• Title/Summary/Keyword: P2P 모델

Search Result 2,019, Processing Time 0.034 seconds

Session Control Mechanism for Peer-to-Peer IPTV Services (P2P IPTV 서비스를 위한 세션 제어 메카니즘)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.87-92
    • /
    • 2008
  • This paper proposes a session control model for the P2P(Peer to Peer) IPTV(Internet Protocol Television) services and presents the IPTV session control procedures based on the proposed model. Since, while public IPTV traffic is usually processed via a separate network, P2P IPTV traffic is processed together with the conventional Internet access traffic, the P2P IPTV control mechanism needs to provide multi-stream processing for the constituent TPS(Triple Play Service) traffic and corresponding QoS(Quality of Service) control functions. Besides, P2P IPTV session control mechanism should provide appropriate multicast control functions in order to support effective transmission of video traffic generated by personal IPTV broadcasters. The P2P IPTV session control model proposed in this paper is designed to be based on the standard SIP(Session Initiation Protocol), IGMP(Internet Group Management Protocol), and COPS(Common Open Policy Service) protocol so that it can contribute to the easy and prompt deployment of inter-operable P2P IPTV platform.

Conceptual Modeling on the Adsorption and Transport of Uranium Using 3-D Groundwater Flow and Reactive Transport Models (3차원 지하수 유동과 반응성용질이동 모델을 활용한 우라늄 흡착 및 이동에 관한 개념 모델링)

  • Choi, Byoung-Young;Koh, Yong-Kwon;Yun, Seong-Taek;Kim, Geon-Young
    • Economic and Environmental Geology
    • /
    • v.41 no.6
    • /
    • pp.719-729
    • /
    • 2008
  • In this study, the speciation, adsorption, and transport of uranium in groundwater environments were simulated using geochemical models. The retarded transport of uranium by adsortption was effectively simulated using 3-D groundwater flow and reactive transport models. The results showed that most uranium was adsorbed(up to 99.5%) in a neutral pH(5.5$pCO_2(10^{-3.6}atm)$ condition. Under the higher $pCO_2(10^{-2.5}atm)$ condition, however, the pH range where most uranium was absorbed was narrow from 6 to 7. Under very low $pCO_2(10^{-4.5}atm)$ condition, uranium was mostly absorbed in the relatively wide pH range between 5.5 and 8.5. In the model including anion complexes, the uranium adsorption decreased by fluoride complex below the pH of 6. The results of this study showed that uranium transport is strongly affected by hydrochemical conditions such as pH, $pCO_2$, and the kinds and concentrations of anions($Cl^-$, ${SO_4}^{2-}$, $F^-$). Therefore, geochemical models should be used as an important tool to predict the environmental impacts of uranium and other hazardous compounds in many site investigations.

Emerging P2P Traffic Analysis and Modeling (P2P 트래픽의 특성 분석과 트래픽 모델링)

  • 주성돈;이채우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.279-288
    • /
    • 2004
  • Rapidly emerging P2P(Peer to Peer) applications generate very bursty traffic, which gives a lot of burden to network, and the amount of such traffic is increasing rapidly. Thus it is becoming more important to understand the characteristics of such traffic and reflect it when we design and analyze the network. To do that we measured the traffic in a campus network and present flow statistics and traffic models of the measured traffic, and compare them with those of the web traffic. The results indicate that P2P traffic is much burstier than web traffic and as a result it negatively affects network performance. We modeled P2P traffic using self-similar traffic model to predict packet delay and loss occurred in network which are very important to evaluate network performance. We also predict queue length distribution and loss probability in SSQ(Single Sewer Queue). To assess accuracy of traffic model, we compare the SSQ statistics of traffic models with that of the traffic trace. The results show that self-similar traffic models we use can predict P2P traffic behavior in network precisely. It is expected that the traffic models we derived can be used when we design network capacity and predict network performance and QoS of the P2P applications.

