• Title/Summary/Keyword: systems-theory

Search Result 5,367, Processing Time 0.027 seconds

A Multipurpose Design Framework for Hardware-Software Cosimulation of System-on-Chip (시스템-온-칩의 하드웨어-소프트웨어 통합 시뮬레이션을 위한 다목적 설계 프레임워크)

  • Joo, Young-Pyo;Yun, Duk-Young;Kim, Sung-Chan;Ha, Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.485-496
    • /
    • 2008
  • As the complexity of SoC (System-on-Chip) design increases dramatically. traditional system performance analysis and verification methods based on RTL (Register Transfer Level) are no more valid for increasing time-to-market pressure. Therefore a new design methodology is desperately required for system verification in early design stages. and hardware software (HW-SW) cosimulation at TLM (Transaction Level Modeling) level has been researched widely for solving this problem. However, most of HW-SW cosimulators support few restricted ion levels only, which makes it difficult to integrate HW-SW cosimulators with different ion levels. To overcome this difficulty, this paper proposes a multipurpose framework for HW SW cosimulation to provide systematic SoC design flow starting from software application design. It supports various design techniques flexibly for each design step, and various HW-SW cosimulators. Since a platform design is possible independently of ion levels and description languages, it allows us to generate simulation models with various ion levels. We verified the proposed framework to model a commercial SoC platform based on an ARM9 processor. It was also proved that this framework could be used for the performance optimization of an MJPEG example up to 44% successfully.

Back-end Prefetching Scheme for Improving the Performance of Cluster-based Web Servers (클러스터 웹 서버에서 성능 향상을 위한 노드간 선인출 기법)

  • Park, Seon-Yeong;Park, Do-Hyeon;Lee, Joon-Won;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.265-273
    • /
    • 2002
  • With the explosive growth of WWW traffic, there is an increasing demand for the high performance Web servers to provide a stable Web service to users. The cluster-based Web server is a solution to core with the heavy access from users, easily scaling the server according to the loads. In the cluster-based Web sewer, a back-end node may not be able to serve some HTTP requests directly because it does not have the requested contents in its main memory. In this case, the back-end node has to retrieve the requested contents from its local disk or other back-end nodes in the cluster. To reduce service latency, we introduce a new prefetch scheme. The back-end nodes predict the next HTTP requests and prefetch the contents of predicted requests before the next requests arrive. We develop three prefetch algorithms bated on some useful information gathered from many clients'HTTP requests. Through trace-driven simulation, the service latency of the prefetch scheme is reduced by 10 ~ 25% as compared with no prefetch scheme. Among the proposed prefetch algorithms, Time and Access Probability-based Prefetch (TAP2) algorithm, which uses the access probability and the inter-reference time of Web object, shows the best performance.

A Non-Periodic Synchronization Algorithm using Address Field of Point-to-Point Protocol in CDMA Mobile Network (CDMA이동망에서 점대점 프로토콜의 주소영역을 이용한 비주기적 동기 알고리즘)

