• Title/Summary/Keyword: Overhead cost control

Search Result 55, Processing Time 0.019 seconds

Cost-Effective Inter-LMA Domain Distributed Mobility Control Scheme in PMIPv6 Networks (PMIPv6 네트워크에서 비용효과적인 도메인 간의 분산 이동성 제어기법)

  • Jang, Soon-Ho;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.191-208
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) is designed to provide network-based mobility management support to an MN without any involvement of the MN in the mobility related signalling, hence, the proxy mobility entity performs all related signalling on behalf of the MN. The new principal functional entities of PMIPv6 are the local mobility anchor (LMA) and the mobile access gateway (MAG). In PMIPv6, all the data traffic sent from the MN gets routed to the LMA through a tunnel between the LMA and the MAG, but it still has the single point of failure (SPOF) and bottleneck state of traffic. To solve these problems, various approaches directed towards PMIPv6 performance improvements such as route optimization proposed. But these approaches add additional signalling to support MN's mobility, which incurs extra network overhead and still has difficult to apply to multiple-LMA networks. In this paper, we propose a improved route optimization in PMIPv6-based multiple-LMA networks. All LMA connected to the proxy internetworking gateway (PIG), which performs inter-domain distributed mobility control. And, each MAG keeps the information of all LMA in PMIPv6 domain, so it is possible to perform fast route optimization. Therefore, it supports route optimization without any additional signalling because the LMA receives the state information of route optimization from PIG.

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

A Study on Standardization of Supervision Cost by Investigating Supervision Workload in Cultural Heritage Repair Works (문화재수리공사의 감리업무량 조사를 통한 감리대가 기준 마련 연구)

  • Park, Hwan-Pyo;Han, Jae-Goo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.1
    • /
    • pp.32-42
    • /
    • 2013
  • The Korean Government introduced a cultural heritage supervision system in January 2010 to control quality and to prevent poor construction. However, cultural heritage related constructions that require supervision, a scope of supervision, supervision cost and placement of supervisors have not been standardized yet. For this reason, standards of supervision for repair works of cultural heritage that reflect the characteristics of small-scale repair works and restoration of cultural heritage are required. Accordingly, this study has suggested standards of supervision works and cost by analyzing the average construction period that is suitable for the characteristics of cultural heritage repair works. In other words, this study has suggested standards of full-time supervision costs by applying the fixed amount-added method (adding direct labor cost, direct expenses, overhead expenses, engineering fee, charges for additional works and VAT) which is the same as the method of calculating supervision costs for public construction projects because a supervisor has to work full time at a construction site to perform supervision if the project is a mid/large-scale cultural heritage repair work. Also, this study has suggested standards of part-time supervision costs for a small-scale cultural heritage repair work and the ways of supervising the construction projects by visiting the project site on important occasions. According to the result of the analysis by applying the forgoing standards of supervision costs for cultural heritage, a full-time supervision cost for cultural heritage repair works is approximately 98% compared to the construction supervision of a public construction project, and a part-time supervision is approximately 158% compared to architectural construction supervision. It is expected that the valuable cultural heritage of Korea will be preserved by controlling quality of cultural heritage repair works through the application of this study result - the standards of supervision costs for cultural heritage repair works - to an actual project.

A Study on Policy and Movement to Strengthen the Competitiveness of U.S. Textile and Apparel Industries (미국 의류직물산업의 경쟁력 강화정책 고찰)

  • 황춘섭
    • Journal of the Korean Home Economics Association
    • /
    • v.27 no.2
    • /
    • pp.21-30
    • /
    • 1989
  • The U.S. response to increased international competition was examined in the present study in order to have more comprehensive understanding of the U.S. textile and clothing market. The method employed to conduct the study was the analysis of the written materials, interview with professionals, and the survey of the actual situations of the U.S. textile and apparel industries. The results are summarized as follows; 1. Official U.S. textile and apparel trade policy has been quite has been quite protective since 1950's. The protective trend has been embodied in Japan Cotton Textile Export Control (reciprocal trade agreement signed by the U.S. and Japan in 1957), Short Term Arrangement Regarding International Trade in Cotton Textiles, Long Term Cotton Textile Arrangement (1962∼1973), and Multi-fiber Arrangement (1974∼). Other governmental programs designed to improve the competitiveness of the U.S. textile and apparel industries include Long-term Textile and Apparel Products Export-expansion Program, and 807 Trade to take labor cost advantage. 2. Along with the quite protective governmental trade policy, the corporate responses have been made such as new sourcing mixes, investment in technology, specialization in the textile and apparel industries, and recent strategies pursued by retailer's. The apparel industry was subject to pressure from imports that increased at moderate levels, and the U.S. textile and apparel industries have made extensive efforts to adjust to the increasing competition from abroad. The textile and apparel industries have taken steps to increase labor productivity through automation, to speed management to create and introduce new products and new methods, and have lowered indirect overhead costs. Several industrywide promotion campaigns have attempted to establish a greater public awareness of international competition and to develop a preference for apparel produced in the United States. 3. Regarding these response of the U.S. and other situations of world textile and apparel trade market, much of the sense of crisis that pervades Korean textile and apparel industries has to do with the problem of adjusting government and corporate policy. Textile and apparel industry of Korea faces on going pressure to reduce costs, improve quality, increase service, develop new markets, diversify, and differentiate itself from its foreign competitors. The strategies that have been adopted in the past have generally worked in the past, but the time has come to adopt strategies that reflect present conditions. If this is not done, then we stand to lose large segments of these industries, which once lost will not easily be regenerated.

  • PDF

Secure Query Processing against Encrypted XML Data Using Query-Aware Decryption (질의-인식 복호화를 사용한 암호화된 XML데이타에 대한 안전한 질의 처리)

  • Lee Jae-Gil;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.3
    • /
    • pp.243-253
    • /
    • 2005
  • Dissemination of XML data on the internet could breach the privacy of data providers unless access to the disseminated XML data is carefully controlled. Recently, the methods using encryption have been proposed for such access control. However, in these methods, the performance of processing queries has not been addressed. A query processor cannot identify the contents of encrypted XML data unless the data are decrypted. This limitation incurs overhead of decrypting the parts of the XML data that would not contribute to the query result. In this paper, we propose the notion of query-aware decryption for efficient processing of queries against encrypted XML data. Query-aware decryption allows us to decrypt only those parts that would contribute to the query result. For this purpose, we disseminate an encrypted XML index along with the encrypted XML data. This index, when decrypted, informs us where the query results are located in the encrypted XML data, thus preventing unnecessary decryption for other parts of the data. Since the size of this index is much smaller than that of the encrypted XML data, the cost of decrypting this index is negligible compared with that for unnecessary decryption of the data itself. The experimental results show that our method improves the performance of query processing by up to 6 times compared with those of existing methods. Finally, we formally prove that dissemination of the encrypted XML index does not compromise security.