P2P File Recommendation System using Collaborating Filtering (협력 필터링을 이용한 P2P 파일 추천 시스템)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2525-2527
    • /
    • 2003
  • 최근 P2P 모델을 기반으로 한 애플리케이션의 등장으로 다양한 자원을 효율적으로 이용할 수 있게 되었다. P2P에서는 여러 대의 클라이언트를 상호 긴밀하게 연결함으로써 한 대의 서버에 다수의 클라이언트를 연결했을 때 보다 확실한 네트워크의 효과를 기대할 수 있다. 그러나, 기존의 P2P 모델의 경우, 다수의 피어가 네트워크에 참여하여 방대한 양의 자원을 공유할 경우, 원하는 자원을 검색하는데 많은 시간이 소요되는 문제점이 있다. 본 논문에서는 자원 검색의 비효율적인 문제를 해결하고자 협력 필터링 알고리즘을 이용해 P2P 파일 추천 시스템을 제안하고자 한다. 제안한 P2P 시스템은 피어(Peer)들을 유사한 패턴을 갖는 가상 그룹으로 형성해, 그룹 내에서 유용한 자원들을 검색 없이 공유할 수 있도록 하였으며, 자원의 선호도를 기반으로 요청한 자원 외에 추천 시스템을 통해 선호하는 자원을 예측해 제공할 수 있도록 하였다.

  • PDF

Computation of Tides in the Northeast Asian Sea by Blending the Topex/Poseidon Altimeter Data (Topex/Poseidon 고도계 자료를 이용한 북동 아시아 해역의 조석 산정)

  • Kim, Chang-Shik;Matsumoto, Koji;Ooe, Masatsugu;Lee, Jong-Chan
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2001
  • Tidal computations of $M_2,\;S_2,\; K_1$ and $O_1$ constituents in the northeast Asian sea are presented by blending the Topex/Poseidon (T/P) altimeter data into a hydrodynamic model with $5'{\times}5'$ resolution. A series of sensitivity experiments on a weighting factor, which is the control parameter in the blending method, are carried out using $M_2$ constituent. The weighting factor is set to be in inverse proportion to the square root of water depth to reduce noises which could occur in data-assimilative model by blending T/P data. Model results obtained by blending the T/P-derived $M_2,\;S_2,\; K_1$ and $O_1$ constituents simultaneously are compared with all T/P-track tidal data; Average values of amplitude and phase errors are close to zero. Standard deviations of amplitude and phase errors are approximately 2 cm and less than 10 degrees respectively. The data-assimilative model results show a quite good agreement with T/P-derived tidal data, particularly in shallow water region (h<250m). In deep water regions, T/P-derived tidal data show unreasonable spatial variations in amplitude and phase. The data-assimilative model results differ from T/P-derived data, but are improved to show reasonable spatial variations in amplitude and phase. In addition, the T/P-blended model results are in good agreement with coastal tide gauge data which are not blended into the model.