  • Hong, Jin-Geun;Yun, Jeong-O;Yun, Jang-Heung;Hwang, Chan-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.918-929
    • /
    • 1999
  • 동기식 스트림 암호통신 방식을 사용하는 암호통신에서는 암/복호화 과정 수행시 암호통신 과정에서 발생하는 사이클슬립으로 인해 키수열의 동기이탈 현상이 발생되고 이로 인해 오복호된 데이타를 얻게된다. 이러한 위험성을 감소하기 위한 방안으로 현재까지 암호문에 동기신호와 세션키를 주기적으로 삽입하여 동기를 이루는 주기적인 동기암호 통신방식을 사용하여 왔다. 본 논문에서는 CDMA(Cellular Division Multiple Access) 이동망에서 데이타서비스를 제공할 때 사용되는 점대점 프로토콜의 주소영역의 특성을 이용하여 단위 측정시간 동안 측정된 주소비트 정보와 플래그 패턴의 수신률을 이용하여 문턱 값보다 작은경우 동기신호와 세션키를 전송하는 비주기적인 동기방식을 사용하므로써 종래의 주기적인 동기방식으로 인한 전송효율성 저하와 주기적인 상이한 세션키 발생 및 다음 주기까지의 동기이탈 상태의 지속으로 인한 오류확산 등의 단점을 해결하였다. 제안된 알고리즘을 링크계층의 점대점 프로토콜(Point to Point Protocol)을 사용하는 CDMA 이동망에서 동기식 스트림 암호 통신방식에 적용시 동기이탈율 10-7의 환경에서 주기가 1sec인 주기적인 동기방식에서 요구되는 6.45x107비트에 비해 3.84x105비트가 소요됨으로써 전송율측면에서의 성능향상과 오복호율과 오복호 데이타 비트측면에서 성능향상을 얻었다. Abstract In the cipher system using the synchronous stream cipher system, encryption / decryption cause the synchronization loss (of key arrangement) by cycle slip, then it makes incorrect decrypted data. To lessen the risk, we have used a periodic synchronous cipher system which achieve synchronization at fixed timesteps by inserting synchronization signal and session key. In this paper, we solved the problem(fault) like the transfer efficiency drops by a periodic synchronous method, the periodic generations of different session key, and the incorrectness increases by continuing synchronization loss in next time step. They are achieved by the transfer of a non-periodic synchronous signal which carries synchronous signal and session key when it is less than the threshold value, analyzing the address field of point-to-point protocol, using the receiving rate of address bits information and flag patterns in the decision duration, in providing data services by CDMA mobile network. When the proposed algorithm is applied to the synchronous stream cipher system using point-to-point protocol, which is used data link level in CDMA mobile network, it has advanced the result in Rerror and Derror and in transmission rate, by the use of 3.84$\times$105bits, not 6.45$\times$107bits required in periodic synchronous method, having lsec time step, in slip rate 10-7.

A Prioritized Call Admission Control using Prediction-Based Adaptive Bandwidth Reservation in High-Speed Multimedia Wireless Networks (고속 멀티미디어 무선 망에서 예측 기반의 적응적 대역폭 예약을 이용한 우선순위 호수락 제어)

  • Kim, Mi-Hui;Chae, Gi-Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.984-998
    • /
    • 1999
  • 최근 개인 휴대 통신에 대한 관심도가 증가하면서 B-ISDN (Broadband Integrated Services Digital Network)과 같은 기존의 유선 망에서 제공하던 다양한 멀티미디어 응용 지원을 무선 망으로 확장시키기 위한 연구가 활발히 진행되고 있다. 그러나 기존의 유선 망에서는 멀티미디어 응용 지원을 위해 QoS (Quality of Service) Provisioning에 관한 많은 연구가 되어 있으나 무선 망에서는 이동성과 무선 전파의 열악한 전송으로 인해 새로운 QoS Provisioning 방법에 관한 연구가 필수적이다. 본 논문에서는 이러한 무선 망의 특수성으로 인해 발생할 수 있는 서비스의 질 저하와 강제 종료를 줄임으로써 지속적인 QoS를 보장해 주고 한정된 무선 자원을 효율적으로 사용하며 처리에 의한 오버헤드를 줄이기 위하여 다음과 같은 세 가지 방법을 제안하였다. 첫째, 핸드오프 강제 종료율을 줄이기 위하여 대역폭 예약 방법을 사용하되 특정 셀의 트래픽 특성에 맞게 또한 시간대에 따른 트래픽 특성에 따라 예약 대역폭의 양을 조절하는 적응적 대역폭 예약 방법이다. 둘째, 많은 경우 각 셀의 트랙픽 변화는 일정한 주기로 변화한다는 특성에 따라 과거의 트래픽 정보를 이용하는 예측 기반의 대역폭 예약 방법이다. 마지막으로 호의 종류, 트래픽 특성, 단말기의 이동 속도에 따라 다른 우선 순위에 의해 호 수락 제어를 수행하는 우선 순위 기반의 호 수락 제어를 제안하였다. 시뮬레이션을 통하여 기존에 제안된 방법과 성능 비교하여, 요구되는 수준의 QoS 보장과 효율적인 자원의 사용, 요구되는 처리비용의 최소화를 통해 전체 시스템의 성능 향상을 입증하였다.Abstract As interest in wireless hand-held terminals and in personal communications services increases recently, there have been broad studies on the ways to support multimedia applications provided in wired networks such as B-ISDN (Broadband Integrated Services Digital Network) in wireless networks. However, since many studies have focused on Quality of Service (QoS) Provisioning in wired networks to provide multimedia applications, new methods of QoS Provisioning are needed in wireless networks to resolve the problem of wireless channel fading and the difficulty of mobility occurred in wireless networks. This paper proposes three schemes of QoS Provisioning in wireless networks which will make continuous QoS guarantee and efficient use of limited wireless resources possible. The first scheme reserves bandwidth in proportion to the amount of real-time traffic in the neighbor cells to decrease the handoff dropping rate of delay sensitive real-time connections, adapting reserved bandwidth for efficient resource utilization. The second scheme is predictive bandwidth reservation scheme that utilizes the past handoff information. It can decrease overheads required to adapt bandwidth reservation. The last scheme is priority-based call admission control prioritizing traffic type (real-time traffic/ non-real-time traffic), connection type (new connection /handoff connection), and mobile terminal speed (fast mobile/slow mobile). Simulation results show that the proposed QoS Provisioning schemes improve the total system performance by achieving three goals - required QoS guarantee, higher bandwidth utilization and less overhead.

