• 제목/요약/키워드: Bandwidth Requirements

검색결과 330건 처리시간 0.026초

Degraded Quality Service Policy with Bitrate based Segmentation in a Transcoding Proxy

  • Lee, Jung-Hwa;Park, Yoo-Hyun
    • Journal of information and communication convergence engineering
    • /
    • 제8권3호
    • /
    • pp.245-250
    • /
    • 2010
  • To support various bandwidth requirements for many kinds of devices such as PC, notebook, PDA, cellular phone, a transcoding proxy is usually necessary to provide not only adapting multimedia streams to the client by transcoding, but also caching them for later use. Due to huge size of streaming media, we proposed the 3 kinds of segmentation - PT-2, uniform, bitrate-based segmentation. And to reduce the CPU cost of transcoding video, we proposed the DQS service policy. In this paper, we simulate the combined our previous two researches that are bitrate-based segmentation and DQS(Degraded Quality Service) policy. Experimental results show that the combined policy outperforms companion schemes in terms of the byte-hit ratios and delay saving ratios.

A Practical Network Design for VoD Services

  • Lee, Hoon
    • 한국통신학회논문지
    • /
    • 제34권3B호
    • /
    • pp.225-234
    • /
    • 2009
  • Recently IPTV service is penetrating to the ordinary home users very swiftly. One of the first phase of IPTV service is considered to be VoD, and a nationwide availability of the VoD service imposes tremendous pressure to the network resource due to its requirements for the broad bandwidth, the inherent nature of unicast technology, and the large scalability, etc. This work suggests a novel and practical method to the design of network resource for the VoD service. Especially, we explore the distributed content storage problem that takes into account the popularity of the video contents and its corresponding link dimensioning problem that takes into account the grade of service for the flow level quality of service about the VoD service. By assuming a realistic topology for the nationwide IP backbone network of Korea, which is a typical tree topology, we suggest an analytic method for the design of VoD service.

대용량 VLBI 데이터 전송을 위한 e-VLBI 네트워크 구축 현황 (The Status of Configuration on the e-VLBI Network for the Transfer of Mass VLBI Data)

  • 송민규;김현구;변도영;노덕규;오세진
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.560-562
    • /
    • 2005
  • The electronic transmission of VLBI data(dubbed e-VLBI) presents a special challenge to the use of high-speed global network. with long-term requirements for simultaneous or near-simultaneous Gbps data streams from antennas worldwide converging in a single processing center, e-VLBI is both a useful and highly synergetic application for global high-speed networksAs broband access to high speed research and education networks has become increasingly available to radio telescopes around the world the use of e-VLBI has also increased. High bandwidth e-VLBI experiments have been achieved across wide areas e-VLBI has also been used for the transfer of data from "production"exoeriments

  • PDF

New Buffer Management Scheme to Support TCP/IP Traffic over ATM GFR service

  • Kim, Kwan-Woong;Park, Ji-Hyoun;Chung, Kyung-Taek;Chon, Byoung-Sil
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.892-895
    • /
    • 2002
  • We propose new buffer management scheme for GFR service through FIFO queuing discipline. Proposed scheme can provide minimum bandwidth guarantees for GFR VCs as well as improve the fairness among the competing GFR VCs on a single FIFO queue. From simulation results, we demonstrate the proposed scheme fulfills the requirements of GFR service as well as improves the TCP throughput.

  • PDF

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • 제39권1호
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

Barrel Stave Flextensional 트랜스듀서의 최적설계 (Optimal Design of a Barrel Stave Flextensional Transducer)

  • 김회용;김원호;조치영;노용래
    • 한국소음진동공학회논문집
    • /
    • 제18권5호
    • /
    • pp.572-581
    • /
    • 2008
  • The performance of a barrel stave flextensional transducer is determined by the properties of its constituent materials and the effects of many structural parameters. In this study, with the finite element method, the structure of a barrel stave flextensional transducer was optimized to achieve the widest bandwidth while satisfying the requirements on pressure and center frequency. The optimization was carried out with the SQP-PD method for multi-variable minimization. The optimized barrel stave flextensional transducer satisfied all the required specifications.

