• Title/Summary/Keyword: 신호 트래픽

Search Result 225, Processing Time 0.024 seconds

Extended Service Filtering Technique for Overload Control of Televoting Service Required for the Specialized Resources of Intelligent Peripheral (지능형 정보제공 시스템의 특수 지원을 이용하여 제공되는 전화투표 서비스의 과부하 제어를 위한 확장된 서비스 필터링 기법)

  • Jeong, Gwang-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1727-1738
    • /
    • 1996
  • This paper proposes a extended service filtering technique to solve overload control problems inService Con-trol Poin(SCP) due to Televoting (VOT) services with heavy traffic characteristics. Also, this paper compares this new technique with existing IN overload control lechniques, and calculate steady state call blocking probabilities in In under overload conditions. The proposed technique considers SCP overload and IN CS-1services such as VOT service that need to use the specialized resources of IP. This technique uses first an activating step which SCP sends service filtering request to SSP and IP for the start of service filtering. Then, in the filtering step SSP sendas filtering results to SCP periodically or each N-calls.Also,when filtering time-out timer expired or call counter value exceeded maximum number of calls,SSP stops service filtering,and sends ser-vice filteing response to SCP in the deactivating step. The application of this techique to VOT service defined in IN CS-1 service is investigated and analyzed by using an analytical VOT service model.In order to apply this technique to VOT service, this paper also discusses VOT service and the corresponding N architecture including Service Switching Point(SSP),SCP and IP. Then this paper also constructs an analytical VOT service model,and calculates SCP and SSP/IP(circuit)call blocking probablities.With the application of this new technique,this paper shows good performance enhancements in SCP call blocking probability.

  • PDF

Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET (MANET에서 배터리 잔량과 신호세기를 동시에 고려한 Power-aware 라우팅 프로토콜)

  • Park Gun-Woo;Choi Jong-Oh;Kim Hyoung-Jin;Song Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.219-226
    • /
    • 2006
  • The shortest path is only maintained during short time because network topology changes very frequently and each mobile nodes communicate each other by depending on battery in MANET(Mobile Ad-hoc Network). So many researches that are to overcome a limitation or consider a power have executed actively by many researcher. But these protocols are considered only one side of link stability or power consumption so we can make high of stability but power consumption isn't efficient. And also we can reduce power consumption of network but the protocol can't make power consumption of balancing. For that reason we suggest RBSSPR(Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET). The RBSSPR considers residual capacity of battery and signal strength so it keeps not only a load balancing but also minimizing of power consumption. The RBSSPR is based on AODV(Ad-hoc On-demand Distance Vector Routing). We use ns-2 for simulation. This simulation result shows that RBSSPR can extense lifetime of network through distribution of traffic that is centralized into special node and reducing of power consumption.

Node Architecture and Cell Routing Strategies for ATM Applications in WDM Multihop Networks (WDM 다중홉 망에서 ATM 응용을 위한 노드 구조 및 셀 라우팅 기법)

  • Lee, Ho-Suk;Lee, Cheong-Hun;So, Won-Ho;Kwon Hyeok-Jung;Kim, Yeong-Cheon
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.11
    • /
    • pp.44-52
    • /
    • 1998
  • In this paper, we proposed a node architecture and cell routing strategies for ATM applications in WDM multihop networks. The proposed node architecture employs the optical delay loop for storing the cell which is failed in out-link contention. This optical delay loop allows the delay of one cell without the electro-optic conversion. Therefore, we can get the advantages of S&F(Store-and-Forward) routing in Deflection-based all-optical networks. To support the ATM applications efficiently. we considered the transmission priority of ATM cell so that high priority cell can be transmitted with lower loss and shorter delay than low priority one. Two kinds of routing strategies are designed for this architecture: Scheme-Ⅰand Scheme-Ⅱ. Scheme-Ⅰapplies S&F routing to high cell and Deflection routing to low cell, i.e., high cells are routed along the shortest path based on S&F routing, but low cells are deflected or lost. Schem-Ⅱ is similar to Scheme-Ⅰexcept that low cells can occupy the optical loop if it is available. This Scheme-Ⅱ increases the utilization of network resources without decreasing the throughput of high cell by reducing the low cell loss rate when traffic load is low. Simulation results show that our routing strategies have better performance than conventional ones under non-uniform traffic as well as uniform traffic.

  • PDF

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.

