• Title/Summary/Keyword: stream transmission

Search Result 374, Processing Time 0.027 seconds

A Study on Ring Buffer for Efficiency of Mass Data Transmission in Unstable Network Environment (불안정한 네트워크 환경에서 대용량 데이터의 전송 효율화를 위한 링 버퍼에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1045-1054
    • /
    • 2020
  • In this paper, we designed a TCP/IP based ring buffer system that can stably transfer bulk data streams in the unstable network environments. In the scheme we proposed, The observation data stream generated and output by each radio observatory's backend system as a UDP frame is stored as a UDP packet in a large capacity ring buffer via a socket buffer in the client system. Thereafter, for stable transmission to the remote destination, the packets are processed in TCP and transmitted to the socket buffer of server system in the correlation center, which packets are stored in a large capacity ring buffer if there is no problem with the packets. In case of errors such as loss, duplication, and out of order delivery, the packets are retransmitted through TCP flow control, and we guaranteed that the reliability of data arriving at the correlation center. When congestion avoidance occurs due to network performance instability, we also suggest that performance degradation can be minimized by applying parallel streams.

Implementation of a Software Streaming System Using Pagefault Interrupt Routine Hooking (페이지폴트 인터럽트 루틴 후킹을 이용한 소프트웨어 스트리밍 시스템 구현)

  • Kim, Han-Gook;Lee, Chang-Jo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.8-15
    • /
    • 2009
  • The need for ASP(Application Service Provider) has evolved from the increasing costs of specialized software that have far exceeded the price rage of small to medium sized businesses. There are a lot of technologies that make ASP possible, and software streaming service is one of them Software streaming is a method for overlapping transmission and execution of stream-enabled software. The stream-enabled software is able to run on a device even while the transmission/streaming of the software may still be in progress. Thus, a user does not have to wait for the completion of the software's download prior to starting to execute the software. In this paper, we suggest the new concept of software streaming system implement using the PageFault Interrupt Routine Hooking. As it is able to efficiently manage application, we do not have to install the entire software. In addition, we can save hardware resources by using it because we load basic binaries without occupying the storage space of the hardware.

A Detect and Defense Mechanism of Stateful DRDoS Attacks (상태기반 DRDoS 공격에 대한 탐지 및 방어기법)

  • Kim, Minjun;Seo, Kyungryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.127-134
    • /
    • 2014
  • In DRDoS(Distributed Reflective Denial of Service) attacks, the victim is bombarded by packets from legitimate reflector unlike DDoS(Distributed Denial of Service) attacks through zombie, which is more dangerous than DDoS attack because it is in stronger disguise. Therefore, the method of filtering packet method on router are useless. Moreover SCTP(Stream Control Transmission Protocol) multi-homing feature, such as with an improved transmission protocol allows detecting attacks is more difficult and the effect of the attack can be maximized. In this paper we propose a DRDoS detection mechanism based on DRDoS utilizing attention to the characteristics of stateful protocols. The proposed scheme is backed by stateful firewall, and detect DRDoS attacks through a rules table and perform a defense treatment against DRDoS attack. Rules table with a simple structure is possible to easily adapt for any kind of stateful protocol can used by DRDoS attack. The experimental result confirm that our proposed scheme well detect DRDoS attacks using SCTP, the next-generation transmission protocol which not known by victim, and reduce the attacking packets rapidly.

An Efficient Smoothing Algorithm Using the Change of Frame Sequence in GOP (GOP를 구성하는 프레임들의 순서 변경을 이용한 효율적인 스무딩 알고리즘)

  • Lee, Myoun-Jae
    • Journal of Korea Game Society
    • /
    • v.6 no.2
    • /
    • pp.51-60
    • /
    • 2006
  • Smoothing is a transmission plan where variable rate video data is converted to a constant bit rate stream. Among them are CBA, MCBA, MVBA, PCRTT and others. But, in these algorithm, a transmission plan is made in according to stored frame sequence in these algorithms. In case that the number of bytes in frames in GOP differs greatly each other, this may cause unnecessary transmission rate changes and may require high transmission rates abruptly when frame's byte is large. In result, it is difficult to use efficient network resource. In this paper, we proposed a smoothing algorithm that find the optimal frame sequence in short time by using backtracking method and smoothing's structure for the proposed smoothing algorithm. This algorithm decides the sequence of frames which requires the lowest variance of frame's bytes in GOP and make a transmission plan. In order to show the performance, we compared with MVBA algorithm by various evaluation factors such as the number of rate changes, peak rate, rate variability.

  • PDF

Design and Implementation of 8K UHD Encapsulation Method for Efficient Transmission and Reception based on MMT

  • Song, Seulki;Ryu, Youngsu;Wee, Jungwook;Park, Kyungwon;Kwon, Kiwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.860-872
    • /
    • 2018
  • In this Paper, we propose 8K UHD (Ultra High Definition) encapsulation method for efficient transmission and reception based on MMT (MPEG Media Transport). Broadcasting services for 8K UHD allow users to feel the maximized reality. However, present technology is difficult to provide 8K UHD in broadcasting networks, because the 8K UHD bitrate is too high to be transmitted in the current broadcasting networks. Research for transmitting 8K UHD is underway. In some researches, a receiver is implemented with four 4K UHD display instead of a 8K UHD display. In order to transmit 8K UHD within the limited transmission bitrate of broadcasting network, 8K UHD contents encoded by SHVC (Scalable High Efficiency Video Coding) and then transmitted over heterogeneous network. For using the broadcasting and communication networks, MMT standard is used. MMT is IP based transmission protocol as the next generation transmission protocol. According to the MMT standard, video stream encapsulated and transmitted in MMTP (MMT Protocol) packet. IP-based broadcasting and communication networks can be used to transmit simultaneously, and the receiver can synchronize and play it. We propose an encapsulation method that can efficiently transmit and receive 8K UHD. The proposed method increases a payload rate and decreases an initial delay at the receiver. We show that the efficiency of the proposed method is verified by experimental tests.

