• Title/Summary/Keyword: Multimedia Network

Search Result 2,718, Processing Time 0.027 seconds

The Design of th GRACE-LB Algorithm for Congestion Control in Broadband ISDN ATM Network (광대역 ISDN ATM 네트워크의 과잉 밀집 제어를 위한 GRACE-LB 알고리즘의 설계)

  • 곽귀일;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.708-720
    • /
    • 1993
  • The new preventive control mechanisms for traffic management in BISDN/ATM networks can be divided into Connection Admission Control(CAC), Usage Parameter Control (UPC), and Priority Control. Of these mechanism, Usage Parameter Control continuously monitors the parameters admitted in the network's entry point to guarantee quality of service of connections already admitted. Upon detecting traffic that violates the negotiated parameter, it takes the necessary control measures to prevent congestion. Among these traffic control methods, this paper focuses on the Usage Parameter Control method, and proposes and designs GRACE-LB(Guaranteed Rate Acceptance & Control Element-using Leaky Bucket) which improves upon existing UPC models. GRACE-LB modifies the previous LB model by eliminating the cell buffer, dividing the token Pool into two pools, Long-term pool, Short-term pool, and changing the long-term token generating form using 'Cycle Token' into the same bursty form as the traffic source. Through this, GRACE-LB achieves effective control of the Average Bit Rate(ABR) and burst duration of bursty multimedia traffic which previous LB models found difficult to control. Also, since GRACE-LB can e implemented using only simple operations and there are no cell buffers in it, it has the merit of being easily installed at any place.

  • PDF

A design and implementation of the video conferencing system on the WWW (웹 기반의 화상회의 시스템의 설계 및 구현)

  • Kim, Sung-Jin;Park, Yong-Jin
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.123-132
    • /
    • 1999
  • A video conferencing system provides sharing the conference environment for geographically dispersed computer users who use the audio and video information. But the conventional video conferencing systems have some problems which are dependent on specific software and/or hardware and bound the certain platform and network environment. Furthermore the participants must know the information about other participants before joining the conference session and they have to use the same video conferencing system. This paper describes design and implementation of the video conferencing system on the WWW to solve the mentioned problems. The conference applications are transmitted from a WWW server and executed in the participants Web browsers. The participant can carry out conference services by using only the web browser. The WWW server takes charge of conferencing management including the information related to the participants and provides supported conference tools such as whiteboard, chatting and multimedia controls. Therefore the participants can easily join the conference sessions and perform conference working regardless of network connection situations. We used the Java to implement the seamless session connections and interaction between the conference participants which are the most important when implementing the video conferencing system on the WWW and used the ActiveX technology about the audio and video controls to make it easy the hardware control.

  • PDF

A Study on the Gap Analysis between Expectation and Perceptions of Users for IPTV Services based on N-Screen Technology (N-Screen 기술 기반 IPTV서비스에 대한 이용자의 기대와 인지 간의 GAP분석에 관한 연구)

  • Kim, Jun Soo;Kang, Sang Ug;Lim, Gyoo Gun
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.205-222
    • /
    • 2013
  • One of the recent important issues in IT fields is the convergence. It had been simply focused on functional convergence of technologyies. However the convergence in terms of businesses or services also has been made in recent years. The convergence between broadcasting and telecommunication industries can be possible because the e-transformation of broadcasting industry based on digital technology such as multimedia and multi-channel, can be combined with the high speed telecommunication network. It is giving a birth of various convergence services such as IPTV. IPTV is a kind of new service that is combined with the convergence of network, contents, and device. Nevertheless the controversy about the scope and the value of this new convergence service has constantly been raised; for example, what is the difference between IPTV and Internet TV? or what are the benefits that customers can have? This study measured the expectation level and the cognitive level of users before and after using the service and analyzed the gap between the importance and the satisfaction of the service. From this study, we proposed the priority of each function by analysing Importance-Performance Analysis(IPA) method to suggest required functions of IPTV service based on N-Screen technology. This study will identify the gap of awareness level between service providers and end users for the functions of broadcasting and telecommunications convergence service and suggest a solution enhancing user satisfaction.

A Scalable Dynamic QoS Support Protocol (확장성 있는 동적 QoS 지원 프로토콜)

  • 문새롬;이미정
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.722-737
    • /
    • 2002
  • As the number of multimedia applications increases, various protocols and architectures have been proposed to provide QoS(Quality of Service) guarantees in the Internet. Most of these techniques, though, bear inherent contradiction between the scalability and the capability of providing QoS guarantees. In this paper, we propose a protocol, named DQSP(Dynamic QoS Support Protocol), which provides the dynamic resource allocation and admission control for QoS guarantees in a scalable way. In DQSP, the core routers only maintain the per source-edge router resource allocation state information. Each of the source-edge routers maintains the usage information for the resources allocated to itself on each of the network links. Based on this information, the source edge routers perform admission control for the incoming flows. For the resource reservation and admission control, DQSP does not incur per flow signaling at the core network, and the amount of state information at the core routers depends on the scale of the topology instead of the number of user flows. Simulation results show that DQSP achieves efficient resource utilization without incurring the number of user flow related scalability problems as with IntServ, which is one of the representative architectures providing end-to-end QoS guarantees.

