• Title/Summary/Keyword: network time-delay

Search Result 1,471, Processing Time 0.027 seconds

Block Selection Strategy for P2P Streaming (P2P 스트리밍을 위한 블록 선택 전략)

  • Kim, Heung-Jun;Son, Sei-Il;Lee, Kwang-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2179-2187
    • /
    • 2008
  • The P2P technology has been widely used to distribute files efficiently, and its use in streaming is rapidly increasing. P2P streaming has issues about startup-delay, scalability, and real-time playback, however, what affects these factors has not been researched sufficiently. This paper suggests a buffering model for progressive download within mesh-based P2P system, which corresponds to downloading and playing the content at the same time. It is used to analyze PDF(Playback Deadline First), Rarest algorithms which are block-selection strategies of P2P streaming and proposes a mixed selection of them. The mixed block selection strategy dynamically performs different strategies based on whether the blocks to be played are received or not. In consequence, it enhances the QoS of streaming in a single peer point of view, as well as improving block distributions in an overlay network.

A Secure and Efficient Roaming Mechanism for Centralized WLAN Environment (중앙집중식 WLAN 환경에서의 안전하고 효율적인 로밍 메커니즘)

  • Park, Chang-Seop;Woo, Byung-Duk;Lim, Jeong-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.81-92
    • /
    • 2009
  • Recently, there is a drastic increase in users interested in real-time multimedia services in the WLAN environment, as the demand of IEEE 802.11 WLAN-based services increases. However, the handoff delay based on 802.11i security policy is not acceptable for the seamless real-time multimedia services provided to MS frequently moving in the WLAN environment, and there is a possibility of DoS attacks against session key derivation process and handoff mechanism. In this paper, a secure and efficient handoff mechanism in the centralized WLAN environment is introduced to solve the security problems. The 4-way Handshake for both mutual authentication and session key derivation is replaced by the 2-way Reassociation process.

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Federated Deep Reinforcement Learning Based on Privacy Preserving for Industrial Internet of Things (산업용 사물 인터넷을 위한 프라이버시 보존 연합학습 기반 심층 강화학습 모델)

  • Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1055-1065
    • /
    • 2023
  • Recently, various studies using deep reinforcement learning (deep RL) technology have been conducted to solve complex problems using big data collected at industrial internet of things. Deep RL uses reinforcement learning"s trial-and-error algorithms and cumulative compensation functions to generate and learn its own data and quickly explore neural network structures and parameter decisions. However, studies so far have shown that the larger the size of the learning data is, the higher are the memory usage and search time, and the lower is the accuracy. In this study, model-agnostic learning for efficient federated deep RL was utilized to solve privacy invasion by increasing robustness as 55.9% and achieve 97.8% accuracy, an improvement of 5.5% compared with the comparative optimization-based meta learning models, and to reduce the delay time by 28.9% on average.

Time variations of H2O and SiO masers in the proto-Planetary Nebula OH 231.8+4.2

  • Jaeheon Kim;S-H Cho;V Bujarrabal;H Imai;R Dodson;D-H Yoon;B Zhang
    • Monthly Notices of the Royal Astronomical Society
    • /
    • v.488 no.1
    • /
    • pp.1427-1445
    • /
    • 2019
  • H2O (22 GHz) and SiO masers (43, 86, 129 GHz) in the bipolar proto-planetary nebula OH 231.8+4.2 were simultaneously monitored using the 21-m antennas of the Korean VLBI Network in 2009-2015. Both species exhibit periodic flux variations that correlate with the central star's optical light curve, with a phase delay of up to 0.15 for the maser flux variations with respect to the optical light curve. The flux densities of SiO v = 2, J = 1→0 and H2O masers decrease with time, implying that they may disappear in 10-20 yr. However, there seems to have been a transient episode of intense H2O maser emission around 2010. We also found a systematic behaviour in the velocity profiles of these masers. The velocities of the H2O maser components appear to be remarkably constant, suggesting ballistic motion for the bipolar outflow in this nebula. On the other hand, those of the SiO maser clumps show a systematic radial acceleration of the individual clumps, converging to the outflow velocity of the H2O maser clumps. Measuring the full widths at zero power of the detected lines, we estimated the expansion velocities of the compact bipolar outflow traced by H2O maser and SiO thermal line, and discussed the possibility of the expanding SiO maser region in the equatorial direction. All of our analyses support that the central host star of OH231.8 is close to the tip of the AGB phase and that the mass-loss rate recently started to decrease because of incipient post-AGB evolution.

