• Title/Summary/Keyword: 채널관리

Search Result 605, Processing Time 0.024 seconds

Fast Staggered Data Broadcasting and Receiving Scheme for Simple and Efficient Video on Demand Services (주문형 비디오 서비스의 복잡성와 대역폭 효율을 개선한 Fast Staggered 방식)

  • Kim Hong-Ik;Park Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.668-678
    • /
    • 2006
  • In designing a video-on-demand (VoD) system, one of the major challenges is how to reduce the viewer's waiting time maintaining a given bandwidth allocation and how to reduce the client's buffer requirements. To solve these problems, many VoD schemes were proposed. However, most VoD schemes require managing many segments of a video, frequency channel hopping, and using many channels at the same time. Therefore, to the complexity is a barrier to implementation. In this paper, we propose a fast staggered broadcasting scheme which has a simple structure and substantially improved VoD efficiency. The numerical results demonstrate that the viewer's waiting time of the fast staggered broadcasting scheme is close to the fast broadcasting scheme and the buffer requirements of this can be adapt for demanding rate by adjusting the short front part of a video sizes.

A Leader Election Algorithm and Performance Evaluation for Mobile Ad hoc Networks (이동 에드 혹 네트워크를 위한 제어노드 선택 알로리즘 및 성능 평가)

  • Parvathipuram Pradeep;Yang Gi-Chul;Oh Sooyul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.829-834
    • /
    • 2004
  • Nodes communicate through wireless channels under peer-to-peer level in ad-hoc mobile networks. The nodes are free to move around in a geographical area and are loose]y bounded by the transmission range of the wireless channels. Also, a node is completely free to move around, there is no fixed final topology. Hence, to manage the inter-node communication and data exchange among them a leader node is required. In this paper we introduce an efficient leader election algorithm for mobile ad hoc networks where inter-node communication is allowed only among the neighboring nodes. Furthermore we present the result of performance evaluation through simulation. The algorithm is efficient and practical since it uses least amount of wireless resources and does not affect the movement of the nodes.

Study of Efficient Energy Management for Ubiquitous Sensor Networks with Optimization of the RF power (전송전력 최적화를 통한 센서네트워크의 효율적인 에너지관리에 대한 연구)

  • Eom, Heung-Sik;Kim, Keon-Wook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.37-42
    • /
    • 2007
  • This paper reconsiders established power conservation models for ubiquitous sensor networks that use relay nodes instead of direct communication and proposes novel network power consumption model with consideration of the channel level and radio chip level simultaneously. We estimate the effect of minimum hop-count policy in terms of network power consumption through simulation of various situations for low power RF module CC2420. It is observed that maximum RF power and minimum hop-count results in lower energy consumption relatively. Also, in total network energy consumption, which is included re-transmission, minimum hop count policy presents decrease by 33.1% of energy consumption in compare with the conventional model.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Fast Group Scanning Scheme in IEEE 802.16e Networks (IEEE 802.16e에서 그룹 기반의 빠른 스캐닝 기법)

  • Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6A
    • /
    • pp.624-634
    • /
    • 2008
  • The mobile station which is about to do handover in IEEE 802.16e networks scans its neighboring base station channels to decide its next target base station. However, due to the lack of location information of its subscribers, the serving base station cannot provide any reliable candidate channel which is actually attachable by the scanning mobile stations, which makes the mobile station suffer from the long scanning time. Sometimes, long scanning time may cause the degradation of quality of service due to repeatable scan-duration or failure to start the handover procedure in time. To overcome these problems, in this paper, we propose a new protocol so called fast group scanning scheme, in which multiple mobile stations form a group to scan their neighboring base station channels simultaneously. Main contribution of this proposal is to find and decide a reliable target base station within a short scanning time. The fast group scanning scheme can be deployed to the cell network of the serving base station with a dynamic neighboring base station list management.

Staircase Staggered Data Broadcasting and Receiving Scheme for Popular Video Services (계단형 스태거드 데이터 방송 전송방식을 이용한 주문형 비디오 서비스)

  • Kim, Hong-Ik;Park, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.919-928
    • /
    • 2006
  • A periodic broadcasting is known as an efficient technique for delivering popular videos to reduce bandwidth requirements for transmitting streaming video to viewers in video-on-demand (VoD) services. However, the most periodic VoD schemes approach needs frequency channel hopping, many segments of video managing, and using many channel at the same time. These make it difficult to implement. In this paper, we propose a Staircase Staggered broadcasting scheme which has a simple structure and substantially improved VoD efficiency. The numerical results demonstrate that the viewer's waiting time of the Staircase Staggered broadcasting scheme is close to the staircase broadcasting scheme and the maximum buffer requirements of this can be adapted for demanding rate by adjusting the short front part of a video sizes.

