• Title/Summary/Keyword: overlay topology

Search Result 29, Processing Time 0.025 seconds

Replication and Node Recovery for Efficiency and Safety in P2P sytmem (P2P 시스템에서 안전성과 성능을 고려한 노드 복구와 복제 기법)

  • Cha Bonggwan;park Sunghwan;Son Youngsung;Kim Kyongsok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.472-474
    • /
    • 2005
  • 최근에 P2P(Peer-to-Peer) 시스템에서 효율적인 자원 탐색 방법에 대해 많이 연구되고 있다. 대부분의 P2P 시스템은 overlay network를 형성하므로 노드와 노드 사이의 물리적인 거리를 고려하지 않는다. 그래서 서로 이웃한 노드라도 실제 물리적인 latency가 클 수 있다는 문제점을 가지고 있다. 이런 문제점을 해결하기 위해 Topology를 고려한 계층적 시스템을 설계하였다. 이 시스템을 TB-Chord(Topology-based Chord)라 부른다. TB-Chord는 자신의 subnet에 Global network에 있는 데이터의 사본(Replica)을 저장하기 때문에 저장 공간(Storage)의 낭비와 노드가 떠날(leave) 때 데이터의 이동에 따른 네트워크 부하가 생기는 문제가 있다. 이 논문은 효율적인 복제 기법을 이용하여 저장공간과 네트워크의 효율성을 높이고 노드 fail에 대한 rejoin 메카니즘을 사용하여 효율적으로 시스템을 회복하는 방법을 제안한다.

  • PDF

Information-Based Routing Applying SNMP for Application-specific Services in Active Networks (액티브 네트워크에서 어플리케이션 서비스를 위한 SNMP 응용 정보 기반 라우팅)

  • 장한이;박수현;백두권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.529-531
    • /
    • 2002
  • 액티브 네트워크는 물리적 네트워크 위로 어플리케이션이 정의한 가상 토폴로지(topology)글 오버레이(overlay)할 수 있도록 한다. 따라서 정보 기반 라우팅과 같은 새로운 라우팅 전략을 구현할 수 있다. 정보기반 라우팅은 스마트 패킷을 효율적으로 보내기 위한 비콘 라우팅을 기반으로 한다. 비콘 라우팅의 이동성 지원은 GPS(Global Positioning System)에 응용에 활발히 연구되고 있으나, 어플리케이션을 위한 정보 기반 라우팅에 대한 구체적 연구는 아직 미비한 실정이다. 따라서 본 논문에서는 정보 기반 라우팅에 키워드 및 SNMP에 기반한 라우팅 프로시저를 제시하고 필요한 클래스를 정의함으로써 어플리케이션 서비스 시 스마트 패킷을 효율적으로 전송하고자 하였으며, 또한 이동성 지원을 웅용해 Mobile IP 환경에서 핸드오프(hand-off)시 발생하는 삼각 라우팅 문제를 해결할 수 있는 방안을 제시하였다.

  • PDF

The Expressive Characteristics of Morphing in Fashion Design (패션디자인에 나타난 몰핑의 표현특성)

  • Choi, Jung Hwa;Choi, Yoo Jin
    • Journal of the Korean Home Economics Association
    • /
    • v.50 no.7
    • /
    • pp.67-79
    • /
    • 2012
  • This study analyzed the characteristics of morphing in fashion design through the documentaries on morphing and fashion. The characteristics of morphing in fine art, media, and design area were categorized as reversible metamorphosis, sequential dissolve and blurring of interpolation boundaries. The results were as follow in fashion design. Reversible metamorphosis showed an automatic silhouette transformation by remote control, the metamorphosis of folding method by wearer's own movements and the automatic silhouette transformation by the air pressurizing method. It represented the thoughts of omnipotence as in the feeling of the magical world, the human desire for control in life, the rationalization of magical thinking and imaginative power, the creation of a new dress space and the extension of dress function. Sequential dissolve showed juxtaposition in the same area by the time order, juxtaposition in virtual space through the computer graphics, the series of fashion photography by steel cut of the dress making process and the blending of digital film and fashion design. It represented the approach for the storytelling of fashion show, implication of creative fashion design process and the creation of organic forms and the feeling of fantasy through artificial technology. The blurring of interpolation boundary showed an overlay of different fabrics with transparent boundaries, an overlay of different patterns with transparent boundaries and the blending of fabrics through the visual mixing of color. It represented the obfuscation of the object, the connotation of the space order, the connotation of the extensive and various meanings and the integrative property of objects.

An Transport Layer Vertical Handover Approach for Video Services in Overlay Network Environments (오버레이 네트워크 환경에서 비디오 서비스를 위한 트랜스포트 계층에서의 수직 핸드오버 방안)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.163-170
    • /
    • 2007
  • The next generation communication environment consists of various wireless access networks with distinct features that are configured as an overlay topology. In the network environments, the frequency of hand overs should be minimized and the error propagation should be solved in order to provide high-quality multimedia services to mobile users. Therefore, we propose an performance enhancement approach, based on mSCTP, that provides high quality multimedia services to mobile users by ameliorating the error propagation problem. We utilizes the following four functions: 1) the separation of transmission paths according to the types of frames. 2) retransmission strategy to minimize the loss rate of frames, 3) Foced vertical handover execution by utilizing bicasting, 4) using the stability period in order to reduce the effect of the ping pong phenomenon. The simulation results show that the proposed approach provides seamless multimedia service to mobile users by achieving error resilience.

