• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.039 seconds

Core Selection Algorithm for Multicast Routing in Multiple QoS-Constrained Networks (다중 QoS 제약형 네트워크에서의 멀티캐스트 코어 선택 알고리즘)

  • Jeong, Seung-Mo;Yun, Chan-Hyeon;Son, Seung-Won;Lee, Yu-Gyeong
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.4
    • /
    • pp.507-521
    • /
    • 2000
  • 실시간 멀티미디어 서비스에서 Quality of Service(QoS) 보장의 필요성이 증가하고 있다. 멀티미디어 서비스 제공 형태의 대다수가 될 멀티캐스트 경로설정에서도 QoS 보장은 확장성 신뢰성과 함께 매우 중요한 문제이다. QoS 기반 코어 선택 알고리즘을 제안한다. 제안 알고리즈믄 멀티캐스트 경로설정에서 코어 선택시에 다중 QoS 제약조건을 고려한다. QoS 제약조건은 최소보장 대역폭, 종단 지연, 종단 지연변이 등으로 정의한다. 모의 실험결과는 제안한 QCSA와 Maximum Centered Tree(MCT) Average Centered Tree (ACT) Initial Delay-Constrained Shared Tree(Dcinitial) Random Tree(Random)등의 기존 코어 선택 알고리즘의 성능을 각 항목별로 비교한다 멀티캐스트 그룹 멤버수와 QoS 제약조건을 인자로 한 모의 실험 결과는 제안한 QoS 기반 코어 선택 알고리즘이 기존 코어 선택 알고리즘에 비해서 다중 QoS 제약조건 보장 코어 선택 성공률에서 성능 개선 효과를 가짐을 보여준다. 제안 알고리즘이 본 논문에서 설정한 모의 실험 환경에서는 QoS 기반 코어 선택의 정도를 나타내는 성공률에서 약 10% 정도 기존 알고리즘보다 우수함을 보인다. 이 결과는 제안 알고리즘이 코어 선택 과정의 초기부터 멀티캐스트 그룹내의 모든 멤버에 대한 다중 QoS 제약조건을 고려하는 점이 QoS 기반 코어 선택에서 개선 효과를 나타냄을 보여준다.

  • PDF

A Power Management Scheme for Sensors with MCU in Sleep Mode in Nano-Q+ (Nano-Q+에서 MCU 및 센서의 자동 슬립을 지원하는 전력 관리 기법)

  • So, Sun-Sup;Choi, Bok-Dong;Eun, Seong-Bae;Kim, Byung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1928-1934
    • /
    • 2009
  • This paper proposes a power management scheme for sensor nodes in wireless sensor networks based on sensor node operating system supporting the sensor transparency, which can turn off the sensors when the MCU is in sleep mode. We classify the sensors in two types, that is, event sensors and polling sensors, to be able to decide whether the sensor is a type of sensors whose power supply can be turned off or not, and we design a new scheduler to support recognition of those different types of sensors. Implementing and evaluation of the scheduler and the power manager supporting sensor transparency are shown based on Nano-Q+.

Development of RFID systems with integrated location data for efficient logistics information systems (효율적인 물류정보관리를 위한 위치정보 통합형 RFID 시스템의 개발)

  • Oh Won-Geun;Park Sang-Hyun;Lim Dong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1295-1300
    • /
    • 2006
  • In this paper, we have developed RFID systems with integrated tag location data for efficient logistics information systems. These are consist of RFID readers with GPS module and RFID networks to service tag location data. The developed RFID readers can get location informations Of the tags, transfer them high speed by TCP/IP protocols, and operate as web servers. And we presented a simple service network system based on EPC network to service both location and tag data. The proposed system can be applicable to tracebility or finding locations of the products.

Implementation of Internet Telephone by SIP Server (SIP 서버를 통한 인터넷폰 구현)

  • 김진수;이찬우;양해권
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • We can foresee the rapidly growing of users by development of VoIP service what can transmit a audio traffic with low cost among a lots application using internet. VoIP needs a standardized protocol that is able to do signaling for offering high quality of services such as mobility, universal number, multiparty conference, voice mail, automatic call distribution. At the present time, a base composition elements of SIP(Session Intiation Protocol) are developing for offering VoIP based SIP in the inside and outside of the country, because SIP of IETF which has a strength from 'fast connection', 'parsing' & 'easy to compile' points of view. This paper suggests a type of Hybrid SIP Server for providing some services as 'a reducing load of SIP server that process a request method from users', 'efficiency of managing networks', 'offering services to many users'.

