• 제목/요약/키워드: Networking structure

검색결과 218건 처리시간 0.027초

Multi-granularity Switching Structure Based on Lambda-Group Model

  • Wang, Yiyun;Zeng, Qingji;Jiang, Chun;Xiao, Shilin;Lu, Lihua
    • ETRI Journal
    • /
    • 제28권1호
    • /
    • pp.119-122
    • /
    • 2006
  • We present an intelligent optical switching structure based on our lambda-group model along with a working scheme that can provide a distinctive approach for dividing complicated traffic into specific tunnels for better optical performance and grooming efficiency. Both the results and figures from our experiments show that the particular channel partition not only helps in reducing ports significantly, but also improves the average signal-to-noise ratio of the wavelength channel and the blocking performance for dynamic connection requests.

  • PDF

Design and Implementation of Self-networking and Replaceable Structure in Mobile Vector Graphics

  • Jeong Gu-Min;Na Seung-Won;Jung Doo-Hee;Lee Yang-Sun
    • 한국멀티미디어학회논문지
    • /
    • 제8권6호
    • /
    • pp.827-835
    • /
    • 2005
  • In this paper, self-networking and replaceable structure in vector graphics contents are presented for wireless internet service. The wireless networks over 2G or 3G are limited in the sense of the speed and the cost. Considering these characteristics of wireless network, self-networking method and replaceable structure in downloaded contents are introduced in order to save the amount of data and provide variations for contents. During the display of contents, a certain data for the contents is downloaded from the server and it is managed appropriately for the operation of the contents. The downloaded materials are reflected to the original contents using replaceable structure. Also, the downloading and modification are independent of the play. In this implementation, the data consists of control data for control and resource data for image, sound or text. Comparing to the conventional methods which download the whole data, the amount of the transmitted data is very small since only the difference is downloaded. Also, during the play of the contents, the changes are adopted immediately. The whole functions are implemented in wireless handset and the various applications are discussed.

  • PDF

유비쿼터스 멀티미디어 컨텐츠의 자기 네트워킹과 대체 구조에 대한 연구 (Self-Networking and Replaceable Structure for Ubiquitous Multimedia Contents)

  • 정구민;박경준;가충희;안현식;문찬우
    • 융합신호처리학회논문지
    • /
    • 제8권4호
    • /
    • pp.244-248
    • /
    • 2007
  • 본 논문에서는 유비쿼터스 멀티미디어 컨텐츠의 구현을 위해서 자기 네트워킹과 대체 구조를 제안한다. 유비쿼터스 멀티미디어의 여러 가지 특성 중에서 컨텐츠의 측면에서는 컨텐츠의 사실성과 실시간성이 매우 중요하다. 컨텐츠의 실시간성을 위해서 본 논문에서는 자기 네트워킹과 대체 구조를 구현하고 해석한다. 컨텐츠의 네트웍 기능을 이용하여 서버에 접속하고 스스로 업데이트 할 수 있도록 한다. 이에 따라서 전체적인 데이터 전송량을 줄일 수 있으며 마코프 체인 모델을 이용하여 제안된 구조의 처리율을 해석하여 효용성을 보인다. 또한 제안된 구조의 단말기에서의 구현과 이를 통한 어플리케이션에 대해서 정리한다.

  • PDF

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

보건소 부서간 건강증진사업 연계실태 평가 (The Evaluation of Networking System between Health Promotion and Other Programs at Public Health Centers)

  • 서영준;정애숙;이지은;신정우;강소영
    • 보건교육건강증진학회지
    • /
    • 제24권2호
    • /
    • pp.111-121
    • /
    • 2007
  • The purpose of this study is to examine the status quo of the networking between health promotion and other programs conducted by public health centers(PHCs), and to develop concrete strategies for improving the efficiency of the health promotion programs at PHCs. Data were collected from a questionnaire survey for 246 PHCs nationwide and 96 questionnaire were returned(response rate of 39%). A focus group study was also conducted to compliment the detail of the networking system between health promotion and other programs at PHCs. The results revealed that the current networking between health promotion and other programs conducted by public health centers is not working well. Especially, the communication networking between health promotion and other programs at planning stage is poorer than the stages of implementation, performance, and evaluation. The main reasons of the poor networking have been caused by an inadequate organizational structure, inefficient information system, low level of motivation for networking among the staff of PHCs, and no concrete guidelines for networking. This study also suggested several strategies to facilitate the cooperation between health promotion and other programs.

홈 네트워크 보안시스템 설계 (Design of Home Network Security System)

  • 설정환;이기영
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

Introducing 'Meta-Network': A New Concept in Network Technology

  • Gaur, Deepti;Shastri, Aditya;Biswas, Ranjit
    • Journal of information and communication convergence engineering
    • /
    • 제6권4호
    • /
    • pp.470-474
    • /
    • 2008
  • A well-designed computer network technology produces benefits on several fields within the organization, between the organizations(suborganizations) or among different organizations(suborganizations). Network technology streamlines business processes, decision process. Graphs are useful data structures capable of efficiently representing a variety of networks in the various fields. Metagraph is a like graph theoretic construct introduced recently by Basu and Blanning in which there is set to set mapping in place of node to node as in a conventional graph structure. Metagraph is thus a new type of data structure occupying its popularity among the computer scientists very fast. Every graph is special case of Metagraph. In this paper the authors introduce the notion of Meta-Networking as a new network technological representation, which is having all the capabilities of crisp network as well as few additional capabilities. It is expected that the notion of meta-networking will have huge applications in due course. This paper will play the role of introducing this new concept to the network technologists and scientists.

Distributed and Weighted Clustering based on d-Hop Dominating Set for Vehicular Networks

  • Shi, Yan;Xu, Xiang;Lu, Changkai;Chen, Shanzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1661-1678
    • /
    • 2016
  • Clustering is one of the key technologies in vehicular networks. Constructing and maintaining stable clusters is a challenging task in high mobility environments. DWCM (Distributed and Weighted Clustering based on Mobility Metrics) is proposed in this paper based on the d-hop dominating set of the network. Each vehicle is assigned a priority that describes the cluster relationship. The cluster structure is determined according to the d-hop dominating set, where the vehicles in the d-hop dominating set act as the cluster head nodes. In addition, cluster maintenance handles the cluster structure changes caused by node mobility. The rationality of the proposed algorithm is proven. Simulation results in the NS-2 and VanetMobiSim integrated environment demonstrate the performance advantages.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Wireless Sensors Module for Remote Room Environment Monitoring

  • Lee, Dae-Seok;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.449-452
    • /
    • 2005
  • For home networking system with a function of air quality monitoring, a wireless sensor module with several air quality monitoring sensors was developed for indoor environment monitoring system in home networking. The module has various enlargements for various kinds of sensors such as humidity sensor, temperature sensor, CO2 sensor, flying dust sensor, and etc. The developed wireless module is very convenient to be installed on the wall of a room or office, and the sensors in the module can be easily replaced due to well designed module structure and RF connection method. To reduce the system cost, only one RF transmission block was used for sensors' signal transmission to 8051 microcontroller board in time sharing method. In this home networking system, various indoor environmental parameters could be monitored in real time from RF wireless sensor module. Indoor vision was transferred to client PC or PDA from surveillance camera installed indoor or desired site. Web server using Oracle DB was used for saving the visions by web-camera and various data from wireless sensor module.

  • PDF