• Title/Summary/Keyword: Forwarding

Search Result 692, Processing Time 0.028 seconds

The Oscillation Frequency of CML-based Multipath Ring Oscillators

  • Song, Sanquan;Kim, Byungsub;Xiong, Wei
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.6
    • /
    • pp.671-677
    • /
    • 2015
  • A novel phase interpolator (PI) based linear model of multipath ring oscillator (MPRO) is described in this paper. By modeling each delay cell as an ideal summer followed by a single pole RC filter, the oscillation frequency is derived for a 4-stage differential MPRO. It is analytically proved that the oscillation frequency increases with the growth of the forwarding factor ${\alpha}$, which is also confirmed quantitatively through simulation. Based on the proposed model, it is shown that the power to frequency ratio keeps constant as the speed increases. Running at the same speed, a 4-stage MPRO can outperform the corresponding single-stage ring oscillator (SPRO) with 27% power saving, making MPRO with a large forwarding factor ${\alpha}$ an attractive option for lower power applications.

Secure Server Configuration Using Secure Shell(SSH) Port Forwarding Behind Linux-based Firewall (Linux방화벽 환경에서 Secure Shell(SSH)의 Port Forwarding을 이용한 안전한 서버 구성)

  • 임준형;이종철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.629-631
    • /
    • 2000
  • 인터넷환경에서 네트워크구축이 보편화된 요즈음, 보안문제가 이슈로 대두되고 있다. 대형 네트워크상에서는 벌써 수년 전부터 방화벽이 보안장비의 중추를 담당하며 사용되고 있으나, 중소규모의 네트워크 환경을 유지관리하기 위한 보호대책은 미비한 편이다. 특히 라우터 전후에서 기능을 하는 방화벽 외에 대형 네트워크 안에서 중소규모의 네트워크를 운영하고자 할 때, 새로운 방화벽 서버를 사용할 수 있다면, 작은 규모의 네트워크에 적합한 패킷필터링이 가능하여, 외부의 침입으로부터 좀 더 안전한 네트워크의 구성이 가능해진다. 본 논문에서는 상대적으로 비용이 저렴하고 setup이 간단한 Linux 방화벽을 통해 외부망에서 접근할 수 없는 사설(private) IP주소를 사용하는 사설망(Private Network)안에 서버를 구성했을 때, Secure Shell에서 지원하는 Port forwarding 기능을 사용하여, 사설망안에 위치한 웹서버, 메일서버등에 접근할 수 있는 방법을 제시하고자 한다.

  • PDF

멀티미디어 트래픽의 End­-to-­end QoS 보장을 위한 IEEE 802.11 WLAN MAC­-layer의 설계

  • 김성관;강상욱;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.133-135
    • /
    • 2003
  • 본 논문에서는 IEEE 802.11 WLAN $^{[1]}$ 에서 QoS를 제공하기 위해 새로운 MAC­layer 구조를 제안한다. 주요 특징으로는 향후 Core Network의 모델로서 제시되고 있는 DiffServ 구조의 특징들을 WLAN에 적용하는 것을 들 수 있으며, 이를 통해 다양한 종류의 멀티미디어 트래픽에 적용될 End­to­end QoS를 보다 효율적 보장하고자 한다. DiffServ에서 제시되고 있는 Expedited. Assured forwarding과 일반적인 Best­effort traffic에 대한 service 차등화 기법을 WLAN에서 적용하기 위해 기존 MAC layer에서의 DCF, PCF 대신 EDWM(Extended DiffServ in WLAN MAC)이라는 새로운 MAC­layer 구조를 제시한다. 이를 통해 시간지연에 민감한 Expedited forwarding과 대역폭의 보장을 필요로 하는 Assured forwarding의 요구 사항(QoS)을 효율적으로 보장할 수 있다. 이에 더하여 기존의 인프라(infrastructure)인 IEEE 802.11b 환경의 DCF와 이를 통하여 service를 제공받는 일반적인 Best­effort traffic을 위한 backward compatibility 보장 방안을 제시한다.

  • PDF

On Performance Analysis of Position Based Routing Algorithms in Wireless Networks

  • Xuyen, Tran Thi;Kong, Hyung-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.538-546
    • /
    • 2010
  • This paper presents an overview of position-based routing algorithms. We analyze performances of routing algorithms such as Hybrid Opportunistic Forwarding (HOF), Opportunistic multi-hop routing (ExOR), Location based Geocasting and Forwarding (LGF), and Greedy Forwarding in nearest with forward Progress (GFP) routing algorithms to find the best one in terms of packet error rate and throughput efficiency over effects of fading and noise variance in wireless networks. The analyses in closed form expressions are confirmed by the simulation results, which fully agree to analysis results. Additionally, the simulation results indicate significant differences among algorithms when varying the average SNR or the number of relays.