A MAC Parameter Optimization Scheme for IEEE 802.11e-based Multimedia Networks (IEEE 802.11e 기반 멀티미디어 네트워크를 위한 MAC 매개 변수 최적화 방법)

  • Sung, Min-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.455-461
    • /
    • 2008
  • Enhanced Distributed Channel Access (EDCA) is a channel access scheme adopted by the IEEE 802.11e draft standard for QoS-enabled wireless local area networks. It classifies traffic into separate Access Categories (ACs) and achieves service differentiation by allowing each AC to have its own values of channel access parameters. This paper proposes a scheme to dynamically adapt the EDCA parameters to traffic environment so that they both maximize the throughput of non real-time traffics and meet the delay and throughput constraints of real-time traffics. For this purpose, we develop a design algorithm for efficient exploration of the EDCA parameter space. Using the algorithm, we derive a Pareto curve fur delay-throughput trade-off in each anticipated traffic environment. The Pareto database can then be used to optimally adjust the parameter according to the traffic environment and administrative policies. Simulation results show that compared with the default parameter configuration, the proposed scheme is better for delay, throughput guarantee and can improve the throughput of non real-time traffics by 12% on average.

User control based OTT content search algorithms (사용자 제어기반 OTT 콘텐츠 검색 알고리즘)

  • Kim, Ki-Young;Suh, Yu-Hwa;Park, Byung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.99-106
    • /
    • 2015
  • This research is focused on the development of the proprietary database embedded in the OTT device, which is used for searching and indexing video contents, and also the development of the search algorithm in the form of the critical components of the interface application with the OTT's database to provide video query searching, such as remote control smartphone application. As the number of available channels has increased to anywhere from dozens to hundreds of channels, it has become increasingly difficult for the viewer to find programs they want to watch. To address this issue, content providers are now in need of methods to recommend programs catering to each viewer's preference. the present study aims provide of the algorithm which recommends contents of OTT program by analyzing personal watching pattern based on one's history.

The Analysis of Transmission Power Control Model for Energy Efficiency in Body Sensor Systems (에너지 효율을 위한 인체 센서 시스템의 전송 전력 조절 모델 분석)

  • Hong, Jin-A;Kim, Namgi
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.1-8
    • /
    • 2014
  • In wireless body sensor system(WB-SNSs), unlike existing sensor network system, the size of device is small and amount of battery is considerably limited. And various channel environments can be made by link channel characteristic, human movements, sensor placements, transmission power control(TPC) algorithms and so on. In this paper, therefore we take diverse experiments with totally considerated environments to overcome these restrictions and to manage the energy efficiently and find the value of target received signal strength indicator(RSSI) based on diverse factors such as human movements, sensor placements, and TPC algorithms. And we conduct analysis in terms of energy consumption and packet delivery rate(PDR) based on the experimental results. Through these analysis, we compare and evaluate the efficiency according to setup values of Target RSSI and Target RSSI range suitable for wireless body sensor network system.

Medium Access Control Using Channel Reservation Scheme in Underwater Acoustic Sensor Networks (해양센서네트워크에서 채널예약방식을 이용한 매체접근제어)

  • Jang, Kil-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.955-963
    • /
    • 2009
  • In this paper, we propose a medium access control(MAC) protocol for reducing the energy efficiency and for improving the transmission efficiency in underwater acoustic sensor networks. In underwater environment, the transmission delay is longer and bandwidth is smaller than terrestrial environment. Considering these points, we propose a new MAC protocol to enhance throughput and to manage efficiently the energy of nodes. The proposed protocol operates as a channel reservation scheme to decrease data collisions, and uses a mechanism to control the hidden node problem and the exposed node problem occurred in ad hoc networks. The proposed protocol consists of the slotted based transmission frame and reduces data collisions between nodes by putting separately the reservation period in the transmission frame. In addition, it is able to solve the hidden node problem and the exposed node problem by reservation information between nodes. We carry out the simulation to evaluate the proposed protocol in terms of the average energy consumption, the ratio of collision, throughput, and the average transmission delay, and compare the proposed protocol to a traditional MAC protocol in the underwater environment. The simulation results show that the proposed protocol outperforms the traditional protocol under a various of network parameters.