TP2P: Topology-based Peer-to-Peer System for Efficient Resources Lookup (TP2P: 효율적인 자원탐색을 위한 토폴로지 기반의 P2P 시스템)

  • Cha, Bong-Kwan;Han, Dong-Yun;Son, Young-Song;Kim, Kyong-Sok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.88-99
    • /
    • 2007
  • P2P systems are distributed data sharing systems, and each node in them plays the role of client as well as server. There are several studies using Distributed Hash Table, such as Chord, CAN, Tapestry, Pastry, but these systems don't consider the physical latency, therefore they have a weakness of difficulty to guarantee stable performance. To improve this problem, we present the TP2P system. This system is a self-organizing hierarchical overlay system and it uses Chord routing mechanism for lookup data. This system is organized by several subnets, each subnet is organized by physically close nodes, and global network organized by all nodes. In each subnet, one node finds a data, it saves in a node in the subnet, therefore it has higher probability to reduce physical lookup latency than Chord system. And each node has global information of some nodes in its subnet, and it is used to lookup data, therefore the number of hops decrease about 25% as well as the physical lookup latecy are reduced.

A study of real-time media streaming delivery over P2P networks (P2P 환경에서 실시간 미디어스트리밍의 전송에 관한 연구)

  • Liu Xu-dong;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.538-541
    • /
    • 2006
  • Recently researches of P2P media streaming have been actively published, but the research what kind of P2P overlay networks are better to delivering media data has not been attended. This paper designs a P2P streaming media system model. In this system, we constructs a Half-Structure P2P overlay protocol based on node's capability as the infrastructure of streaming application, which utilizes the heterogeneity of the nodes to maintain topology, presents a active contents diffusing algorithm and Two-stage search algorithm, make it possible for nodes in P2P system to collect information according their capacity and reduces the number of forwarding packet compared with flooding. Also, we give an optimal scheme to scheduling media data.

  • PDF

R-Tree Construction for The Content Based Publish/Subscribe Service in Peer-to-peer Networks (피어투피어 네트워크에서의 컨텐츠 기반 publish/subscribe 서비스를 위한 R-tree구성)

  • Kim, Yong-Hyuck;Kim, Young-Han;Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.1-11
    • /
    • 2009
  • A content based pub/sub (Publish/subscribe) services at the peer-to-peer network has the requirements about how to distribute contents information of subscriber and to delivery the events efficiently. For satisfying the requirements, a DHT(Distributed Hash Table) based pub/sub overlay networking and tree type topology based network construction using filter technique have been proposed. The DHT based technique is suitable for topic based pub/sub service but it's not good contents based service that has the variable requirements. And also filter based tree topology networking is not efficient at the environment where the user requirements are distributed. In this paper we propose the R-Tree algorithm based pub/sub overlay network construction method. The proposed scheme provides cost effective event delivery method by mapping user requirement to multi-dimension and hierarchical grouping of the requirements. It is verified by simulation at the variable environment of user requirements and events.

A P2P Content Distribution Method Using Virtual Location in MANET (MANET에서 가상위치를 이용한 P2P 데이터 배포 방법)

  • Ko, Seok-Kap;Oh, Seung-Hun;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.139-145
    • /
    • 2009
  • Recently P2P (Peer-to-Peer) networks and applications have been expanded to various field. However, because the construction of P2P network did not influence a underlying network topology or property, it may be inefficient. Especially, this inefficiency is more serious in MANET because MANET has narrow bandwidth and energy constraint. When we use a proactive routing protocol in MANET, we can know hop counts between two nodes. And, we can construct a P2P overlay network using this hop count information. However, In case of using hop count only, we can avoid a interference path selection problem and a zig-zag problem. We propose a method of improving P2P contents distribution using virtual positions. We calculate virtual positions from hop counts using the trigonometry. This method solves a interference path selection problem and a zig-zag problem. This method also allows a P2P network to influence underlying network topology. We adopt this method to a network which uses a virtual geographic routing, a proactive routing protocol, or a reactive routing protocol. We show that our proposed methods improve P2P contents distribution performance over MANET through a simulation.

Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating (비 자율적 노드 위치 결정을 통한 DHT 네트워크 ID 매핑 공격 방지)

  • Lee, Cheolho;Choi, Kyunghee;Chung, Kihyun;Kim, Jongmyung;Yun, Youngtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.695-707
    • /
    • 2013
  • DHT(Distributed Hash Table) networks such as Kademlia are vulnerable to the ID mapping attack caused by the voluntary DHT mapping structure where the location of a node is solely determined by itself on the network topology. This causes security problems such as eclipse, DRDoS and botnet C&C on DHT networks. To prevent ID mapping attacks, we propose a non-voluntary DHT mapping scheme and perform analysis on NAT compatibility, attack resistance, and network dynamicity. Analysis results show that our approach may have an equivalent level of attack resistance comparing with other defense mechanisms and overcome their limitations including NAT compatibility and network dynamicity.