• Title/Summary/Keyword: Logical path

Search Result 46, Processing Time 0.026 seconds

A Handoff Mechanism to Avoid Congestion in Wireless Cells (무선 셀에서의 혼잡 발생을 피하는 핸드오프 방안)

  • 변해선;이미정
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.595-603
    • /
    • 2003
  • To provide mobile nodes with continuous communication services, it is important to reduce the packet losses during handoffs. The handoffs of mobile nodes cause packet losses and decrease of TCP throughput on account of a variety of factors. One of those is the congestion in the new cell. Due to the congestion, not only the node moving into the cell but also the already existing nodes that were successfully communicating in the cell suffer the performance degradation. In this paper we propose a new handoff mechanism called‘packet freeze control’, which avoids the congestion caused by handoffs by regulating the influx of traffic burst into the new cell. Packet freeze control is applicable to a wireless network domain in which FAs(Foreign Agents) are connected hierarchically and constitute a logical tree. It gradually increases the number of packets transferred to the new cell by buffering packets in the FAs on the packet delivery path over the wireless network domain. The simulation results show that the proposed mechanism not only reduces the packet losses but also enhances the TCP throughput of other mobile nodes in the cell.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Distributed Hierarchical Location Placement of Core Nodes in the OCBT Multicast Protocol (OCBT 멀티캐스트 프로토콜에서 core 노드의 분산 계층 위치 결정)

  • 황경호;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.90-95
    • /
    • 2000
  • In the Ordered Core Based Tree(OCBT) protocol, a core location is the most important feature to affect the performance. In this paper, the location placement of multiple level cores is studied. The proposed algorithm isthat each node in the network evaluates a sum of shortest path costs from all the other nodes and the entirenetwork is divided into a hierarchy region to have 3-logical level(Small, Medium, Large). The node to have thelowest cost in each S-Region is decided to be a core node. Then, the core nodes in the each S-Region evaluatea sum of shortest path costs from all the other core nodes in the same M-Region. The core node to have thelowest cost is decided to be the upper level core node. Similarly the highest level core node is decided in theL-Region. The proposed algoritthm is compared with conventional two methods to put the core nodes in thenetwork One is the random method to put the core nodes randomly. The other is the center method to locatethe core node at the nearest node from the center of each S-Region and then to locate the highest level corenode at the nearest core node from the center of the entire network. Extensive simulations are performed in theview of mean tree cost and join latency. Simulation results show that the proposed algorithm has betterperformance than random method or center method.

  • PDF

$H\"{u}rthle$ Cell Tumor of the Thyroid (갑상선의 $H\"{u}rthle$씨 세포 종양)

