• Title/Summary/Keyword: Join session

Search Result 24, Processing Time 0.023 seconds

Enhanced Communication Transport Protocol: Implementations and Experimentations (ECTP 멀티캐스트 전송 프로토콜: 구현 및 성능분석)

  • Park, Ki-Shik;Park, Juyoung;Koh, Seok-Joo;Jo, In-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.876-890
    • /
    • 2003
  • This paper proposes a protocol for the reliableand QoS-aware multicast transport, which is called the Enhanced Communications Transport Protocol (ECTP). The ECTP has so far been developed and standardized in ITU-T SG17 and ISO/IEC JTC 1/SC 6. Differently from the conventional reliable multicast, as shownin the IETF RMT WG, the ECTP additionally provides several distinct features such as tight control of multicast session, tree-based error control, and QoS management. For the tight control of multicast connections, the sender is at the heart of one-to-many group communications, and it is responsible for overall connection management such as connection creation/termination, pause/resumption, and the join and leave operations. for tree-based reliability control, ECTP configures a hierarchical tree during connection creation. Error control is performed within each local group defined by a control tree, which was partly designed like the IETF TRACK approach. Each parent retransmits lost data in response to retransmission requests from its children. For QoS management, ECTP supports QoS negotiation for resource reservation, and it also provides QoS monitoring and maintenance operations. ECTP has been implemented and tested on Linux machine, along with Application Programming Interfaces based on Berkeley sockets. For basic testing of the ECTP functionality, we give some preliminary experimental results for performance comparison of ECTP and TCP unicast transports. In conclusion, we describe the status of ECTP experimentations over APAN/KOREN testbed networks

The effects of career exploration programs using career portfolio and teacher-directed on the career maturity and career identity in middle school students (커리어포트폴리오형 및 교사주도형 진로탐색 프로그램이 중학생의 진로성숙도와 진로정체감에 미치는 효과)

  • Shin, Im-Sun;Jang, Yoon-Ok
    • Journal of Korean Home Economics Education Association
    • /
    • v.24 no.1
    • /
    • pp.85-104
    • /
    • 2012
  • The purpose of this study was to carry out the career portfolio and the teacher-directed career exploration program in the unit of 'Industry and Career' of Technology·Home Economics and to find out how much those programs affect on career maturity and career identity in middle school students. The subjects were third-grade students who were selected at random from a middle school in Daegu. The subjects were divided into 60 for career portfolio group, 60 for teacher-directed group, and 60 for control group. Those programs were conducted totally in 9 sessions once or twice a week, and each session took 45 minutes. For pretest and post test, the questionnaire consisting of career maturity scale and career identity scale was used. To analyze data, ANCOVA was used and Scheffe test was conducted to examine significant differences between three groups. The main result of this study was the following : First, students who participate in the career portfolio and the teacher-directed career exploration program are more improved than those who have not been taught anything in determinacy and purpose of career maturity. Also, students who join in the career portfolio career exploration program are much more improved than those who join in the teacher-directed career exploration program in confidence and preparedness of career maturity. Second, students who join in the career portfolio career exploration program are more improved than those who join in the teacher-directed career exploration program in stability, goal directivity and assertiveness of career identity. Also students who participate in the lecture-oriented career exploration program are more improved meaningfully than those who have not been taught anything in the task orientation of career identity.

  • PDF

A Multicast Delivery Technique for VCR-like Interactions in Collaborative P2P Environment (협력 P2P 환경에서 VCR 기능을 위한 멀티캐스트 전송 기법)

  • Kim Jong-Gyung;Kim Jin-Hyuk;Park Seung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.679-689
    • /
    • 2006
  • Delivering multicast stream is one of the cost-saving approach in the large scale VOD environment. Because implementing VCR-like interactions for user's convenience in the multicast streaming system involves complex problems, we need the proper solutions for them. In this paper, we propose a hybrid scheme which uses the general P2P and the patching scheme with the Collaborative Interaction Streaming Scheme(CISS). CISS provides jumping functionability to the appropriate multicast session after VCR-like interaction in the environment in which multiple peers transmit VCR-like interaction streams to the VCR-like functionability request node to reduce the loads generated by frequent join or departure of peers at the multicast tree during providing VCR-like functionability. Therefore, with the proposed scheme we can distribute network traffic and reduce control overhead and latency. And to evaluate the performance of proposed scheme we compare it in the aspect of the performance of streaming delivery topology, control overhead and streaming quality with P2Cast[10] and DSL[11]. The simulation result shows that proposed P2Patching reduces about 30% of process overhead and enhances about $25{\sim}30%$ of streaming quality compared with DSL.