Analyzing Access Histories for Detecting First Races in Shared-memory Programs (공유메모리 프로그램의 최초경합 탐지를 위한 접근역사 분석)

  • 강문혜;김영주;전용기
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.41-50
    • /
    • 2004
  • Detecting races is important for debugging shared-memory Parallel programs, because races result in unintended nondeterministic executions of the programs. Particularly, the first races to occur in an execution of a program must be detected because they can potentially affect other races that occur later. Previous on-the-fly techniques that detect such first races based on candidate events that are likely to participate in the first races monitor access events in order to collect the candidate events during a program execution, and try to report the races only from determining the concurrency relationships of the candidates. Such races reported in this way. however, are not guaranteed to be first races, because they are not determined by taking into account how they are affected with each other. This paper presents a new post-mortem technique that analyzes, on each nesting level, candidate events collected from an execution of a shared-memory program with nested parallelism in order to report only first races. This technique is efficient, because it guarantees that first races reported by analyzing a nesting level are the races that occur first at the level, and does not require more analyses to the higher nesting levels than the current level. The Proposed technique facilitates more practical and effective debugging than the previous techniques, because it guarantees to detect first races if candidate events are collected from an execution instance of the program with nested parallelism.

Two Flow Control Techniques for Teleconferencing over the Internet (인터넷상에서 원격회의를 위한 두 가지 흐름 제어 기법)

  • Na, Seung-Gu;Go, Min-Su;An, Jong-Seok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.975-983
    • /
    • 1999
  • 최근 네트워크의 속도가 빨라지고 멀티미디어 데이터를 다루기 위한 기술들이 개발됨에 따라 많은 멀티미디어 응용 프로그램들이 인터넷에 등장하고 있다. 그러나 이들 응용프로그램들은 수신자에게 전송되는 영상.음성의 품질이 낮기 때문에 기대만큼 빠르게 확산되지 못하고 있다. 영상.음성의 품질이 낮은 이유는 현재 인터넷이 실시간 응용프로그램이 요구하는 만큼 빠르고 신뢰성 있게 데이터를 전송할 수 없기 때문이다. 현재 인터넷의 내부구조를 바꾸지 않고 품질을 높이기 위해 많은 연구들이 진행되고 있는데 그 중 하나는 동적으로 변화하는 인터넷의 상태에 맞게 멀티캐스트 트래픽의 전송율을 조절하는 종단간의 흐름제어이다. 본 논문은 기존의 흐름제어 기법인 IVS와 RLM의 성능을 개선시키기 위한 두 가지 흐름제어 기법을 소개한다. IVS는 송신자가 주기적으로 측정된 네트워크 상태에 따라 전송율을 일정하게 조절한다. 송신자가 하나의 데이타 스트림을 생성하는 IVS와는 달리 RLM에서는 송신자가 계층적 코딩에 의하여 생성된 여러개의 데이타 스트림을 전송하고 각 수신자는 자신의 네트워크 상태에 맞게 데이타 스트림을 선택하는 기법이다. 그러나 IVS는 송신자가 전송율을 일정하게 증가시키고, RLM은 각자의 네트워크 상태를 고려하지 않고 임의의 시간에 하나 이상의 데이타 스트림을 받기 때문에 성능을 저하시킬 수 있다. 본 논문에서는 TCP-like IVS와 Adaptive RLM이라는 두 가지 새로운 기법을 소개한다. TCP-like IVS는 송신자가 전송율을 동적으로 결정하고, Adaptive RLM은 하나 이상의 데이타 스트림을 받기 위해 적당한 시간을 선택할 수 있다. 본 논문에서는 시뮬레이션을 통해 여러 가지 네트워크 구조에서 두 가지 방식이 기존의 방식에 비하여 더욱 높은 대역폭 이용율과 10~20% 정도 적은 패킷손실율을 이룬다는 것을 보여준다.Abstract Nowadays, many multimedia applications for the Internet are introduced as the network gets faster and many techniques manipulating multimedia data are developed. These multimedia applications, however, do not spread widely and are not fast as expected at their introduction time due to the poor quality of image and voice delivered at receivers. The poor quality is mainly attributed to that the current Internet can not carry data as fast and reliably as the real-time applications require. To improve the quality without modifying the internal structure of the current Internet, many researches are conducted. One of them is an end-to-end flow control of multicast traffic adapting the sending rate to the dynamically varying Internet state. This paper proposes two flow-control techniques which can improve the performance of the two conventional techniques; IVS and RLM. IVS statically adjusts the sending rate based on the network state periodically estimated. Differently from IVS in which a sender produces one single data stream, in RLM a sender transmits several data streams generated by the layered coding scheme and each receiver selects some data streams based on its own network state. The more data streams a receiver receives, the better quality of image or voice the receiver can produce. The two techniques, however, can degrade the performance since IVS increases its sending rate statically and RLM accepts one more data stream at arbitrary time regardless of the network state respectively. We introduce two new techniques called TCP-like IVS and Adaptive RLM; TCP-like IVS can determine the sending rate dynamically and Adaptive RLM can select the right time to add one more data stream. Our simulation experiments show that two techniques can achieve better utilization and less packet loss by 10-20% over various network topologies.