An Efficient Transmission Method of Panoramic Multimedia Contents in a Limited Bandwidth Environment (제한적 네트워크 환경 하에서 효율적인 파노라마식 멀티미디어 콘텐츠 분할 전송 방법)

  • Kim, Byung-Chul;Lee, Gun-Hee;Lee, In-Jae;Kim, Kyu-Heon
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.811-823
    • /
    • 2011
  • This paper proposes an efficient transmission method for the panoramic multimedia contents. The panoramic video provides wide sight and various view-point to the user. The traditional methods of the panoramic multimedia content transmission has several limitations, as follow; A client suffers a long initial delay time to play a panoramic video when it is transmitted through a limited bandwidth network, because the panoramic video has larger data size than a general video. And if a client's display device has limited resolution, such as mobile phone, laptop PC monitor, etc. it can not display the entire panoramic video that has a wide view video sequence. So, in order to overcome the obstacles, this paper proposes an efficient transmission of panoramic multimedia contents. This method will increase the transmission efficiency throughout the technique of the scene description in MPEG-4 system. Also we demonstrated the efficiency of the proposed method by comparison with existing methods.

Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks

  • Matoba, Akihisa;Hanada, Masaki;Kanemitsu, Hidehiro;Kim, Moo Wan
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.2
    • /
    • pp.107-118
    • /
    • 2014
  • One interesting problem regarding wireless local area network (WLAN) ad-hoc networks is the effective mitigation of hidden nodes. The WLAN standard IEEE 802.11 provides request to send/clear to send (RTS/CTS) as mitigation for the hidden node problem; however, this causes the exposed node problem. The first 802.11 standard provided only two transmission rates, 1 and 2 Mbps, and control frames, such as RTS/CTS assumed to be sent at 1 Mbps. The 802.11 standard has been enhanced several times since then and now it supports multi-rate transmission up to 65 Mbps in the currently popular 802.11n (20 MHz channel, single stream with long guard interval). As a result, the difference in transmission rates and coverages between the data frame and control frame can be very large. However adjusting the RTS/CTS transmission rate to optimize network throughput has not been well investigated. In this paper, we propose a method to decrease the number of exposed nodes by increasing the RTS transmission rate to decrease RTS coverage. Our proposed method, Asymmetric Range by Multi-Rate Control (ARMRC), can decrease or even completely eliminate exposed nodes and improve the entire network throughput. Experimental results by simulation show that the network throughput in the proposed method is higher by 20% to 50% under certain conditions, and the proposed method is found to be effective in equalizing dispersion of throughput among nodes.

A Study on The efficient Transmission Plan of Game Moving Picture (게임 동영상의 효율적인 전송 계획에 관한 연구)

  • Lee, Myoun-Jae;Cho, Sung-Hyun
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.33-40
    • /
    • 2007
  • Smoothing is a transmission plan where variable rate video data is converted to a constant bit rate stream. Among them are CBA, MCBA, MVBA and others. However, these smoothing algorithms produce a transmission plan where extra bandwidth in server is not considered. This may cause difficulty in providing videos to many clients in a server. In this paper, we propose the smoothing algorithm with monotonic transmission rate increase and abrupt transmission rate decrease, in order to provide videos to as many clients in server with limited network bandwidth as possible. In order to show the performance of our proposed algorithm, various evaluation factors were used such as the maximum number of clients, the average number of clients, and so on. Experiments demonstrated that the proposed algorithm outperformed other algorithms in evaluation factors such as the maximum number of clients and the average number of clients.

  • PDF

Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model

  • Fan, Jianrui;Zhao, Xinru;Wang, Wencan;Cai, Shengsuo;Zhang, Lijuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1293-1316
    • /
    • 2021
  • Using directional antennas in wireless Ad hoc networks has many superiorities, including reducing interference, extending transmission range, and increasing space division multiplexing. However, directional transmission introduces two problems: deafness and directional hidden terminals problems. We observe that these problems result in saturation throughput disparity among the competing flows in directional CSMA/CA based Ad hoc networks and bring challenges for modeling the saturation throughput of the flows. In this article, we concentrate on how to model and analyze the saturation throughput disparity of different flows in directional CSMA/CA based Ad hoc networks. We first divide the collisions occurring in the transmission process into directional instantaneous collisions and directional persistent collisions. Then we propose a four-dimensional Markov chain to analyze the transmission state for a specific node. Our model has three different kinds of processes, namely back-off process, transmission process and freezing process. Each process contains a certain amount of continuous time slots which is defined as the basic time unit of the directional CSMA/CA protocols and the time length of each slot is fixed. We characterize the collision probabilities of the node by the one-step transition probability matrix in our Markov chain model. Accordingly, we can finally deduce the saturation throughput for each directional data stream and evaluate saturation throughput disparity for a given network topology. Finally, we verify the accuracy of our model by comparing the deviation of analytical results and simulation results.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.