• Title/Summary/Keyword: Protocol-Based Approach

Search Result 435, Processing Time 0.024 seconds

An IMS based Architecture Using SDN Controller (SDN 제어기를 사용한 IMS 기반 구조)

  • Liu, Zeqi;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.19-24
    • /
    • 2018
  • The IP Multimedia Subsystem(IMS) is an architectural framework for delivering IP multimedia services to mobile users. In order to guarantee the reliability and Quality of Service(QoS) of a variety of multimedia services, we need a new evolutionary approach that maintains the IMS based signaling platform which can perform the processing of flow through distributed controllers. Software Defined Network(SDN) is an architecture purporting to be distributed, dynamic, cost-effectives as well as adapting and seeking to be suitable for the high-bandwidth, dynamic nature of today's applications. It requires some methods for the control plane to communication with the data plane. One of such mechanisms is OpenFlow which is a prominent standard protocol and interface that is responsible for managing the network resources by using the remote SDN controller. In this paper, we propose a straightforward approach for integrating SDN technology together with the IMS architecture. Therefore we propose and construct a combined architecture model that performs flow processing using OpenFlow via the IMS based signaling platform, which maintains the existing telecom call service. Additionally, we describe some relevant experimentation results from the proposed architecture.

A routing protocol based on Context-Awareness for Energy Conserving in MANET

  • Chen, Yun;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.104-108
    • /
    • 2007
  • Ad hoc networks are a type of mobile network that function without any fixed infrastructure. One of the weaknesses of ad hoc network is that a route used between a source and a destination is to break during communication. To solve this problem, one approach consists of selecting routes whose nodes have the most stable link cost. This paper proposes a method for improving the low power distributed MAC. This method is based on the context awareness of the each nodes energy in clustering. We propose to select a new scheme to optimize energy conserving between the clustering nodes in MANET. And this architecture scheme would use context-aware considering the energy related information such as energy, RF strength, relative distances between each node in mobile ad hoc networks. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.

Multi-stream Generation Method for Intra-media Synchronization of Very Low Bit Rate Video (초저속 고압축 비디오의 미디어내 동기화를 위한 멀티 스트림 생성 기법)

  • 강경원;류권열;권기룡;문광석;김문수
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.3
    • /
    • pp.9-15
    • /
    • 2001
  • Very low bit rate video coding uses the inter-picture video coding method for high compression. The inter-picture video coding is coded based on the information of the previous frames so any packet loss can lead to reduce the image quality on the transmission. In this paper, we proposed the multi-stream generation method for inter-media synchronization of very low bit rate video based on TCP for reliable transmission. The proposed approach performs a reliable transmission via a TCP based protocol. This method incorporates multi-streams in order to enhance the robustness of delivery and can withstand against network jitter. Moreover, the client bandwidths are fully utilized in a highly efficient way.

  • PDF

A Supplementary Service Technology for Enhanced Receiver Performance of Emergency Alert Broadcast Based on 5G Cellular Communications (5G 이동통신 기반 재난 방송의 수신 성능 향상을 위한 부가 서비스 기법)

  • Chang, Sekchin
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.197-207
    • /
    • 2021
  • The emergency alert broadcast service based on cellular communications is defined as CBS. However, the CBS just supports a limited text message, which might be unavailable to foreigners, who are unfamiliar with local characters. The CBS protocol relies on a broadcast mechanism. Such a broadcast technology exhibits that the number of outage users significantly increases under poor channel conditions. In this paper, we present a supplementary service technology for 5G CBS, which considerably enhances the accessibility of foreigners and illiterate persons, and the receiver performance. For the enhanced receiver performance, the proposed supplementary service approach effectively exploits the device-based geo-targeting capability that the 5G CBS can afford to offer.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Human Pluripotent Stem Cell-Derived Retinal Organoids: A Viable Platform for Investigating the Efficacy of Adeno-Associated Virus Gene Therapy

  • Hyeon-Jin Na;Jae-Eun Kwon;Seung-Hyun Kim;Jiwon Ahn;Ok-Seon Kwon;Kyung-Sook Chung
    • International Journal of Stem Cells
    • /
    • v.17 no.2
    • /
    • pp.204-211
    • /
    • 2024
  • With recent advances in adeno-associated virus (AAV)-based gene therapy, efficacy and toxicity screening have become essential for developing gene therapeutic drugs for retinal diseases. Retinal organoids from human pluripotent stem cells (hPSCs) offer a more accessible and reproducible human test platform for evaluating AAV-based gene therapy. In this study, hPSCs were differentiated into retinal organoids composed of various types of retinal cells. The transduction efficiencies of AAV2 and AAV8, which are widely used in clinical trials of inherited retinal diseases, were analyzed using retinal organoids. These results suggest that retinal organoids derived from hPSCs serve as suitable screening platforms owing to their diverse retinal cell types and similarity to the human retina. In summary, we propose an optimal stepwise protocol that includes the generation of retinal organoids and analysis of AAV transduction efficacy, providing a comprehensive approach for evaluating AAV-based gene therapy for retinal diseases.