A design and implementation of the video conferencing system on the WWW (웹 기반의 화상회의 시스템의 설계 및 구현)

  • Kim, Sung-Jin;Park, Yong-Jin
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.123-132
    • /
    • 1999
  • A video conferencing system provides sharing the conference environment for geographically dispersed computer users who use the audio and video information. But the conventional video conferencing systems have some problems which are dependent on specific software and/or hardware and bound the certain platform and network environment. Furthermore the participants must know the information about other participants before joining the conference session and they have to use the same video conferencing system. This paper describes design and implementation of the video conferencing system on the WWW to solve the mentioned problems. The conference applications are transmitted from a WWW server and executed in the participants Web browsers. The participant can carry out conference services by using only the web browser. The WWW server takes charge of conferencing management including the information related to the participants and provides supported conference tools such as whiteboard, chatting and multimedia controls. Therefore the participants can easily join the conference sessions and perform conference working regardless of network connection situations. We used the Java to implement the seamless session connections and interaction between the conference participants which are the most important when implementing the video conferencing system on the WWW and used the ActiveX technology about the audio and video controls to make it easy the hardware control.

  • PDF

An Energy-Aware Multi-tree Video Multicast Scheme in Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 잔여 에너지를 고려한 다중 트리 비디오 멀티캐스트 기법)

  • Park, Jae-Young;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1336-1348
    • /
    • 2009
  • In this paper, we propose an energy-aware multi-tree video multicast scheme for wireless ad hoc networks. Some network nodes may have energy enough to receive and forward the whole video content whereas some may not. Even though the video quality may vary depending on the remaining energy, our scheme enables the low-energy nodes to join the video multicast session. The video stream is split into a set of multiple and independent descriptions by MDC (Multiple description coding) scheme. Each description corresponds to a substream and number of substreams determine the video quality. The member nodes determine how many substreams it would receive depending on the remaining energy and expected amount of packets per substream. So does the intermediate tree nodes. That builds a tree per substream and multiple trees per session. The data source disseminates each substream through corresponding tree. The video quality of the member nodes varies according to number of participating trees. We evaluate the performance of our scheme by simulation. Our scheme showed better peak signal to noise ratio and extended the lifetime of the network nodes compared with MAODV, which builds a single tree, and MT-MAODV, which builds multiple trees but does not consider the available energy.

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

The Effect of Cyber Group Counseling on the Depression of Internet Addiction Children (사이버 집단상담이 인터넷 중독 아동의 우울증에 미치는 효과)

  • Han, Eun-Su
    • The Korean Journal of Elementary Counseling
    • /
    • v.4 no.1
    • /
    • pp.191-214
    • /
    • 2005
  • This study aimed to examine the effect of Cyber Group Counseling on the depression of internet addiction children in elementary school. In this study, the following questions were posed: How effective is the Cyber Group Counseling on the depression of internet addiction children? In this study, subjects were 24 students who got 14 points over in KAIS and got 11 points over in CDI among 245 of 5th, 6th grade students in Daegu and Chongdo Kyungbuk who did Internet addiction scale for Korean Adolescent(KAIS) and Children's Depression Inventory(CDI). They were divided into experimental group and comparative group. Subjects in experimental group practiced Cyber Group Counseling for 12 sessions(60 minutes per session) for 6 weeks. But the control group had no treatment during the period. During the experiment, 2 of each groups were left out. The counseling schedule and hor· to join the Cyber Group Counseling clinic were notified by e-mail. The Cyber Group Counseling was on every Monday and Thursday. The Cyber Group Counseling progressed by internet chatting, bulletin board, e-mail and a slip paper counsel. The collected data were analyzed with SPSS/PC+ (statistical package for the social science/personal computer) program and t -test. The findings of this study were as follows: First, the depression of internet addiction children who joined in Cyber Group Counseling was significantly reduced than the others. So, Cyber Group Counseling was proved one of the useful psychotherapy approach. Second, the subordinate of depression including behavioral disturbance and anhedonia was significantly reduced. Third, the subordinate of depression including the dysphoric mood, the self-deprecation and physiological symptoms was reduced. But it was not statistically significant.

  • PDF

A Patching-Based VOD System supporting VCR Operations (VCR 동작을 지원하는 패칭 기반의 주문형 비디오 시스템)

  • 조창식;마평수;이기호;강지훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.9-16
    • /
    • 2003
  • In this paper, we propose a method for supporting VCR operations in a patching based multicast VOD system. Random access, pause and resume operations are supported in our system, and the channel and session scheduling algorithms for the VCR operations are proposed. When it is necessary to join a sharable multicast channel in the admission control for the VCR operations, the patching technique, which shares an on-going regular channel and allocates a new patching channel for the missing data, is used. Therefore, unlike the previous approach that allocates an excessive number of I-channels, service latency is minimized and channel usage is optimized in our system. Moreover buffered data. which is saved in disk during patching, is reused to prevent unnecessary patching channel allocation. For this. the patching management information is extended and a buffed data management scheme is proposed. In our system, the First-Come-First-Served scheduling is used to inform clients the service latency for the VCR operations immediately.

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR (일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH)

  • 권정옥;황정연;김현정;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.93-112
    • /
    • 2002
  • Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.