• Title/Summary/Keyword: Access Networking

Search Result 303, Processing Time 0.031 seconds

Performance Analysis of IEEE 1394 High Speed Serial Bus for Massive Multimedia Transmission (대용량 멀티미디어 전송을 위한 IEEE 1394고속 직렬 버스의 성능 분석)

  • 이희진;민구봉;김종권
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.494-503
    • /
    • 2003
  • The IEEE 1394 High Speed Serial Bus is a versatile, high-performance, and low-cost method of promoting interoperability between all types of A/V and computing devices. IEEE 1394 provides two transfer modes: asynchronous mode for best effort service and isochronous mode for best effort service with bandwidth reservation. This paper shows the bus performance and compared the transfer odes first at the link level and then at the application level. For the application level performance, we analyze the bus systems with fixed and adaptive interfaces, applied between the upper layer and the 1394 layer, using polling systems. Also we verifies the analysis models with simulation studies. Based on our analysis, we conclude that the adaptive interface reduces the bus access time and so increases the bus utilization.

An Optimization Tool for Determining Processor Affinity of Networking Processes (통신 프로세스의 프로세서 친화도 결정을 위한 최적화 도구)

  • Cho, Joong-Yeon;Jin, Hyun-Wook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.131-136
    • /
    • 2013
  • Multi-core processors can improve parallelism of application processes and thus can enhance the system throughput. Researchers have recently revealed that the processor affinity is an important factor to determine network I/O performance due to architectural characteristics of multi-core processors; thus, many researchers are trying to suggest a scheme to decide an optimal processor affinity. Existing schemes to dynamically decide the processor affinity are able to transparently adapt for system changes, such as modifications of application and upgrades of hardware, but these have limited access to characteristics of application behavior and run-time information that can be collected heuristically. Thus, these can provide only sub-optimal processor affinity. In this paper, we define meaningful system variables for determining optimal processor affinity and suggest a tool to gather such information. We show that the implemented tool can overcome limitations of existing schemes and can improve network bandwidth.

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

Web Service and Application modeling based on the Tru2Way technology (Tru2Way 기반의 웹서비스와 어플리케이션 모델)

  • Oh, Keum-Yong;Jun, Hae-Sik;Jung, Da-Na
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.376-382
    • /
    • 2009
  • The recent growth of cable broadcast technology such as Tru2Way enables the cable service operator to provide more enhanced experiences to cable TV audience. As a result, various applications have been produced and user can easily access cable network to receive multimedia content as well as interactive application in cable environment. In order for current cable technology to be accepted as a web extended technology, a process of web based applications having a web document and multimedia resources, proper web service definition and middleware architecture for existing cable environment should be established. In this paper, we define a web application for cable environment and propose a middIeware architecture which can process web application based on Tru2Way technology

On Transmission Scheduling with Tuning-Limited Transmitters in WDM Star Networks (파장 분할 방식 성형 통신망에서 조정 제약을 갖는 전송기를 이용한 전송 스케줄링)

  • Choi, Hong-Sik;Lee, Kyung-Joon;Kim, Jin
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.129-140
    • /
    • 2002
  • In this paper, we consider the problem of packet transmission in a wavelength division multiplexed(WDM) optical network. Our network model assumes that receivers are fixed-tuned and transmitters are tunable such that optical lasers assigned to transmitters have limited access to the network bandwidth: hence each node must be equipped with multiple optical lasers and/or multiple optical filters in order to maintain a single-hop network. We first analyze scheduling all-to-all packet transmissions and present optimum scheduling for all-to-all packet transmissions. We then extend the analysis to the case of arbitrary traffic demands. We show that the scheduling with arbitrary traffic demand is NP-hard. A heuristic algorithm based on list scheduling is presented. The upper bound so obtained is compared with the lower bound and provides performance guarantees with arbitrary demands. The result are applicable to arbitrary tuning delay, arbitrary number of wavelength channels and optical lasers of arbitrary tuning ranges.

Separate Networks and an Authentication Framework in AMI for Secure Smart Grid (스마트그리드 보호를 위한 AMI 망 분리 및 인증 프레임워크)

  • Choi, Jae-Duck;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.525-536
    • /
    • 2012
  • This paper proposes methods of securing Smart Grid system against various types of cyber threats by separating AMI networks from the public network, the Internet, and providing an AMI specific authentication framework. Due to the fact that thousands and millions of AMI devices to be deployed would be directly or indirectly connected to the public network without any authentication procedures for access control, currently being developed AMI architectures could be widely exposed to considerable number of penetrating attacks. Furthermore, there have not been a sufficient number of researches on authentication frameworks with basis on the specific circumstances of AMI networking that should support varied authentication protocols among security associations and AMI linking devices. This work makes a proposal of isolating smart meters from HAN devices and the Internet and integrating network/application level authentication frameworks with an EAP-based authentication architecture. These approaches are beneficial to deploy AMI with security and efficiency.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Analysis of official Instagram accounts of dental hygiene departments in Korea: relationship between number of posts and followers (우리나라 치위생(학)과 공식 인스타그램 계정 분석: 게시물 수와 팔로워 수의 관련성)

