• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.052 seconds

Active Congestion Control Using Active Router′s Feedback Mechanism (액티브 라우터의 피드백 메커니즘을 이용한 혼잡제어 기법)

  • Choe, Gi-Hyeon;Jang, Gyeong-Su;Sin, Ho-Jin;Sin, Dong-Ryeol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.513-522
    • /
    • 2002
  • Current end-to-end congestion control depends only on the information of end points (using three duplicate ACK packets) and generally responds slowly to the network congestion. This mechanism can't avoid TCP global synchronization which TCP congestion window size is fluctuated during congestion occurred and if RTT (Round Trip Time) is increased, three duplicate ACK packets is not a correct congestion signal because congestion maybe already disappeared and the host may send more packets until receive the three duplicate ACK packets. Recently there is increasing interest in solving end-to-end congestion control using active network frameworks to improve the performance of TCP protocols. ACC (Active congestion control) is a variation of TCP-based congestion control with queue management In addition traffic modifications nay begin at the congested router (active router) so that ACC will respond more quickly to congestion than TCP variants. The advantage of this method is that the host uses the information provided by the active routers as well as the end points in order to relieve congestion and improve throughput. In this paper, we model enhanced ACC, provide its algorithm which control the congestion by using information in core networks and communications between active routers, and finally demonstrate enhanced performance by simulation.

An Efficient Location Cache Scheme for 3-level Database Architecture in PCS Networks (PCS 네트워크에서 3-레벨 데이터베이스 구조를 위한 효과적인 위치 캐시 기법)

  • Han, Youn-Hee;Song, Ui-Sung;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.253-264
    • /
    • 2002
  • Recently, hierarchical architectures of databases for location management have been proposed in order to accommodate the increase in user population in future personal communication systems. In particular, a 3-level hierarchical database architecture is compatible with current cellular mobile systems. In the architecture, a newly developed additional databases, regional location database(RLR), are positioned between HLR and VLRs. We propose an efficient cache scheme, called the Double T-thresholds Location Cache Scheme. The cache scheme extends the existing T-threshold location cache scheme which is competent only under 2-level architecture of location databases currently adopted by IS-41 and GSM. The idea behind our scheme is to use two pieces of cache information, VLR and RLR serving called portables. The two pieces are required in order to exploit root only locality of registration area(RA) but also locality of regional registration area(RRA) which is the wide area covered by RLR. We also use two threshold values in order to determine whether the two pieces are obsolete. In order to model the RRA residence time, the branching Eralng-$\infty$ distribution is introduced. Our minute cost analysis shows that the double T-threshold location cache scheme yields significant reduction of network and database costs for molt patterns of portables.

A Study on Strategic Groups of Program Providers(PP) and the Performance in Korea (국내 방송채널사용사업자(PP)의 전략집단과 성과에 관한 연구)

  • Ryo, Hyon-Chol;Kim, Jai-Beom;Lee, Sahang-Shik
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.387-419
    • /
    • 2009
  • The concept of strategic group is defined as an aggregate of corporations utilizing similar strategies with similar resources. It becomes a kinds of contact point in the middle of corporation and industry between the industrial organization theory and the strategic management theory. This study tried to apply the strategic group model, which has been a main theory in the management studies, to program providing industry in Korea. This study shed lights upon research problems such as number of strategic groups, differences of strategic variables among the groups, finally differential performances according to strategic groups. 40 commercial broadcasting companies were analyzed to find answers. 9 strategic groups were drawn as a result of cluster analysis. Major variables which contribute to making groups were operating efficiency(4.05), pricing(3.83), size(number of system operator, 3.56), reliance on license revenue(2.58), horizontal integration(number of sister networks, 2.16) in order. An analysis of variance between performance variables has shown statistical significance regarding total net revenue per subscriber, however, insignificances statistically in regards to ratio of operating profit to net sales, cash Abstracts 687 flow ratio. Some studies in the past insisted that history variable played an important role to classifying strategic groups. However, this study found that the history didn't exert significant influence on either the group classification itself or performance.

  • PDF

A Nulling Anti-Jamming Scheme for the Polyphase Filter Bank-Based Satellite Repeat System (다상 필터 뱅크 기반의 위성 중계시스템을 위한 항재밍 기법의 연구)

  • Oh, Jin-O;Im, Sung-Bin;Ko, Hyun-Suk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.39-47
    • /
    • 2012
  • The combination of the broadband property and the wide area coverage of satellite communications enables high speed transmission. Every user in the region under the satellite beam coverage can tranceiver and one can simultaneously communicate with multiple users. For these reasons, it is one of commendable telecommunication networks for information transfer. Since the satellite communications use open channels, it is likely to cause jamming with unwanted interference signals. In the thesis, APSK (Amplitude Phase Shift Keying) is employed, which is recommended for DVB-S2 due to high-speed transmission and excellent bandwidth efficiency. For obtaining reliable communication under the jamming environments, the communication satellite transponder rests on the polyphase filter bank structure, which enables switching among the subchannels and gain control on each subchannel, resulting in effectively eliminating jamming. Furthermore, the nulling scheme, one of the various anti-jamming approaches, is investigated, in which unwanted jamming signals are eliminated in the frequency domain after passing through the analysis part of the polyphase filter bank. The performance of the nulling scheme is evaluated for tone jamming and partial band jamming in terms of BER and EVM. The simulation results indicate that the nulling scheme improve the BER and EVM performance over the case without any anti-jamming approach.

