• Title/Summary/Keyword: Protocol-Based Approach

Search Result 429, Processing Time 0.031 seconds

A Study on TCP-friendly Congestion Control Scheme using Hybrid Approach for Multimedia Streaming in the Internet (인터넷에서 멀티미디어 스트리밍을 위한 하이브리드형 TCP-friendly 혼잡제어기법에 관한 연구)

  • 조정현;나인호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.837-840
    • /
    • 2003
  • Recently the multimedia streaming traffic such as digital audio and video in the Internet has increased tremendously. Unlike TCP, the UDP protocol, which has been used to transmit streaming traffic through the Internet, does not apply any congestion control mechanism to regulate the data flow through the shared network. If this trend is let go unchecked, these traffic will effect the performance of TCP, which is used to transport data traffic, and may lead to congestion collapse of the Internet. To avoid any adverse effort on the current Internet functionality, A study on a new protocol of modification or addition of some functionality to existing transport protocol for transmitting streaming traffic in the Internet is needed. TCP-frienly congestion control mechanism is classified with window-based congestion control scheme and rate-based congestion control scheme. In this paper, we propose an algorithm for improving the transmitting rate on a hybrid TCP-friendly congestion control scheme combined with widow-based and rate-based congestion control for multimedia streaming in the internet.

  • PDF

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

CR Technology and Activation Plan for White Space Utilization (화이트 스페이스 활용을 위한 무선환경 인지 기술 및 활성화 방안)

  • Yoo, Sung-Jin;Kang, Kyu-Min;Jung, Hoiyoon;Park, SeungKeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.779-789
    • /
    • 2014
  • Cognitive radio (CR) technology based on geo-location database access approach and/or wideband spectrum sensing approach is absolutely vital in order to recognize available frequency bands in white spaces (WSs), and efficiently utilize shared spectrums. This paper presents a new structure for the TVWS database access protocol implementation based on Internet Engineering Task Force (IETF) Protocol to Access WS database (PAWS). A wideband compressive spectrum sensing (WCSS) scheme using a modulated wideband converter is also proposed for the TVWS utilization. The developed database access protocol technology which is adopted in both the TV band device (TVBD) and the TVWS database operates well in the TV frequency bands. The proposed WCSS shows a stable performance in false alarm probability irrespective of noise variance estimation error as well as provides signal detection probabilities greater than 95%. This paper also investigates Federal Communications Commision (FCC) regulatory requirements of TVWS database as well as European Telecommunications Standards Institute (ETSI) policy related to TVWS database. A standardized protocol to achieve interoperability among multiple TVBDs and TVWS databases, which is currently prepared in the IETF, is discussed.

Cross-Layer Design for Mobile Internet Services in Cellular Communications Systems

  • Jeong, Dong-Geun
    • Information and Communications Magazine
    • /
    • v.24 no.2
    • /
    • pp.64-73
    • /
    • 2007
  • Recently, cross-layer design approach has been greatly attracting researchers' attention as an alternative for improving the performance of wireless data networks. The main reason why cross-layer approaches are particularly well suited for wireless networks is that there exists direct coupling between physical layer and upper layers. Therefore, with cross-layer approach, the protocol designers try to exploit the interaction between layers and promote adaptability at all layers, based on information exchange between layers. In this article we focus on the cross-layer engineering for high data-rate mobile Internet services through cellular networks. First, the general considerations in cross-layer engineering are outlined. Then, we discuss the common approach in literatures, which mainly deals with adaptability in physical and medium access control layer. Finally, we show that the cross-layer engineering taking account of all layers is more adequate for the mobile Internet services cellular network.

A BGP based Distributed Mapping System for Id/Loc split (Id/Loc split 를 위한 BGP 기반 매핑 시스템)

  • Angel, Mukankunga Bisamaza;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1050-1052
    • /
    • 2010
  • Locator and Identifier Split is considered as the solution to the scalability problem Internet is facing today. The separation approach of Locator and Identifier requires a third party called mapping system. The mapping system enables the inter-domain routing between two different edge networks. The design of this third party has generated many proposals, among them one approach use Border Gateway Protocol (BGP) for effective mapping information updates distribution. In this paper, we take advantage of this approach by considering the scalability in term of mapping information storage. Our goal is to provide scalability in term of mapping information storage as well as effective mapping information updates distribution.