An Analysis of the Operational Cost in the Whole-tree and Cut-to-Length Logging Operation System (전목 및 단목 집재작업시스템에서 작업비용 분석)

  • Kim, Min-Kyu;Park, Sang-Jun
    • Journal of Korean Society of Forest Science
    • /
    • v.102 no.2
    • /
    • pp.229-238
    • /
    • 2013
  • This study was conducted to analyze on the operational cost of logging operations in the whole-tree logging operation system by tower-yarder and swing-yarder, and in the cut-to-length logging operation system by excavator with grapple in order to spread efficient logging operation technique and to establish the logging operation system. In the results of the analysis of operation cost, in case of the whole-tree logging operation system, the operation cost was 2,099 won/$m^3$ in felling by chain saw, 28,286 won/$m^3$ in yarding by tower-yarder, 18,265 won/$m^3$ in yarding by swing-yarder, 18,939 won/$m^3$ in bucking by excavator with grapple and chain saw, 20,484 won/$m^3$ in forwarding and accumulation by wheel type mini-forwarder, 12,701 won/$m^3$ in forwarding and accumulation by excavator with grapple and small forwarding vehicle. In case of the cut-to-length logging operation system, the operation cost was 10,160 won/$m^3$ in felling and bucking by chain saw, 7,567 won/$m^3$ in cut-to-length extraction by excavator with grapple, 6,982 won/$m^3$ in branches and leaves extraction by excavator with grapple, 3,040 won/$m^3$ in the operation road construction by excavator with grapple, 20,484 won/$m^3$ in forwarding and accumulation by wheel type mini-forwarder, 12,701 won/$m^3$ in forwarding and accumulation by excavator with grapple and small forwarding vehicle.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Dynamic and Strict Packet Dropping Mechanism for Assured Forwarding Classes (Assured Forwarding 클래스를 위한 동적 엄격 패킷 폐기 메커니즘)

  • Kim, Su-Yeon;Lee, Ho-Gyun;Kim, Cheol-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3251-3259
    • /
    • 1999
  • In this paper, we present a new mechanism applying more strict priority than RIO mechanism proposed as a drop precedence policy of AF classes in differentiated services. In this mechanism, applying strict priority to drop precedence policy, we get better performance on priority level. Simulation results indicate that the proposed mechanism may provide more efficient and more strict priority transmissions as compared to RIO regardless of traffic load.

  • PDF

Performance Evaluation MPLS ATM Switching System (MPLS ATM 스위치 성능분석)

  • 김인재;이병수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.409-411
    • /
    • 2001
  • 기존의 인터넷 망은 대부분 최선형 서비스를 지원하고 있어 다양한 서비스 품질을 요구하는 사용자의 요구를 만족시키기에는 어려움이 있었으며, 이러한 문제점을 해결하기 위해서 ATM 스위치 기반의 MPLS 망이 구상되었다. ATM 스위치를 기반으로 하는 MPLS 망은 기존 ATM 망에 간단한 L3 라우팅 모듈을 추가하여 인터넷 서비스의 제공이 가능하고, 사용자에게 다양한 서비스 레벨을 지원 할 수 있다는 장점이 있다. 본 논문에서는 MPLS 시스템에서 IP 주소 Lookup을 위한 Forwarding Engine에 대한 큐잉 모델을 설정하고, 인터넷에서 사용되는 프로토콜들에 대한 통계적인 분석을 수행하여, 트래픽 부하에 따른 Forwarding Engine의 성능을 분석하였다.

An Emergency Message Propagation Method with Stem and Branch Structure for Vehicle Safety Communication (차량안전통신을 위한 줄기와 가지 구조를 이용한 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.203-212
    • /
    • 2007
  • An advanced vehicle safety system can be constructed by exchanging danger-related information ,such as urgency stop, traffic accident, obstacle, and car trouble, among the vehicles. However, because network topology changes rapidly and frequently due to the mobility of vehicles, it is impossible to configure the network for information forwarding in this environment. In the most of vehicle safety communication applications, an emergency message is propagated in a form of broadcasting. The simple broadcasting causes a lot of problems in terms of efficiency due to multi-hop area and radio collision problem. This paper proposes a method of selective message forwarding with stem and branch structure for propagating the emergency messages. However, the proposed method raise the efficiency of message transmission with the selective forwarding based on the priority assignment as its location. We analyze and evaluate the performance by comparing the proposed scheme with other schemes that are presented in the paper.