• Title/Summary/Keyword: 응용 트래픽

Search Result 448, Processing Time 0.024 seconds

A Building Method of Security Architecture Framework on the Medical Information Network Environment (의료정보시스템상에서의 네트워크 보안기능 프레임워크와 보안 아키텍쳐 설계방법)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.3-9
    • /
    • 2011
  • On health information network architecture, traffic along the path of traffic and security, blocking malicious code penetration is performed. The medical information system network security infrastructure study, which was whether to be designed based on the structure and methodology is designed to develop the security features. Health informati on system's functionality and capabilities framework for infrastructure is the backbone and structure. The design fea tures a framework for the overall network structure formation of the skeleton and forms the basic structure of the security methodology. Infrastructure capabilities to build the framework and the application functionality is being implemented. Differentiated in accordance with security zones to perform security functions and security mechanisms that operate through this study is to present. u-Healthcare future advent of cloud computing and a new health information environment, the medical information on the preparation of this study is expected to be utilized for security.

A Selective Layer Discard Algorithm for Stored Video Delivery over Resource Constrained Networks (자원 제약이 있는 네트워크에서 저장 비디오 데이터의 효율적인 전송을 위한 선택적 계층삭제 알고리즘)

  • No, Ji-Won;Lee, Mi-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.647-656
    • /
    • 2001
  • Video delivery from a server to a client across a network system is an important part of many multimedia applications. Usually, the network system has constraint in both the amount of network bandwidth and the buffer size in the client. While delivering a video stream across such a constrained network system, loss of frames may be unavoidable. The system resources consumed by the dropped frames are wasted, and the losses of frames would result in discontinuous display at the client. In this paper, for delivering hierarchically encoded video stream, we introduce the notion of selective layer discard algorithm at the server which not only preemptively discards data at the server but also drops less important part of a frame instead of the entire frame. By the simulation, we compare the proposed selective layer discard algorithm and the existing selective frame discard algorithm. The simulation results show that the proposed algorithm may improve the quality of decoded video, and decrease the replay discontinuity at the client.

  • PDF

The Regional transferring Model for Multicasting Service based on IP (IP 기반 멀티캐스트 서비스의 지역분할 전송 모델)

  • Jang, Kyung-Sung;Kim, Byung-Ki
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.637-646
    • /
    • 2001
  • The multicasting telecommunication is an important research as an applicable technique in the development of adaptable technique for modern mobile computing and mobile IP, because that is supposed to be a solution for transferring the large-size information on the mobile and wireless network with the narrow bandwidth. This paper will suggest one solution for the bidirectional tunneling and the local re-registration problems to support transferring mobile multicasting datagram by the partitioned network. The bidirectional tunneling technique is in use for mobile host moving around in a region and the local re-registration technique for crossing regions to reduce traffic load caused by transferring datagram along a long distance, and we compare those models with our suggested model by simulation.

  • PDF

Design and Implementation of SIP Internet Call-setup System using Seven States (7가지 상태를 이용한 SIP 인터넷 전화연결 시스템 설계 및 구현)

  • Shin, Yong-Kyoung;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.300-310
    • /
    • 2007
  • The Session Initiation Protocol (SIP) is one of the major protocols used in call-setup over IP telephony. The SIP-signaled calls use many-sided states according to a request of user. In this paper, we suggest seven states and some events that help developers to design and implement new applications efficiently. And they enable an object-oriented design of the system. If you design the call-setup procedure only by the processing model suggested in RFC 3261 over commercial network, a fatal error may occur in the system because of heavy data traffic or unpredicted exception cases. However, according to the suggested seven states, if they are predefined events in the current system state, the standardized processing routine is executed. Otherwise, they can be processed by the exception routine in system. All event processing routines are designed and implemented using Finite State Machine (FSM).

A Study on an Area-efficient Scheduler for Input-Queued ATM Switches (입력 큐 방식의 ATM 스위치용 면적 효율적인 스케줄러 연구)

  • Sonh Seung-Il
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.217-225
    • /
    • 2005
  • Currently the research on input-queued ATM switches is one of the most active research fields. Many achievements have been made in the research on scheduling algorithms for input-queued ATM switches and also applied in commerce. The scheduling algorithms have the characteristics of improving throughput, satisfying QoS requirements and providing service fairly. In this paper, we studied on an implementation of scheduler which arbitrates the input-queued ATM switches efficiently and swiftly. The proposed scheduler approximately provides $100\%$ throughput for scheduling. The proposed algorithm completes the arbitration for N-port VOQ switch with 4-iterative matching. Also the proposed algorithm has a merit for implementing the scheduling algorithm with 1/2 area compared to that of iSLIP scheduling algorithm which is widely used. The performance of the proposed scheduling algorithm is superior to that of iSLIP in 4-iterative matching.