A Wireless Traffic Load-Balancing Algorithm based on Adaptive Bandwidth Reservation Scheme in Mobile Cellular Networks (셀룰러 망에서 적응적 대역폭 예약 기법을 이용한 무선 트래픽 부하 균형 알고리즘)

  • 정영석;우매리;김종근
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.21-24
    • /
    • 2001
  • For very large multimedia traffic to be supported successfully in wireless network environment, it is necessary to provide Quality-of-Service(QoS) guarantees between mobile hosts(clients). In order to guarantee the Qos, we have to keep the call blocking probability below target value during handoff session. However, the QoS negotiated between the client and the network may not be guaranteed due to lack of available channels for traffic in the new cell, since mobile clients should be able to continue their on-going sessions. In this paper we propose a efficient load-balancing algorithm based on the adaptive bandwidth reservation scheme for enlarging available channels in a cell. We design a new method to predict the mobility of clients using MPT(mobility profile table). This method is then used to reserve a part of bandwidths for handoff calls to its adjacent cells and this reserved bandwidth can be used for handoff call prior to new connection requests. If the number of free channels is also under a low threshold value, our scheme use a load-balancing algorithm with a adaptive bandwidth reservation. In order to evaluate the performance of our algorithm, we measure the metrics such as the blocking probability of new calls and dropping probability of handoff calls, and compare with other existing schemes.

  • PDF

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

The Effect of SNS(Social Network Services) Information Quality on Customer Loyalty: Focus on the Mediated Moderation Effect of Customer Satisfaction by Trust (SNS 정보 품질이 고객 충성도에 미치는 영향: 신뢰의 매개된 조절효과를 중심으로)

  • Park, Wonhee;Ha, ByoungKook
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.21-35
    • /
    • 2014
  • Many people have a social network service (SNS) by utilizing a variety of community activities, information sharing, and the creation of social networking. In terms of marketing academics view social networks between businesses and consumers in the new communication strategy, a new way to make them in terms of marketing a new business opportunity. That is, they are actively engaged in the various marketing activities targeting customers using SNS. According to H. A. Simon's needle theory, it is efficient to make a decision within the bounded rationality due to the difficulty of collecting data in decision-making as well as the inability to collect all information because of limited time and money. If the information or the informant can be trusted, the customers would be able to make a quick decision and get higher satisfaction from it. Therefore, this study examines and thereby empirically demonstrates what role customers' trust plays in a company's marketing using SNS by exploring how trust condition works in the mediated model and, theoretically, intends to introduce an empirical methodology on more strictly mediated moderating effects and, in practice, revisit the role of trust on direct and indirect effect the SNS's Information quality has on the performance variables such as customer satisfaction and loyalty. This study thereby aims to provide a strategic tool for the companies that plan to use the SNS in developing marketing strategies.

  • PDF

Implementation of Character and Object Metadata Generation System for Media Archive Construction (미디어 아카이브 구축을 위한 등장인물, 사물 메타데이터 생성 시스템 구현)

  • Cho, Sungman;Lee, Seungju;Lee, Jaehyeon;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.1076-1084
    • /
    • 2019
  • In this paper, we introduced a system that extracts metadata by recognizing characters and objects in media using deep learning technology. In the field of broadcasting, multimedia contents such as video, audio, image, and text have been converted to digital contents for a long time, but the unconverted resources still remain vast. Building media archives requires a lot of manual work, which is time consuming and costly. Therefore, by implementing a deep learning-based metadata generation system, it is possible to save time and cost in constructing media archives. The whole system consists of four elements: training data generation module, object recognition module, character recognition module, and API server. The deep learning network module and the face recognition module are implemented to recognize characters and objects from the media and describe them as metadata. The training data generation module was designed separately to facilitate the construction of data for training neural network, and the functions of face recognition and object recognition were configured as an API server. We trained the two neural-networks using 1500 persons and 80 kinds of object data and confirmed that the accuracy is 98% in the character test data and 42% in the object data.

A News Video Mining based on Multi-modal Approach and Text Mining (멀티모달 방법론과 텍스트 마이닝 기반의 뉴스 비디오 마이닝)

  • Lee, Han-Sung;Im, Young-Hee;Yu, Jae-Hak;Oh, Seung-Geun;Park, Dai-Hee
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.127-136
    • /
    • 2010
  • With rapid growth of information and computer communication technologies, the numbers of digital documents including multimedia data have been recently exploded. In particular, news video database and news video mining have became the subject of extensive research, to develop effective and efficient tools for manipulation and analysis of news videos, because of their information richness. However, many research focus on browsing, retrieval and summarization of news videos. Up to date, it is a relatively early state to discover and to analyse the plentiful latent semantic knowledge from news videos. In this paper, we propose the news video mining system based on multi-modal approach and text mining, which uses the visual-textual information of news video clips and their scripts. The proposed system systematically constructs a taxonomy of news video stories in automatic manner with hierarchical clustering algorithm which is one of text mining methods. Then, it multilaterally analyzes the topics of news video stories by means of time-cluster trend graph, weighted cluster growth index, and network analysis. To clarify the validity of our approach, we analyzed the news videos on "The Second Summit of South and North Korea in 2007".

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.