  • Chung Woong-Youn;Kim Suk-Ju;Park Cheong-Soo
    • Korean Journal of Head & Neck Oncology
    • /
    • v.13 no.2
    • /
    • pp.206-212
    • /
    • 1997
  • H$\"{u}$rthle cell neoplasm of the thyroid gland is an uncommon, but potentially malignant lesion. However, in many instances, the malignant potential of the H$\"{u}$rthle cell neoplasm is very difficult to judge histologically. For this reason, the biologic behavior of this tumor and its optimal treatment have come under considerable debate in recent years. In order to review the clinicopathologic features of the H$\"{u}$rthle cell neoplasm and to determine its optimal treatment modalities, we studied 26 patients with path logical proof of H$\"{u}$rthle cell tumor from January 1987 to September 1997. We also performed an immunohistochemical study using the monoclonal antibodies against antigen CD34 for the angiogenic activity of this tumor and evaluated the differences of microvessel density(MVD) between benign and malignant tumors. The age of the patients ranged from 1 to 71 years with a mean of 44.2 years. There were 6 males and 20 females(M : F= 1 : 3.3). The accuracies of fine needle aspiration biopsy and frozen section were very low; 6.3% and 34.8%, respectively. There were 20 benign tumors and 6 malignant tumors(23.1%). All the malignant tumors were microinvasive(intermediate) type which had minimal capsular invasion and most of them(5 cases) were diagnosed postoperatively. Any specific clinicopathologic differences were not seen between benign and intermediate groups. Most of the cases had conservative surgeries(15 ipsilateral lobectomy-isthmusectomy, 7 subtotal thyroidectomy) while total thyroidectomy was performed in 4 cases. Of the cases with malignant tumor, 2 had ipsilateral lobectomy-isthmusectomy, 3 had subtotal thyroidectomy and the remaining 1 had total thyroidectomy. Mean size of the tumors was 3.0 cm(0.1- 8.5 cm) in the greatest diameter and multiple tumors were seen in 6 cases(23.1 %). During the follow-up period, only one recurrence(3.8%) of benign tumor occurred but distant metastasis or cause-specific death was seen in the benign or intermediate groups. Mean MVDs of the benign(n=13) and intermediate(n=6) groups were $121.7{\pm}35.3$ and $114.3{\pm}31.7$, respectively and there was no statistical significance between them. In conclusion, because of the low accuracies of fine needle aspiration biopsy and frozen section for the H$\"{u}$rthle cell neoplasm, the extent of surgery could be individualized based on permanent pathologic examination; Conservative surgery would be adequate for patients with benign or intermediate H$\"{u}$rthle cell neoplasm and total or near-total thyroidectomy for those with definite malignancy.

  • PDF

Performance Analysis of Routing Protocols for WLAN Mesh Networks (WLAN Mesh 망을 위한 라우팅 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.417-424
    • /
    • 2007
  • Mesh networks using WLAN technology have been paid attention as a key wireless access technology. However, many technical issues still exist for its successful deployment. One of those issues is the routing problem that addresses the path setup through a WLAN mesh network for the data exchanges between a station and a wired network. Since the characteristics of a WLAN mesh network can be very dynamic, the use of single routing protocol would not fit for all environments whether it is reactive or proactive. Therefore, it is required to develop an adaptive routing protocol that modifies itself according to the changes in the network parameters. As a logical first step for the development, an analytical model considering all the dynamic features of a WLAN mesh network is required to evaluate the performance of a reactive and a proactive routing scheme. In this paper, we propose an analytical model that makes us scrutinize the impact of the network and station parameters on the performance of each routing protocol. Our model includes the size of a mesh network, the density of stations, mobility of stations. and the duration of network topology change. We applied our model to the AODV that is a representative reactive routing protocol and DSDV that is a representative proactive routing protocol to analyze the tradeoff between AODV and DSDV in dynamic network environments. Our model is expected to help developing an adaptive routing protocol for a WLAN mesh network.

A Comprehensive Model of Purchasing Intention of Customers in Agricultural Products Online Shopping Malls (농산물 온라인 쇼핑몰에서의 고객의 구매의도에 관한 포괄적 모형)

  • Lim, Dongsup;Yoon, Cheolho
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.159-181
    • /
    • 2015
  • This study proposes a comprehensive model of purchasing intention of customers in agricultural products online shopping malls. In this study, we derived the factors through the literature reviews and logical reasoning and classified the factors as a business point of view, an information systems point of view and an agricultural characteristics point of view, and developed the integrated research model which is the factors affect purchase intentions by mediating trust and the perceived usefulness. A total of 329 samples of a valid survey data from the members of small agricultural online shopping malls were collected and the research model was empirically analyzed by a confirmatory factor analysis and path analyses using structural equation modeling with the data. The results show that the product quality and the service quality of the business point of view have effects on the trust, however the price adequacy and entertainment have no effect on the trust and the perceived usefulness respectively, also the advertising exposure has no effect on the trust but it has an effect on the purchase intention directly. The information quality and the ease of use of the information systems point of view have an effect on the trust and perceived usefulness. At last, the seasonal product of the agricultural characteristics point of view has effects on perceived usefulness but the regional brand has no effect on the trust. The results of this study provide strategic implications for successful development and operation of agricultural products online shopping malls.