• Title/Summary/Keyword: Networking structure

Search Result 218, Processing Time 0.031 seconds

Multi-granularity Switching Structure Based on Lambda-Group Model

  • Wang, Yiyun;Zeng, Qingji;Jiang, Chun;Xiao, Shilin;Lu, Lihua
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.119-122
    • /
    • 2006
  • We present an intelligent optical switching structure based on our lambda-group model along with a working scheme that can provide a distinctive approach for dividing complicated traffic into specific tunnels for better optical performance and grooming efficiency. Both the results and figures from our experiments show that the particular channel partition not only helps in reducing ports significantly, but also improves the average signal-to-noise ratio of the wavelength channel and the blocking performance for dynamic connection requests.

  • PDF

Design and Implementation of Self-networking and Replaceable Structure in Mobile Vector Graphics

  • Jeong Gu-Min;Na Seung-Won;Jung Doo-Hee;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.827-835
    • /
    • 2005
  • In this paper, self-networking and replaceable structure in vector graphics contents are presented for wireless internet service. The wireless networks over 2G or 3G are limited in the sense of the speed and the cost. Considering these characteristics of wireless network, self-networking method and replaceable structure in downloaded contents are introduced in order to save the amount of data and provide variations for contents. During the display of contents, a certain data for the contents is downloaded from the server and it is managed appropriately for the operation of the contents. The downloaded materials are reflected to the original contents using replaceable structure. Also, the downloading and modification are independent of the play. In this implementation, the data consists of control data for control and resource data for image, sound or text. Comparing to the conventional methods which download the whole data, the amount of the transmitted data is very small since only the difference is downloaded. Also, during the play of the contents, the changes are adopted immediately. The whole functions are implemented in wireless handset and the various applications are discussed.

  • PDF

Self-Networking and Replaceable Structure for Ubiquitous Multimedia Contents (유비쿼터스 멀티미디어 컨텐츠의 자기 네트워킹과 대체 구조에 대한 연구)

  • Jeong, Gu-Min;Park, Kyung-Joon;Ka, Chung-Hee;Ahn, Hyun-Sik;Moon, Chan-Woo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.4
    • /
    • pp.244-248
    • /
    • 2007
  • In this paper, we propose a novel self-networking and replaceable structure method for the ubiquitous multimedia. As the contents in the ubiquitous multimedia should be realistic and continuously updated in the real-time manner, an efficient scheme of a self-networking and replaceable structure is necessary. In the proposed method, the contents itself connects to the server or corresponding devices and updates itself autonomously. Also, we can reduce the total amount of data transmission comparing to the cases where the whole contents should be downloaded. A Markov chain model is introduced for the proposed structure in order to perform the throughput analysis. The whole mechanism is implemented in the wireless handset and also, various applications of the scheme are discussed.

  • PDF

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

The Evaluation of Networking System between Health Promotion and Other Programs at Public Health Centers (보건소 부서간 건강증진사업 연계실태 평가)

  • Seo, Young-Joon;Jeong, Ae-Suk;Lee, Ji-Eun;Shin, Jung-Woo;Kang, So-Young
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.2
    • /
    • pp.111-121
    • /
    • 2007
  • The purpose of this study is to examine the status quo of the networking between health promotion and other programs conducted by public health centers(PHCs), and to develop concrete strategies for improving the efficiency of the health promotion programs at PHCs. Data were collected from a questionnaire survey for 246 PHCs nationwide and 96 questionnaire were returned(response rate of 39%). A focus group study was also conducted to compliment the detail of the networking system between health promotion and other programs at PHCs. The results revealed that the current networking between health promotion and other programs conducted by public health centers is not working well. Especially, the communication networking between health promotion and other programs at planning stage is poorer than the stages of implementation, performance, and evaluation. The main reasons of the poor networking have been caused by an inadequate organizational structure, inefficient information system, low level of motivation for networking among the staff of PHCs, and no concrete guidelines for networking. This study also suggested several strategies to facilitate the cooperation between health promotion and other programs.

Design of Home Network Security System (홈 네트워크 보안시스템 설계)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

Introducing 'Meta-Network': A New Concept in Network Technology

  • Gaur, Deepti;Shastri, Aditya;Biswas, Ranjit
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.470-474
    • /
    • 2008
  • A well-designed computer network technology produces benefits on several fields within the organization, between the organizations(suborganizations) or among different organizations(suborganizations). Network technology streamlines business processes, decision process. Graphs are useful data structures capable of efficiently representing a variety of networks in the various fields. Metagraph is a like graph theoretic construct introduced recently by Basu and Blanning in which there is set to set mapping in place of node to node as in a conventional graph structure. Metagraph is thus a new type of data structure occupying its popularity among the computer scientists very fast. Every graph is special case of Metagraph. In this paper the authors introduce the notion of Meta-Networking as a new network technological representation, which is having all the capabilities of crisp network as well as few additional capabilities. It is expected that the notion of meta-networking will have huge applications in due course. This paper will play the role of introducing this new concept to the network technologists and scientists.

Distributed and Weighted Clustering based on d-Hop Dominating Set for Vehicular Networks

  • Shi, Yan;Xu, Xiang;Lu, Changkai;Chen, Shanzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1661-1678
    • /
    • 2016
  • Clustering is one of the key technologies in vehicular networks. Constructing and maintaining stable clusters is a challenging task in high mobility environments. DWCM (Distributed and Weighted Clustering based on Mobility Metrics) is proposed in this paper based on the d-hop dominating set of the network. Each vehicle is assigned a priority that describes the cluster relationship. The cluster structure is determined according to the d-hop dominating set, where the vehicles in the d-hop dominating set act as the cluster head nodes. In addition, cluster maintenance handles the cluster structure changes caused by node mobility. The rationality of the proposed algorithm is proven. Simulation results in the NS-2 and VanetMobiSim integrated environment demonstrate the performance advantages.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Wireless Sensors Module for Remote Room Environment Monitoring

  • Lee, Dae-Seok;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.449-452
    • /
    • 2005
  • For home networking system with a function of air quality monitoring, a wireless sensor module with several air quality monitoring sensors was developed for indoor environment monitoring system in home networking. The module has various enlargements for various kinds of sensors such as humidity sensor, temperature sensor, CO2 sensor, flying dust sensor, and etc. The developed wireless module is very convenient to be installed on the wall of a room or office, and the sensors in the module can be easily replaced due to well designed module structure and RF connection method. To reduce the system cost, only one RF transmission block was used for sensors' signal transmission to 8051 microcontroller board in time sharing method. In this home networking system, various indoor environmental parameters could be monitored in real time from RF wireless sensor module. Indoor vision was transferred to client PC or PDA from surveillance camera installed indoor or desired site. Web server using Oracle DB was used for saving the visions by web-camera and various data from wireless sensor module.

  • PDF