  • Seung-Yeon Wi;Yun-Sook Jung;Young-Seok Kim;Ki-Yoon Kim;Do-Hee Park;Seong-Yeon Kim
    • Journal of Korean society of Dental Hygiene
    • /
    • v.23 no.4
    • /
    • pp.269-276
    • /
    • 2023
  • Objectives: This study aimed to analyze the official Instagram accounts of dental hygiene departments, focusing on the relationship between the number of posts and the number of followers. Additionally, the study sought to determine the status of these Instagram accounts through classifying posts by type. Methods: A total of 49 official Instagram accounts from Korean dental hygiene departments were selected as subjects. Correlation and regression analyses were conducted using SPSS ver. 26.0 Statistics software to determine the correlation between the total number of posts and the number of followers. Results: The results indicated a statistically significant difference in follower numbers between 3 year colleges (Mean: 284.11) and 4 year universities (Mean: 167.86), based on university classification (p=0.035). Correlation analysis demonstrated that the number of posts had a significant effect on the number of followers (r=0.338, p=0.017). Conclusions: The findings showed that the differences in Instagram follower numbers and the number of posts among different university classifications significantly influenced the number of followers.

Smart Safety Management System of Industrial Site using Zigbee Communication (Zigbee 통신을 활용한 산업현장의 스마트 안전관리 시스템)

  • Min, Ji-Hyeon;Jeong, Ga-Yeong;Ha, Hyun-Dong;Hwang, In-Tae;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.546-549
    • /
    • 2022
  • In recent years, to prevent the increase in accidents at industrial sites, various innovative technologies from the 4th industrial era have been incorporated into the construction administration to promote the advancement of safety management. As a result, smart safety management systems using intelligent monitoring that prevent and manage risks in industrial sites in real time are attracting attention. Smart safety management systems provide users with real-time, remote monitoring of factors such as noise, gas concentration fine dust concentration, building material quality, building tilt, and RFID-based worker access through sensors located everywhere. This paper presents a method for collecting and monitoring various data for smart safety management systems via Zigbee communication using Raspberry Pi.

  • PDF

Identifying Barriers Faced by Applicants without a Home Residency Program when Matching into Plastic Surgery

  • Steven L. Zeng;Gloria X. Zhang;Denisse F. Porras;Caitrin M. Curtis;Adam D. Glener;Andres Hernandez;William M. Tian;Emmanuel O. Emovon;Brett T. Phillips
    • Archives of Plastic Surgery
    • /
    • v.51 no.1
    • /
    • pp.139-145
    • /
    • 2024
  • Background Applying into plastic surgery (PS) is competitive. Lacking a home residency program (HRP) is another barrier. Our goal is to characterize challenges faced by PS applicants without HRPs and identify solutions. Methods Surveys were designed for current integrated PS residents and applicants in the 2022 Match without HRPs. Surveys were distributed electronically. Only U.S. allopathic graduate responses were included. Results Of 182 individuals surveyed, 74 responded (39%, 33 residents, 41 applicants). Sixty-six percent reported feeling disadvantaged due to lack of an HRP. Seventy-six percent of applicants successfully matched. Of these, 48% felt they required academic time off (research year) versus 10% of unmatched applicants. Ninety-seven percent of matched applicants identified a mentor versus 40% of unmatched applicants (p < 0.05). Matched applicants identified mentors through research (29%) and cold calling/emailing (25%). Matched versus unmatched applicants utilized the following resources: senior students (74 vs. 10%, p < 0.05) and social media (52 vs. 10%, p < 0.05). Among residents, 16 had PS divisions (48%). Thirty-six percent with divisions felt they had opportunities to explore PS, compared with 12% without divisions. Residents without divisions felt disadvantaged in finding research (94 vs. 65%, p < 0.05), delayed in deciding on PS (50 vs. 28%), and obtaining mentors (44 vs. 35%) and letters of recommendation (31 vs. 24%). Conclusion PS residents and applicants without HRPs reported feeling disadvantaged when matching. The data suggest that access to departments or divisions assists in matching. We identified that external outreach and research were successful strategies to obtain mentorship. To increase awareness for unaffiliated applicants, we should increase networking opportunities during local, regional, and national meetings.