensibility of consumers as producers, the cohesiveness of producers and consumers, the cooperation, and the interconnectivity.

Multilevel Precision-Based Rational Design of Chemical Inhibitors Targeting the Hydrophobic Cleft of Toxoplasma gondii Apical Membrane Antigen 1 (AMA1)

  • Vetrivel, Umashankar;Muralikumar, Shalini;Mahalakshmi, B;K, Lily Therese;HN, Madhavan;Alameen, Mohamed;Thirumudi, Indhuja
    • Genomics & Informatics
    • /
    • v.14 no.2
    • /
    • pp.53-61
    • /
    • 2016
  • Toxoplasma gondii is an intracellular Apicomplexan parasite and a causative agent of toxoplasmosis in human. It causes encephalitis, uveitis, chorioretinitis, and congenital infection. T. gondii invades the host cell by forming a moving junction (MJ) complex. This complex formation is initiated by intermolecular interactions between the two secretory parasitic proteins-namely, apical membrane antigen 1 (AMA1) and rhoptry neck protein 2 (RON2) and is critically essential for the host invasion process. By this study, we propose two potential leads, NSC95522 and NSC179676 that can efficiently target the AMA1 hydrophobic cleft, which is a hotspot for targeting MJ complex formation. The proposed leads are the result of an exhaustive conformational search-based virtual screen with multilevel precision scoring of the docking affinities. These two compounds surpassed all the precision levels of docking and also the stringent post docking and cumulative molecular dynamics evaluations. Moreover, the backbone flexibility of hotspot residues in the hydrophobic cleft, which has been previously reported to be essential for accommodative binding of RON2 to AMA1, was also highly perturbed by these compounds. Furthermore, binding free energy calculations of these two compounds also revealed a significant affinity to AMA1. Machine learning approaches also predicted these two compounds to possess more relevant activities. Hence, these two leads, NSC95522 and NSC179676, may prove to be potential inhibitors targeting AMA1-RON2 complex formation towards combating toxoplasmosis.

Performance Analysis of AAL2 Packet Dropping Algorithm using PDV on Virtual Buffer (PDV를 이용한 가상 버퍼상의 AAL2 패킷 폐기 알고리즘과 성능분석)

  • Jeong, Da-Wi;Jo, Yeong-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.1
    • /
    • pp.20-33
    • /
    • 2002
  • Usage of ATM AAL2 packets becomes dominant to increase transmission efficiency of voice traffic in the backbone network. In case of voice service that uses AAL2 mechanism, if resources of network are enough, connection of new call is accepted. However, due to packets generated by the new call, transmission delay of packets from old calls can increase sharply. To control this behavior, in this paper we present an AAL2 buffer management scheme that allocates a virtual buffer to each call and after calculating its propagation delay variation(PDV), decides to drop packets coming from each call according to the PDV value. We show that this packet dropping algorithm can effectively prevent abrupt QoS degradation of old calls. To do this, we analyze AAL2 packet composition process to find a critical factor in the process that influences the end-to-end delay behavior and model the process by K-policy M/D/1 queueing system and MIN(K, Tc)-policy M/D/1 queueing system. From the mathematical model, we derive the probability generating function of AAL2 packets in the buffer and mean waiting time of packets in the AAL2 buffer. Analytical results show that the AAL2 packet dropping algorithm can provide stable AAL2 packetization delay and ATM cell generation time even if the number of voice sources increases dramatically. Finally we compare the analytical result to simulation data obtained by using the COMNET Ⅲ package.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.