ATM 망에서 효율적 대역폭 할당을 위한 종적 셀 스케줄링 알고리즘 (A dynamic cell scheduling algorithm for efficient allocation of bandwidth on ATM network)

  • 조성현;오윤탁;박성한
    • 전자공학회논문지S
    • /
    • 제35S권3호
    • /
    • pp.54-64
    • /
    • 1998
  • In this paper, a cell scheduling algorithm is proposed to satisfy the service requirements of CBR, VBR traffics. Particularly, inthe proposed algorithm an ABR traffic which is not included in the conventional cell schedulaing algorithm is treated as one kind of traffic types. The algorithm of RT-VBR and NRT-VBR traffic such that the service requrements of RT-VBR and NRT-VBR traffic are satisfied. The proposed algorithm dynamically schedules cells in a real time by considerin the current traffic conditions. The simulation of the proposed algorithms such as WRR or DWRR in terms of the mean delay time and the maximum queue length.

  • PDF

GPS/PCS 이중편파 소형 마이크로스트립 패치 안테나 (GPS/PCS Dual Polarization Compact Microstrip patch Antenna)

  • 김호용;조정용;원충호;이홍민
    • 한국전자파학회:학술대회논문집
    • /
    • 한국전자파학회 2003년도 종합학술발표회 논문집 Vol.13 No.1
    • /
    • pp.473-477
    • /
    • 2003
  • In this paper, a integrated structure of a two-element microstrip patch antenna with two feeds for GPS/PCS dual-band operation is proposed. The radiating element for PCS operation is a novel broad band low-profile cylindrical monopole top-loaded with a shorted meander patch, which gives linearly polarized conical radiation pattern and size reduction of patch due to meander line. The radiating element for GPS operation is a novel square-ring microstrip patch with truncated corners and slits. which provide circularly polarized broadside radiation patterns and size reduction due to slots. using dielectric substrate in GPS antenna of proposed antenna provide to improve isolation between two feeds and reduce size of patch. The proposed antenna achieves the bandwidth and polarization requirements of GPS and PCS systems.

  • PDF

ATM망의 Leaky Bucket 메카니즘에서 파라메타 값들에 대한 쎌손실율의 연구 (A Study on the Cell Loss Rates for Various Parameter Values of Leaky Bucket Mechanism in ATM Networks)

  • 이영옥;유기혁
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1991년도 추계종합학술발표회논문집
    • /
    • pp.174-178
    • /
    • 1991
  • ATM, the core technology of BISDN, provides a high degree of flexibility with regard to varying bandwidth requirements for different services. In ATM networks, since users may exceed the traffic volume negotiated at the call setup, traffic from users may need to be monitored and enforced to comply with traffic parameters. The leakybucket mechanism is one of the typical traffic enforcement methods based on the use of transmission tokens for each cell. In this mechanism the major system parameters are size of input buffer, size of token pool, and token generation ratio. In order to represent ATM cell arrivals we assume a Poisson process. In this paper, a state transition analysis technique is used to study the cell loss rates for various values of system parameters.

RSA Based Digital Signature for Secure Authentication

  • Allayear, Shaikh Muhammad;Park, Sung-Soon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1083-1086
    • /
    • 2005
  • Now these days, many technical concepts and tools have been developed in the cryptographic field. Most digital signature schemes used in practice, such as RSA or DSA, have an important role in information privacy and secure authentication for perfect user. A clearly advantage of such schemes over with security proven relative to such common cryptographic assumptions, is their efficiency: as a result of their relative weak requirements regarding computation, bandwidth and storage, these scheme have so far beaten proven secure schemes in practice. Our aim is to contribute to bridge the gap that exists between the theory and practice of digital signature schemes. In this paper we present a digital signature that ensures information privacy. More precisely, under an appropriate assumption about RSA, the scheme is proven to be existentially forgeable under adaptively chosen message attacks. This mechanism can be applied to smart cards or E-Wallet for maintaining secure authentication for user’s information privacy.

  • PDF