  • PDF

Affecting Factors on the Safety on School -Focusing on U.S Public School Security Guard Patterns- (학교 내 안전에 영향을 미치는 요인: 미국 공립학교의 경비활동 유형을 중심으로)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.137-163
    • /
    • 2013
  • This research will incorporate cases from U.S public schools to analyze the factors which influences the security within the school and efficient security patterns to suggest an adequate suggestion to elevate domestic school security system. This study is divided into two following models: a serious criminal offense model, which considers crimes occurred on campus as subordinate variables, and a school violence model, which considers as subordinate variables after limiting an act of delinquency and an a group action that can harm the safety of students, although they are not included in the categories of crimes. First, from analyzing the factors which influences security within school, the explanation power of serious crime offense safety model and school violence safety model is measured 12% and 11.3%. In serious crime offense safety model, the safety education for students, among the safety programs provided by schools(t=2.548, p=0.011), parent participation to school management(t=10.694, p=0.000), Security activities on campus(t=3.643, p=0.000), and CPTED activity(t=6.467, p=0.000) are statistically significant, as affecting factors on the safety from serious crimes. Similarly in school violence model, the safety education for students, among the safety programs provided by schools(t=3.228, p=0.001), parent participation to school management(t=12.034, p=0.000), security activities on campus(t=2.663, p=0.000), and CPTED activity(t=3.928, p=0.000) are statistically significant, as affecting factors on the safety from school violence. Second, according to the analytic results on figuring out the optimal pattern to heighten the security activities, the serious offence model's explanatory power was 4.4% and school violence safety model rated 3.9%. With the serious offense safety model, the activity factors which showed statistically significant in influencing safety from serious offenses were cooperation with local police force (t=2112, p=0.035), school policy management (t=3.309, p=0.001), security patrolling activity (t=2.548, p=0.011). In the school violence model, security activities initiated by the school which showed statistically significant from serious offenses were cooperation with local police force (t=2.364, p=0.018) and policy management (t=4.142, p=0.000). In accordance with the result of this study, education for students rather than education for teachers is more positive in terms of the safety on campus, and parent participation, like education, is consistently needed for the safety on campus. In case of CPTED activity, reinforcing plans should be prepared by intactly accepting examples in the USA. In case of security activity, plans that can increase visibility and reinforce cooperation with local police in a smooth way will provide a positive effect to the safety on campus.

  • PDF

Hierarchical P2P Model for CPU sharing (CPU공유를 위한 계층적 P2P 모델)

  • 윤기철;임대영;김길용
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.394-396
    • /
    • 2001
  • 지금까지의 분산 컴퓨팅 시스템은 클라이언트의 요청을 서버에서 분산 처리하는 방식이었으나 SETI는 피어투피어 기술을 이용하여 이와 반대로 서버의 요청을 클라이언트에서 분산처리하는 방식을 취하고 있다. 여기서 데이터의 요청과 분산처리가 모두 클라이언트에서 이루어지는 분산시스템을 구성해볼 수 있다. 본 논문에서는 피어투피어 모델에 분산컴퓨팅을 적용하여, 기존 모델의 문제점을 해결한 새로운 피어투피어 모델을 제시해보고자 한다.

  • PDF

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Design and Implementation of A UPnP Security Model (UPnP보안 모델의 설계 및 구현)

  • Lee Dong-Gun;Lim Kyeng-Sik;Park Kwang-Ro
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.2
    • /
    • pp.30-42
    • /
    • 2002
  • UPnP(Universal Plug and Play) is commercial product for the first time in home network middlewares, but it has problem that it has no security standards in UPnP specification. In this paper, we present UPnP security model. It is based on XML Signature of XML Security. It provides UPnP with secure services which are device control message authentication and user access level control. It is independent of UPnP modules and has mobility of secure service modules for non secure ability user part. We conclude this paper with an example of applying UPnP Security model to the UPnP audio device control and an test example.

  • PDF

WORKGLOW: A P2P-based Web Service Orchestration Supporting Complex Workflow Patterns (복잡한 워크플로우 패턴들을 지원하는 P2P 기반 웹 서비스 오케스트레이션)

  • Tran, Doan Thanh;Hoang, Nam Hai;Choi, Eun-Mi
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.77-86
    • /
    • 2007
  • Web services are considered as the critical component in the business plans of corporations as they offers the potential for creating highly dynamic and versatile distributed applications that span across business boundaries. Web Service Orchestration studies composition of already-existing web services to create new value-added services. The composite web services could be executed in a centralized or peer-to-peer(P2P) orchestration model. Compared with centralized-orchestration model, the P2P-based orchestration model provides better scalability, reliability, and performance for the overall services. However, recent P2P-orchestration solutions have limitation in supporting complex workflow patterns. Therefore, they could not effectively handle sophisticated business workflow, which contains complex workflow patterns. In this paper, we propose the WORKGLOW system, which can deal with complex workflow patterns while it is able to perform composite services in P2P orchestration manner. Comparing with centralized orchestration systems, the WORKGLOW brings up more business logic advantages, better performance, and higher flexibility with only a little overhead.

  • PDF