Design of FPGA Camera Module with AVB based Multi-viewer for Bus-safety (AVB 기반의 버스안전용 멀티뷰어의 FPGA 카메라모듈 설계)

  • Kim, Dong-jin;Shin, Wan-soo;Park, Jong-bae;Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 2016
  • In this paper, we proposed a multi-viewer system with multiple HD cameras based AVB(Audio Video Bridge) ethernet cable using IP networking, and FPGA(Xilinx Zynq 702) for bus safety systems. This AVB (IEEE802.1BA) system can be designed for the low latency based on FPGA, and transmit real-time with HD video and audio signals in a vehicle network. The proposed multi-viewer platform can multiplex H.264 video signals from 4 wide-angle HD cameras with existed ethernet 1Gbps. and 2-wire 100Mbps cables. The design of Zynq 702 based low latency to H.264 AVC CODEC was proposed for the minimization of time-delay in the HD video transmission of car area network, too. And the performance of PSNR(Peak Signal-to-noise-ratio) was analyzed with the reference model JM for encoding and decoding results in H.264 AVC CODEC. These PSNR values can be confirmed according the theoretical and HW result from the signal of H.264 AVC CODEC based on Zynq 702 the multi-viewer with multiple cameras. As a result, proposed AVB multi-viewer platform with multiple cameras can be used for the surveillance of audio and video around a bus for the safety due to the low latency of H.264 AVC CODEC design.

Test development of a UAV equipped with a Fly-By-Wireless flight control system (무선네트워크 비행제어시스템을 탑재한 무인항공기의 시험개발)

  • Oh, Hyung Suk;Kim, Byung Wook;Lee, Si Hun;Nho, Won Ho;Kang, Seung Eun;Ko, Sang Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.12
    • /
    • pp.1039-1047
    • /
    • 2017
  • This paper presents a test development of a Fly-By-Wireless flight control system for a fixed-wing unmanned aerial vehicle (UAV). Fly-By-Wireless system (FBWLS) refers to a system that uses a wireless network instead of a wired network to connect sensors and actuators with a flight control computer (FCC), reducing considerable amount of wires. FBWLS enables to design a much lighter aircraft along with decreased maintenance time and cost. In this research we developed a Zigbee-based FWBLS UAV in which sensors (GPS and AHRS) are wirelessly connected via a FCC to aileron and elevator servo motors. In order to see the effect of time delay due to wireless signal on the flight stability of the UAV, several flight tests were conducted. From the tests, it was confirmed that the effect is minor by comparing the flight response of the FBWLS with the corresponding Fly-By-Wire system.

Fault free Shortest Path routing on the de Bruijin network (드브르젼 네트워크에서 고장 노드를 포함하지 않는 최단 경로 라우팅)

  • Ngoc Nguyen Chi;Nhat Vo Dinh Minh;Zhung Yonil;Lee Sungyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.946-955
    • /
    • 2004
  • It is shown that the do Bruijn graph (dBG) can be used as an architecture for interconnection network and a suitable structure for parallel computation. Recent works have classified dBG based routing algorithms into shortest path routing and fault tolerant routing but investigation into fault free shortest path (FFSP) on dBG has been non-existent. In addition, as the size of the network increase, more faults are to be expected and therefore shortest path dBG algorithms in fault free mode may not be suitable routing algorithms for real interconnection networks, which contain several failures. Furthermore, long fault free path may lead to high traffic, high delay time and low throughput. In this paper we investigate routing algorithms in the condition of existing failure, based on the Bidirectional do Bruijn graph (BdBG). Two FFSP routing algorithms are proposed. Then, the performances of the two algorithms are analyzed in terms of mean path lengths and discrete set mean sizes. Our study shows that the proposed algorithms can be one of the candidates for routing in real interconnection networks based on dBG.

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크 환경에서 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Donggyo;Son, In-Goog;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.30-39
    • /
    • 2013
  • In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.