Design and Analysis of Leader Election Algorithm in Wireless Network based on Fixed Stations (기지국 기반 무선 통신망에서 리더 선택 알고리즘의 설계 및 분석)

  • Park, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4554-4561
    • /
    • 2014
  • In recent years, several paradigms have been identified to simplify the design of fault-tolerant distributed applications in a conventional static system. Leader Election is among the most noticeable, particularly because it is closely related to group communication, which provides a powerful basis for implementing active replications among other uses. On the other hand, despite its usefulness, to our knowledge, no study has focused on this problem in a mobile computing environment. The aim of this paper was to propose an algorithm for the leader election protocol in a fixed station based wireless networks environment. The election algorithm is much more efficient than other election algorithms in terms of the fault tolerance.

Sum MSE Minimization for Downlink Multi-Relay Multi-User MIMO Network

  • Cho, Young-Min;Yang, Janghoon;Seo, Jeongwook;Kim, Dong Ku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2722-2742
    • /
    • 2014
  • We propose methods of linear transceiver design for two different power constraints, sum relay power constraint and per relay power constraint, which determine signal processing matrices such as base station (BS) transmitter, relay precoders and user receivers to minimize sum mean square error (SMSE) for multi-relay multi-user (MRMU) networks. However, since the formulated problem is non-convex one which is hard to be solved, we suboptimally solve the problems by defining convex subproblems with some fixed variables. We adopt iterative sequential designs of which each iteration stage corresponds to each subproblem. Karush-Kuhn-Tucker (KKT) theorem and SMSE duality are employed as specific methods to solve subproblems. The numerical results verify that the proposed methods provide comparable performance to that of a full relay cooperation bound (FRCB) method while outperforming the simple amplify-and-forward (SAF) and minimum mean square error (MMSE) relaying in terms of not only SMSE, but also the sum rate.

Design and Manufacture of Modified Ring antenna with Stub and Ground Slot for WLAN Applications (WLAN 시스템에 적용 가능한 그라운드 슬롯과 stub를 갖는 변형된 링 안테나 설계와 제작)

  • Koo, Yung-Seo;Im, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2265-2272
    • /
    • 2013
  • In this paper, a dual-band circular ring monopole antenna with stub and ground slot for is proposed WLAN(Wireless Local Area Networks) applications. The proposed antenna is based on a planar monopole design, and composed of one circular ring of radiating patches, and modified feed line, and rectangular slot in the ground plane for dual-band operation. To obtain the optimized parameters, we used the simulator, Ansoft's High Frequency Structure Simulator(HFSS) and found the parameters that effect antenna characteristics. Using the obtained parameters, the antenna is fabricated, and the return loss coefficient, gain, and radiation patterns are determined for WLAN application.

An Efficient Access Control Mechanism for Secure Surveillance Systems (안전한 보안 감시 시스템을 위한 효율적인 접근 제어 기법)

  • Yang, Soomi;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.228-233
    • /
    • 2014
  • In recent general social surveillance systems, secure access control mechanism is needed. ONVIF establishes standards for interoperability between cameras and defines web service framework for it. In this paper we present an efficient attribute based access control mechanism for surveillance system networks which follow the ONVIF standards. It accommodates web service information security techniques and provides efficient secure access control.

Proposed Assessment for Quality of Experience of Live IPTV in Home Environments

  • Jeong, Jongpil;Choi, Jae-Young
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.18-30
    • /
    • 2015
  • As the speed of networks that subscribers can use has greatly increased, demand for high-quality broadcast content, such as from Internet Protocol Television (IPTV) and Video on Demand (VoD), is likewise increasing. Therefore, while broadcasters are increasing content and channels, they are striving to improve consumer quality of experience (QoE) to differentiate themselves from competitors, including by producing higher physical-quality content. Recently, subjective measurement methods have been internationally standardized as the most reliable approach for measuring and evaluating IPTV QoE. However, a majority of these methods are performed in experimental environments and are based on the extremely brief viewing period of approximately ten seconds using original reference videos. It is actually difficult to apply standard evaluation methods based on a ten-second viewing interval to assess real broadcast watching of IPTV or other services that involve a longer time (i.e., more than thirty minutes). In this paper, we therefore propose a method that accommodates actual viewing environments. Using the mean opinion score, we experimentally analyze the effects of evaluation interval changes under actual conditions in which IPTV service is provided. In addition, we propose improvements by applying the results into actual live broadcast IPTV service and by analyzing consumer service QoE.

A Specification-based Intrusion Detection Mechanism for LEACH Protocol (LEACH 프로토콜에 적합한 명세기반 침입탐지 기법)

  • Lee, Yun-Ho;Kang, Jung-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.138-147
    • /
    • 2012
  • With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.