Load-Balancing and Fairness Support Mechanisms in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서의 부하 균등화 및 공평성 지원 방법)

  • Ahn Sanghyun;Yoo Younghwan;Lim Yujin
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.889-894
    • /
    • 2004
  • Most ad-hoc routing protocols such as AODV(Ad Hoc On-Demand Distance Vector) and DSR(Dynamic Source Routing) do not try to search for new routes if the network topology does not change. Hence, with low node mobility, traffic may be concentrated on several nodes, which results in long end-to-end delay due to congestion at the nodes. Furthermore, since some specific nodes are continuously used for long duration, their battery power may be rapidly exhausted. Expiration of nodes causes connections traversing the nodes to be disrupted and makes many routing requests be generated at the same time. Therefore, we propose a load balancing approach called Simple Load-balancing Approach (SLA), which resolves the traffic concentration problem by allowing each node to drop RREQ (Route Request Packet) or to give up packet forwarding depending on its own traffic load. Meanwhile, mobile nodes nay deliberately give up forwarding packets to save their own energy. To make nodes volunteer in packet forwarding. we also suggest a payment scheme called Protocol-Independent Fairness Algorithm (PIEA) for packet forwarding. To evaluate the performance of SLA, we compare two cases where AODV employs SLA or not. Simulation results show that SLA can distribute traffic load well and improve performance of entire ad-hoc networks.

An Transport Layer Vertical Handover Approach for Video Services in Overlay Network Environments (오버레이 네트워크 환경에서 비디오 서비스를 위한 트랜스포트 계층에서의 수직 핸드오버 방안)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.163-170
    • /
    • 2007
  • The next generation communication environment consists of various wireless access networks with distinct features that are configured as an overlay topology. In the network environments, the frequency of hand overs should be minimized and the error propagation should be solved in order to provide high-quality multimedia services to mobile users. Therefore, we propose an performance enhancement approach, based on mSCTP, that provides high quality multimedia services to mobile users by ameliorating the error propagation problem. We utilizes the following four functions: 1) the separation of transmission paths according to the types of frames. 2) retransmission strategy to minimize the loss rate of frames, 3) Foced vertical handover execution by utilizing bicasting, 4) using the stability period in order to reduce the effect of the ping pong phenomenon. The simulation results show that the proposed approach provides seamless multimedia service to mobile users by achieving error resilience.

Application of the Essential Uses Concept to Substances of Concern - PFAS, 6PPD and Benzene - (우려 화학물질에 대한 필수 용도 개념 적용 - PFAS, 6PPD, Benzene 중심으로 -)

  • Miran Jung;Hyunpyo Jeon;Sangheon Kim
    • Journal of Environmental Health Sciences
    • /
    • v.50 no.1
    • /
    • pp.54-65
    • /
    • 2024
  • Background: There is growing international recognition of the need for improvements to national chemical management systems for hazardous chemicals. The European Union has recently introduced the concept of 'essential uses' as a new approach to the management hazardous chemicals by limiting their uses. Objectives: This paper examines the concept of essential uses in chemical management and how to apply it through a case study of essential use. This approach is distinct from the current chemical management system, but seeks to improve its potential benefits by effectively restricting or gradually decreasing the use of hazardous substances. Methods: The concept of essential uses was introduced by reviewing the Montreal Protocol on Substances that Deplete the Ozone Layer, Cousins's three essentiality categories applied to PFAS, restriction options assessed in the PFAS restriction proposal under REACH, and the California Safer Consumer Products regulations prioritizing 6PPD in motor vehicle tires. Based on these essential uses concepts for PFAS and 6PPD, uses of benzene were classified in accordance with the essential uses approach for products using benzene in South Korea. Results: The essential use concept is able to manage the restriction and authorization of substances of concern through essential uses and non-essential uses and the feasible substitution of uses and substances. Conclusions: If the concept and methodology of essential uses are clearly established, they can be expected to shift the national chemical management paradigm from regulating substances to limiting uses under the existing substance management system.

Publish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness

  • Davis, Ernesto Garcia;Auge, Anna Calveras
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1527-1552
    • /
    • 2018
  • The rapidly-evolving demand of applications using wireless sensor networks in several areas such as building and industrial automation or smart cities, among other, makes it necessary to determine and provide QoS support mechanisms which can satisfy the requirements of applications. In this paper we propose a mechanism that establishes different QoS levels, based on Publish/Subscribe model for wireless networks to meet application requirements, to provide reliable delivery of packet and timeliness. The first level delivers packets in a best effort way. The second one intends to provide reliable packet delivery with a novel approach for Retransmission Timeout (RTO) calculation, which adjusts the RTO depending on the subscriber Packet Delivery Ratio (PDR). The third one provides the same reliable packet delivery as the second one, but in addition, it provides data aggregation trying to be efficient in terms of energy consumption and the use of network bandwidth. The last one provides timeliness in the packet delivery. We evaluate each QoS Level with several performance metrics such as PDR, Message Delivery Ratio, Duplicated and Retransmitted Packet Ratio and Packet Timeliness Ratio to demonstrate that our proposal provides significant improvements based on the increase of the PDR obtained.