Policy-Based QoS Management for SLA-Driven Adaptive Routing

  • Katsikogiannis, George;Mitropoulos, Sarandis;Douligeris, Christos
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.301-311
    • /
    • 2013
  • This paper proposes a policy-based quality of service (QoS) management framework for adaptive routing decisions. We present an approach considering interior gateway protocol (IGP) for path discovery mechanisms and QoS-aware policies for configuring the network elements. The integration of the aforementioned modules into this policy-based network management (PBNM) system is demonstrated by conducting experiments in a real environment, the hellenic public administration network SYZEFXIS. These experiments combine different traffic conditioning mechanisms through event detectors, consider IP service level agreement mechanisms that interoperate with the PBNM system and analyze the enforcement of IGP and QoS policies. Finally, validation and measurement tools are used to prove the efficiency of this framework. It is shown that this architecture offers significantly increased performance and learning capabilities, while the PBNM system achieves adaptive QoS routing through automated configuration considering the avoidance of suboptimal routing issues or under-performance conditions of the network entities.

An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing

  • Shah, Nadir;Qian, Depei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.799-818
    • /
    • 2010
  • In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic and P2P network partition in mobile ad hoc network (MANET). We propose an approach to construct an efficient unstructured P2P overlay over MANET using underlying cluster-based routing (CBRP). One of the peers in the P2P network is used as a root-peer to connect all peers. Each peer maintains connection with physically closer peers such that it can reach the root-peer. The peer constructs a minimum-spanning tree consisting of itself, its directly connected neighbor peers and 2-hop away neighbor peers to remove far away redundant links and to build an overlay closer to the physical network. Due to on-demand nature of inter-cluster routing of CBRP, the positioning algorithm for MANET is used to retrieve the file by a peer from the source peer via shorter path in the physical network. We can show by simulation that our approach performs better in comparison with the existing approach.

Metamorphic Networks

  • Pujolle, Guy
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.198-203
    • /
    • 2013
  • In this paper, we focus on a novel Internet architecture, based on the urbanization of virtual machines. In this approach, virtual networks are built linking specific virtual elements (router, switch, firewall, box, access point, etc.). A virtual network represents a network with an independent protocol stack that shares resources from the underlying network infrastructure. Virtualization divides a real computational environment into virtual computational environments that are isolated from each other, and interact with the upper computational layer, as would be expected from a real, non-virtualized environment. Metamorphic networks enhance several concepts related to future networks, and mainly the urbanization of virtual machines. We present this new paradigm, and the methodology, based on the worldwide metamorphic network platform "M-Net". The metamorphic approach could solve many complex problems, especially related to Cloud computing services.

Internet Traffic Control Using Dynamic Neural Networks

  • Cho, Hyun-Cheol;Fadali, M. Sami;Lee, Kwon-Soon
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.285-291
    • /
    • 2008
  • Active Queue Management(AQM) has been widely used for congestion avoidance in Transmission Control Protocol(TCP) networks. Although numerous AQM schemes have been proposed to regulate a queue size close to a reference level, most of them are incapable of adequately adapting to TCP network dynamics due to TCP's non-linearity and time-varying stochastic properties. To alleviate these problems, we introduce an AQM technique based on a dynamic neural network using the Back-Propagation(BP) algorithm. The dynamic neural network is designed to perform as a robust adaptive feedback controller for TCP dynamics after an adequate training period. We evaluate the performances of the proposed neural network AQM approach using simulation experiments. The proposed approach yields superior performance with faster transient time, larger throughput, and higher link utilization compared to two existing schemes: Random Early Detection(RED) and Proportional-Integral(PI)-based AQM. The neural AQM outperformed PI control and RED, especially in transient state and TCP dynamics variation.

Hybrid Delegate-based Group Communication Protocol For Overlapped Groups (중복 그룹을 위한 혼합형 대표자 기반 그룹 통신 프로토콜)

  • Kim, Cha-Young;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.11-22
    • /
    • 2010
  • In case that group communication protocols assume every process is interested in all events occurring in a large scale group, the events multicasting to a subset of a large process group, such as a sensor network, potentially varying for every event based on their interests might lead to very high communication overhead on each individual process. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped group using gossip based group communication for multicasting in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present a new gossip-based causal message order guaranteeing multicast protocol based on local views and delegates representing subgroups and fully utilizing multi-group features to improve scalability. In the proposed protocol, the message delivery order in overlapped groups has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, these features of the proposed protocol might be significantly scalable rather than those of the protocols guaranteeing atomic order dependencies between multicast messages by hierarchical membership list of dedicated groups like traditional committee protocols and much stronger rather than fully decentralized protocols guaranteeing dependencies between multicast messages based on only local views. And the proposed protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.