  • PDF

Performance Enhancement of AAA-based Authentication forHMIPv6 (AAA 기반의 인증을 이용한 HMIPv6 성능 개선 기법)

  • Kim, Mi-Young;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.551-560
    • /
    • 2005
  • To reduce the amount of the signaling messages occurred in movement, HMIPv6 has been introduced as the hierarchical mobility management architecture tor MIPv6 by regarding the locality of movements. When approaching the visited link, the authentication procedure should be done successfully prior to any motility support message exchanges. The AAA(Authentication, Authorization and Account) authentication service is applied gradually to the wireless LAN and Cellular networks. However, It may bring about the service latency for the sessions of requiring the real-time processing due to not providing the optimized signaling in local and frequent movements. In this paper, we propose the authentication architecture with 'delegation' scheme to reduce the amount of signaling message and latency to resume for local movements by integrating it with HMIPv6 architecture. We provide the integrated authentication model and analyze the performance and effectivity of our proposal and finally offer the analysis materials comparing to the exiting authentication scheme. It cuts down the cost to $33.6\%$ at average measurement.

Slotted Transmissions using Frame aggregation: A MAC protocol for Capacity Enhancement in Ad-hoc Wireless LANs (프레임 집합화를 이용한 애드-혹 무선 랜의 성능 향상을 위한 MAC 프로토콜)

  • Rahman, Md. Mustafizur;Hong, Choong-Seon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.8
    • /
    • pp.33-41
    • /
    • 2007
  • The IEEE 802.11 DCF channel access function allows single transmission inside two-hop network in order to avoid collisions and eliminate the hidden and exposed terminal problems. Singular transmission capability causes data frames waiting for the entire roundtrip time in the transmitter neighborhood, and results in increased frame latency and lower network throughput. Real-time and pervasive applications are severely affected for the lower medium utilization; especially with high network traffic. This work proposes a new scheme with the help of Frame Aggregation technique in IEEE802.11n and overcomes the single transmission barrier maintaining the basic DCF functionality. Proposed scheme allows parallel transmissions in non-interfering synchronized slots. Parallel transmissions bypass the conventional physical carrier sense and random Backoff time for several cases and reduce the frame latency and increase the medium utilization and network capacity.

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF

A Design and Implementation of Dynamic Hybrid P2P System with Hierarchical Group Management and Maintenance of Reliability (계층적 그룹관리와 신뢰성을 위한 동적인 변형 P2P 시스템 설계 및 구현)

  • Lee, Seok-Hee;Cho, Sang;Kim, Sung-Yeol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.975-982
    • /
    • 2004
  • In current P2P concept, pure P2P and Hybrid P2P structures are used commonly. Gnutella and Ktella are forms of pure P2P. and forms of Hybrid P2P are innumerable. File searching models exist in these models. These models provide group management for file sharing, searching and indexing. The general file sharing model is good at maintaining connectivity. However, it is defective in group management. Therefore, this study approaches hierarchical structure in file sharing models through routing technique and backup system. This system was designed so that the user was able to maintain group efficiency and connection reliability in large-scale network.

A QoS Aware multi-layer MAC(QAML-MAC) Protocol for Wireless Sensor Networks (무선센서네트워크에서 QoS 지원을 위한 다중계층 MAC 프로토콜)

  • Kim, Seong-Cheol;Park, Hyun-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.111-117
    • /
    • 2011
  • In this paper, we propose an QoS aware multi-layer MAC(QAML-MAC) protocol in a wireless sensor networks. Since the proposed protocol is based on the sleep-awake architecture, which save node's energy to prolong the entire network lifetime. For this purpose the QAML-MAC first classifies incoming data according to their transmission urgency and then saves them. The protocol also adapts the cross-layer concept to re-arrange the order of transmission with the same destination. So the delay can be decreased, which can not be obtained with the previous related protocols. And high priority data such as real-time multimedia or critical value in the field monitoring applications can be transmitted quickly, Furthermore the proposed protocol has advantage of decreasing transmitted data collisions using multiple layers of idle listening when there is no high-priority data. So energy consumptions of sensor nodes can be saved and the network lifetime can be prolonged.