Dynamic QoS Support Protocol (동적인 네트워크 QoS 설비 방안)

  • 노희경;문새롬;이미정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.265-267
    • /
    • 2002
  • 인터넷에서 멀티미디어 응용들이 증가함에 따라 서비스 품질(QoS: Quality of Service)을 보장해 줄 수 있는 여러 가지 방안이 제안되어 왔는데, 일반적으로 이들 방안은 확장성과 종단간 QoS 보장 간에 상호 모순이 발생하는 경향을 가지고 있다. 본 논문에서는 이와 같은 상호 모순을 피할 수 있는 QoS 지원 방안으로서 DQSP(Dynamic QoS Support Protocol)를 제안한다. DQSP는 도메인 내에서의 자원 예약과 연결 수락 제어 메커니즘을 정의한다. DQSP는 링크 자원을 각 에지 라우터로부터의 트래픽 클래스별로 동적으로 할당하고 에지 라이투가 자신에게 할당된 링크 자원에 관한 정보를 유지하도록 한다. DQSP는 목적지로의 연결 수락 제어를 위한 QoS 신호 프로토콜이 필요 없이 에지 라우터에서 매 사용자 플로우별로 직접적으로 연결 수락 결정을 내리므로 확장성 문제 및 코어 라우터의 복잡한 기능 요구 사항 문제를 해결한다. 또한 UQSP는 에지 라우터가 트래픽 부하에 따라 자신에게 할당되어 있는 자원을 반납하거나 추가적인 자원을 제공받을 수 있도록 해 자원 오버 프로비져닝으로 인해 발생할 수 있는 비효율적인 자원 활용 문제를 해결한다. 또한 DQSP는 경로 재계산을 수행하여 라우팅을 조정해 나감으로써 효율적일 네트워크 자원 활용이 가능하다. 시뮬레이션을 통하여 DQSP와 기존의 자원 할당 및 공유 방식들을 비교한 결과 DQSP가 시그널링과 상태 정보 유지를 위한 오버헤드 면에서 기존의 종단간 QoS 보장을 제공하는 구조인 IntServ에서와 같은 확장성 문제를 발생시키지 않으면서도 효율적으로 네트워크 자원을 활용할 수 있음을 확인할 수 있었다.재 상용화 되어있는 Bellcore 의 S/KEY 시스템과의 비교를 수행하였다. 분석에서는 제품의 효율성뿐만 아니라 보안성을 중요하게 생각하였으며, 앞으로 보안 관련 소프트웨어 개발에 사용될 수 있는 도구들이 가이드 라인에 대한 정보를 제공한다.용할 수 있는지 세부 설계를 제시한다.다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아이에서 그 주산기사망률(周産基死亡率)이 각각

  • PDF

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Design and Performance Analysis of Hybrid Receiver based on System Level Simulation in Backhaul System (백홀 시스템에서 시스템 레벨 시뮬레이션 기반 하이브리드 수신기 설계 및 성능 분석)

  • Moon, Sangmi;Choe, Hun;Chu, Myeonghun;Kim, Hanjong;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.23-32
    • /
    • 2015
  • The advanced receiver which can manage inter-cell interference is required to cope with the explosively increasing mobile data traffic. 3rd Generation Partnership Project (3GPP) has discussed network assisted interference cancellation and suppression (NAICS) to improve signal-to-noise-plus-interference ratio (SINR) and receiver performance by suppression or cancellation of interference signal from inter-cells. In this paper, we propose the novel hybrid receiver Full Suppression Cancellation (FSC) to reduce the interference from neighbor cell in backhaul system. The proposed receiver can suppress and cancel the interference by combining Interference Rejection Combining (IRC) with Successive Interference Cancellation (SIC). We perform the system level simulation based on 20MHz bandwidth of 3GPP LTE-Advanced system. Simulation results show that the proposed receiver can improve error rate and throughput of conventional system.

Implementation of FTTH System based on Ethernet PON Technology (이더넷 PON 기술 기반 FTTH 시스템 구현)

  • Park Chun-Kwan;Jeon Byung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.66-75
    • /
    • 2006
  • This paper addresses the implementation of FTTH system based on Ethernet PON technololy. This system consists of OLT and ONT. OLT supports the maximum 24 Gigabit Ethernet interfaces, and then has the flexibility and the scalability for supplying digital communication and broadcasting convergence service in the near future. OLT system consists of switch module, subscriber module, processor module, and E-PON link module, and has the operating system based on Linux. ONT is installed in customer premise to supply both IP-TV and Internet service. Also ONT has the dedicated interface for IP-TV to improve the transmission characteristics of IP-TV signal. We measure the performance of E-PON MAC through this system and then QoS control characteristics per franc in ONT by separating the virtual link for IP-TV from that for data.

A Precise Audio/Video Synchronization Scheme Based on RTP Packet for Multimedia Communication (멀티미디어 통신을 위한 RTP 패킷 기반의 정밀한 오디오/비디오 동기화 기법)

  • Seo, Kwang-Deok;Chi, Won-Sup;Jung, Soon-Heung
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.653-663
    • /
    • 2009
  • Synchronization between media is an important aspect in the design of multimedia communication-system. This paper proposes a precise media synchronization mechanism for video and audio transport over IP networks. To support synchronization between video and audio bitstreams transported over IP networks, RTP/RTCP protocol suite is usually employed. To provide a precise mechanism for media synchronization between video and audio, we suggest an efficient media synchronization algorithm based on NPT (Normal Play Time) which can be derivable from the timestamp information in the header part of RTP packet generated for the transport of video and audio. In the proposed method, we do not need to send and process any RTCP SR (sender report) packet which is required for conventional media synchronization scheme, and accordingly could reduce the number of required UDP ports and the amount of control traffic injected into the network.

  • PDF