• Title/Summary/Keyword: Network Latency

Search Result 764, Processing Time 0.019 seconds

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF

An Optimal and Dynamic Monitoring Interval for Grid Resource Information Services (그리드 자원정보 서비스를 위한 최적화된 동적 모니터링 인터벌에 관한 연구)

  • Kim Hye-Ju;Huh Eui-Nam;Lee Woong-Jae;Park Hyoung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.13-24
    • /
    • 2003
  • Grid technology requires use of geographically distributed resources from multiple domains. Resource monitoring services or tools consisting sensors or agents will run on many systems to find static resource information (such as architecture vendor, OS name and version, MIPS rate, memory size, CPU capacity, disk size, and NIC information) and dynamic resource information (CPU usage, network usage(bandwidth, latency), memory usage, etc.). Thus monitoring itself may cause system overhead. This paper proposes the optimal monitoring interval to reduce the cost of monitoring services and the dynamic monitoring interval to measure monitoring events accurately. By employing two features, we find out unnecessary system overhead is significantly reduced and accuracy of events is still acquired.

  • PDF

An Energy Efficient and Fair MAC Protocol Using Preamble Counting for Wireless Sensor Networks (무선 센서 네트워크의 MAC 프로토콜에서 에너지 효율성과 공정성 향상을 위한 기법 연구)

  • Lee, Dong-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.149-157
    • /
    • 2008
  • Since wireless sensor networks consist of nodes with the constrained battery, energy efficient MAC operation is one of the important issues. Low duty cycle operation is critical to conserve energy in wireless sensor network MAC protocol. Some paper proposed a new approach to low power listening, which employs a short preamble to further reduce energy consumption and to reduce latency. But short preamble suffers from unfair channel access problem since there was no consideration for contention between transmission nodes. Preamble counting proposes a solution to each of these problems by employing node selection information. Simulation results show that the preamble counting provides an improved energy efficiency and fairness of packet delivery.

Game Theory for Routing Modeling in Communication Networks - A Survey

  • Pavlidou, Fotini-Niovi;Koltsidas, Georgios
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.268-286
    • /
    • 2008
  • In this work, we review the routing models that use game theoretical methodologies. A very common assumption in the analysis and development of networking algorithms is the full cooperation of the participating nodes. Most of the analytical tools are based on this assumption. However, the reality may differ considerably. The existence of multiple domains belonging to different authorities or even the selfishness of the nodes themselves could result in a performance that significantly deviates from the expected one. Even though it is known to be extensively used in the fields of economics and biology, game theory has attracted the interest of researchers in the field of communication networking as well. Nowadays, game theory is used for the analysis and modeling of protocols in several layers, routing included. This review aims at providing an elucidation of the terminology and principles behind game theory and the most popular and recent routing models. The examined networks are both the traditional networks where latency is of paramount importance and the emerging ad hoc and sensor networks, where energy is the main concern.

A Directory-based Cache Coherence Scheme Exploiting the Property of Migratory Data in Parallel Programs (병렬 프로그램의 이주 데이터 특성을 고려한 디렉토리 기반 캐쉬 일관성)

  • Rhee, Yun-Seok;Lee, Dong-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.125-131
    • /
    • 2006
  • This Paper proposes a new directory-based cache coherence scheme which significantly reduces coherence traffic by omitting unnecessary write-backs to home nodes for migratory exclusively-modified data. The proposed protocol is well matched to such migratory data which are accessed in turn by processors, since write-backs to home nodes are never used for such migratory sharing. The simulation result shows that our protocol dramatically alleviate the coherence traffic, and the traffic reduction could also lead to shorten network latency and execution time.

  • PDF

A Study on the Real-Time Traffic Monitoring in A AVB Network (AVB(Audion/Video Bridge) 네트워크에서의 실시간모니터링 연구)