A Study on the Permeability through Concrete using RF Wireless Module for Reinforced Concrete Structure (철근콘크리트 구조물에 내제된 RF 무선송수신 모듈의 콘크리트 투과성 실험 연구)

  • Jo, Byung-Wan;Park, Jung-Hoon;Yoon, Kwang-Won;Kim, Heoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.2D
    • /
    • pp.295-302
    • /
    • 2011
  • Ubiquitous is an information communication environment which peoples could connect on network without being conscious of the network and computer condition at anytime and anywhere. Presently, advanced technology, digital cities and eco-friendly cities using Ubiquitous technology are being focused through out the world. As recent information industry and communication technology have developed remarkably, studies on intelligent structures and structural maintenance methods by combining a general idea of connecting all objects on network by interpolating computers which is called Ubiquitous Computing, and USN(Ubiquitous Sensor Network) are being attempted. In this paper, a basic experiment on penetration of RF(Radio Frequency) sensor nodes using an experimental sample setting concrete and reinforcing bar as variables is studied to estimate the possibility of applying wireless sensor networks in structures. The spring of reinforcing bars, concrete thickness, intensity of radio frequency were set up as variables, transmitting and receiving distance were checked vertically and horizontally. Moreover, Spectrum Analyzer was used for checking the magnitude of the frequency used in order to measure the reduction of radio wave exactly. The radio wave reduction was numerically analyzed, and the influence of the wavelength was analysed as well. As a result, the penetration depth in concrete without reinforcing bars was 45cm, and in reinforced concretes which reinforcing bars placed at spacing of 5cm and 15cm, the penetration depth were 37cm and 45cm each. No influence on radio wave penetration depth were found when the spacing of reinforcing bars in the reinforced concrete structures becomes over 15cm.

A Study on the Implementation of PC Interface for Packet Terminal of ISDN (ISDN 패킷 단말기용 PC 접속기 구현에 관한 연구)

  • 조병록;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.12
    • /
    • pp.1336-1347
    • /
    • 1991
  • In this paper, The PC interface for packet terminal of ISDN is designed and implemented in order to build packet communication networks which share computer resources and exchange informations between computer in the ISDN environment. The PC interface for packet terminal of ISDN constitutes S interface handler part which controls functions of ISDN layer1 and layer 2, constitutes packet handler part which controls services of X.25 protocol in the packet level.Where, The function of ISDN layer1 provides rules of electrical and mechanical characteristics, services for ISDN layer 2. The function of ISDN layer 2 provides function of LAPD procedure, services for X.25 The X.25 specifies interface between DCE and DTE for terminals operrating in the packet mode. The S interface handler part is orfanized by Am 79C30 ICs manufactured by Advanecd Micro Devices. ISDN packet handler part is organiged by AmZ8038 for FIFO for the purpose of D channel. The common signal procedure for D channel is controlled by Intel's 8086 microprocessor. The S interface handler part is based on ISDN layer1,2 is controlled by mail box in order to communicate between layers. The ISDN packet handler part is based on module in the X.25 lebel. The communication between S interface handler part and ISDN packet handler part is organized by interface controller.

  • PDF

Stock Prediction Model based on Bidirectional LSTM Recurrent Neural Network (양방향 LSTM 순환신경망 기반 주가예측모델)

  • Joo, Il-Taeck;Choi, Seung-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.204-208
    • /
    • 2018
  • In this paper, we proposed and evaluated the time series deep learning prediction model for learning fluctuation pattern of stock price. Recurrent neural networks, which can store previous information in the hidden layer, are suitable for the stock price prediction model, which is time series data. In order to maintain the long - term dependency by solving the gradient vanish problem in the recurrent neural network, we use LSTM with small memory inside the recurrent neural network. Furthermore, we proposed the stock price prediction model using bidirectional LSTM recurrent neural network in which the hidden layer is added in the reverse direction of the data flow for solving the limitation of the tendency of learning only based on the immediately preceding pattern of the recurrent neural network. In this experiment, we used the Tensorflow to learn the proposed stock price prediction model with stock price and trading volume input. In order to evaluate the performance of the stock price prediction, the mean square root error between the real stock price and the predicted stock price was obtained. As a result, the stock price prediction model using bidirectional LSTM recurrent neural network has improved prediction accuracy compared with unidirectional LSTM recurrent neural network.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Educational Practice Example of Information and Communications Technology: Measurement of Data Transfer Time for Concurrent Server Model (정보통신기술 실습사례: 병행서버모델의 데이터 전송시간 측정)

  • Son, Myung-Rak;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.265-281
    • /
    • 2008
  • The objective of this study is to show practice example let student experience about concurrent servers based multi-processes and multi-thread among the principles of data communication in ICT(information and communications technology). For this, we first implement multi-process server(fork server) and multi-thread server(thread server), and multi-thread client(thread client), Secondly, for experimental environment, we developed small ethernet networks and measure data transfer time with relation to the number of users. Experimental results show that mean transfer time of thread server is less than that of fork server by 20~61 % on average. Furthermore, it is found that the difference of data transfer time between fork server and thread server is proportional to that of the number of users. Main reason of performance difference dues to the difference between process forking time and thread creation time. We can also find that context switching for process and thread affects the load of web server. Our presentation and experimental results can be applied to used as the educational practice materials with which student can experience data communication principles.