Target Advertisement based on a TV Viewer's Profile Inference and TV Anytime Metadata (시청자 프로파일 추론과 TV Anytime 메타데이타를 이용한 표적 광고)

  • Kim, Mun-Jo;Lee, Bum-Sik;Lim, Jeong-Yon;Kim, Mun-Churl;Lee, Hee-Kyung;Lee, Han-Gyu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.709-721
    • /
    • 2006
  • The traditional broadcasting services over terrestrial, satellite and cable media have been unidirectional mass media regardless of TV viewer's preferences. Recently ich media streaming has become possible via the broadb and networks. Furthermore, since bidirectional communication is possible, personalcasting such as personalized streaming services has been emerging by taking into account the user's preference on content genres, viewing times and actors/actresses etc. Accordingly, personal media becomes an important means for content provision service in addition to the traditional broadcasting service as mass media. In this paper, we introduce a user profile reasoning method for target advertisement which is considered an important application in personalcasting service. The proposed user profile reasoning method predicts an unknown TV viewer's gender and ages by analyzing TV Viewing history data. Based on the estimated user's gender and ages, a target advertisement is provided with TV Anytime metadata. A proposed target advertisement system is developed based on the user profile reasoning and the target advertisement selection method. To show the effectiveness of our proposed methods, we present a plenty of experimental results by using realistic TV viewing history data.

A Distributed VOD Server Based on Virtual Interface Architecture and Interval Cache (버추얼 인터페이스 아키텍처 및 인터벌 캐쉬에 기반한 분산 VOD 서버)

  • Oh, Soo-Cheol;Chung, Sang-Hwa
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.734-745
    • /
    • 2006
  • This paper presents a PC cluster-based distributed VOD server that minimizes the load of an interconnection network by adopting the VIA communication protocol and the interval cache algorithm. Video data is distributed to the disks of the distributed VOD server and each server node receives the data through the interconnection network and sends it to clients. The load of the interconnection network increases because of the large amount of video data transferred. This paper developed a distributed VOD file system, which is based on VIA, to minimize cost using interconnection network when accessing remote disks. VIA is a user-level communication protocol removing the overhead of TCP/IP. This papers also improved the performance of the interconnection network by expanding the maximum transfer size of VIA. In addition, the interval cache reduces traffic on the interconnection network by caching, in main memory, the video data transferred from disks of remote server nodes. Experiments using the distributed VOD server of this paper showed a maximum performance improvement of 21.3% compared with a distributed VOD server without VIA and the interval cache, when used with a four-node PC cluster.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.