  • Ahn, Jung-Kyun;Kwon, Yong-Sik;Eom, Jong-Hoon;Kim, Sung-Soo;Cho, Dong-Kwon;Kang, Sung-Hwan;Kim, Sung-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.81-85
    • /
    • 2009
  • 본 논문은 VoIP, IPTV, VoD 등의 실시간 서비스 품질을 네트워크 노드에서 모니터링함으로써네트워크에서 발생한 품질이상을 분석할 수 있는 스위치 칩을 설계하였다. 인터넷 서비스의 특성상 단대단 서비스에 기반한 실시간서비스는 품질이상이 발생한 위치를 정확하게 분석할 수 없기 때문에 유지보수에 어려움이 있다. 이러한 문제를 해결하기 위해 본 논문에서는 실시간서비스에 해당하는 플로우를 등록하고 해당 플로우가 장치내에서 발생한 패킷손실, RTP 시퀀스 넘버를 참조하여 이전 장치에서의 패킷손실, 패킷의 IAT(Inter Arrival Time), 대역폭, 그리고 장치내 지연을 실시간으로 측정할 수 있는 기능을 가진 AVB(Audio/Video Bridge)칩을 구현하기 위해 IEEE802.1AS를 기만한 시간동기 프로토콜의 정확성을 시뮬레이션하고, FPGA를 이용하여 구현한 AVB 스위치칩에서 타임스템프의 정확성을 확인함으로써 실시간서비스의 품질을 네트워크에서 실시간으로 모니터링 할 수 있는 가능성을 확인하였다.

  • PDF

IEEE 802.11 MAC based Multi-hop Reservation and Backoff Scheme in MIMC Tactical Ad Hoc Networks (전술 애드 혹 네트워크에서 다중 홉 전송을 위한 자원 예약 및 백오프 기법)

  • Cho, Youn-Chul;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.16-27
    • /
    • 2012
  • In multi-interface multi-channel(MIMC) based tactical ad hoc networks, QoS support for required operational capacity is one of the main challenging issues for multi-hop transmissions. To support QoS in such a harsh environment, we propose a novel MAC scheme to minimize multi-hop as well as per-hop delay. The current IEEE 802.11 MAC protocols should contend to reserve the channel resource at every hop by each sender. The every-hop channel contention results in a degradation of end-to-end delay for multi-hop transmissions. The basic idea of our scheme is to make a "multi-hop reservation" at the MAC layer by using the modified RTS frame. It contains additional information such as destination information, packet priority, and hop count, etc. In addition, we differentiate the contention window area according to the packet priority and the number of hops to deliver packets in the predefined allowed latency. Our scheme can minimize the multi-hop delay and support the QoS of the critical data in real time(i.e., VoIP, sensing video data, Video conference between commanders). Our simulation study and numerical analysis show that the proposed scheme outperforms the IEEE 802.11 MAC.

Multiple token-based neighbor discovery for directional sensor networks

  • Nagaraju, Shamanth;Gudino, Lucy J.;Sood, Nipun;Chandran, Jasmine G.;Sreejith, V.
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.351-365
    • /
    • 2020
  • Directional sensor networks (DSNs) can significantly improve the performance of a network by employing energy efficient communication protocols. Neighbor discovery is a vital part of medium access control (MAC) and routing protocol, which influences the establishment of communication between neighboring nodes. Neighbor discovery is a challenging task in DSNs due to the limited coverage provided by directional antennas. Furthermore, in these networks, communication can only take place when the beams of the directional antennas are pointed toward each other. In this article, we propose a novel multiple token-based neighbor discovery (MuND) protocol, in which multiple tokens are transmitted based on an area exploration algorithm. The performance of the protocol is evaluated using the Cooja simulator. The simulation results reveal that the proposed MuND protocol achieves lower neighbor discovery latency, with a 100% neighbor discovery ratio, and has a relatively low communication overhead and low energy consumption.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

High-Performance Variable-Length Reed-Solomon Decoder Architecture for Gigabit WPAN Applications (기가비트 WPAN용 고성능 가변길이 리드-솔로몬 복호기 구조)

  • Choi, Chang-Seok;Lee, Han-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.1
    • /
    • pp.25-34
    • /
    • 2012
  • This paper presents a universal architecture for variable-length eight-parallel Reed-Solomon (RS) decoder for high-rate WPAN systems. The proposed architecture can support not only RS(255,239) code but various shortened RS codes. Moreover, variable-length architecture provides variable low latency for various shortened RS codes and the eight-parallel design also provides high data processing rate. Using 90-$nm$ CMOS standard cell technology, the proposed RS decoder has been synthesized and measured for performance. The proposed RS decoder can provide a maximum 19-$Gbps$ data rate at clock frequency 300 $MHz$.