首页 > 最新文献

2006 8th International Conference Advanced Communication Technology最新文献

英文 中文
IPSec overhead analysis in dual stack IPv4/IPv6 transition mechanisms 双栈IPv4/IPv6转换机制下的IPSec开销分析
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206059
M. Mujinga, H. Muyingi, G. Rao
Internet Protocol version 4 (IPv4) is the current IP in use at the backbone of the Internet. Internet protocol version 6 (IPv6) is proposed to succeed IPv4 by IETF. IPv6 addresses among other issues the lack of security in IPv4 at network layer, in IPv6 this is addressed by the use of Internet protocol security (IPSec). This research reports on the evaluation of IPSec in an IPv4/IPv6 dual stack network
Internet Protocol version 4 (IPv4)是目前在Internet骨干网中使用的IP。Internet协议版本6 (IPv6)是IETF提出的取代IPv4的协议。IPv6解决了IPv4在网络层缺乏安全性的问题,IPv6通过使用互联网协议安全(IPSec)来解决这个问题。本研究报告了IPv4/IPv6双栈网络中IPSec的评估
{"title":"IPSec overhead analysis in dual stack IPv4/IPv6 transition mechanisms","authors":"M. Mujinga, H. Muyingi, G. Rao","doi":"10.1109/ICACT.2006.206059","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206059","url":null,"abstract":"Internet Protocol version 4 (IPv4) is the current IP in use at the backbone of the Internet. Internet protocol version 6 (IPv6) is proposed to succeed IPv4 by IETF. IPv6 addresses among other issues the lack of security in IPv4 at network layer, in IPv6 this is addressed by the use of Internet protocol security (IPSec). This research reports on the evaluation of IPSec in an IPv4/IPv6 dual stack network","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Policy Analysis and Studies on a Model for Determining an Optimal VoIP Access Charge VoIP最优接入收费策略分析及模型研究
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206404
Sung Uk Park
The introduction of a VoIP is expected to increase consumer benefits, boost competition in the IT market. This research endeavors to study the optimal access charge for a VoIP, which is expected to be introduced to the Korean IT market. I find that the optimal access charge is higher for the interdependent model than for the independent model; if the demand for the VoIP is a substitution-based relationship, the optimal access charge is higher than the marginal cost. However, if the relationship is complementary, the access charge is lower than the marginal cost in the upstream market
VoIP的引入将增加消费者的利益,并促进IT市场的竞争。此次调查的目的是研究将在韩国市场推出的VoIP的最佳接入费用。研究发现,相互依赖模型的最优接入费用高于独立模型;如果VoIP的需求是基于替代的关系,则最优接入费用大于边际成本。然而,如果关系是互补的,则接入费用低于上游市场的边际成本
{"title":"Policy Analysis and Studies on a Model for Determining an Optimal VoIP Access Charge","authors":"Sung Uk Park","doi":"10.1109/ICACT.2006.206404","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206404","url":null,"abstract":"The introduction of a VoIP is expected to increase consumer benefits, boost competition in the IT market. This research endeavors to study the optimal access charge for a VoIP, which is expected to be introduced to the Korean IT market. I find that the optimal access charge is higher for the interdependent model than for the independent model; if the demand for the VoIP is a substitution-based relationship, the optimal access charge is higher than the marginal cost. However, if the relationship is complementary, the access charge is lower than the marginal cost in the upstream market","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134484679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of Martini based Layer 2 VPN 基于Martini的第二层VPN的设计与实现
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206268
Suncheul Kim, Ho-yong Ryu, Jaehyung Park, Taell Kim
A VPN is a network composed of hosts and system in different locations. In the past, the most common way to connect these sites was to use an ATM or frame relay leased line, supplied by a service provider. These were traditionally straightforward to provide, as service provider networks were often implemented using a variety of protocols including ATM and frame relay. Recently, service providers have been looking at alternative technologies for creating VPN solutions. For supporting Layer 2 VPN service, MPLS protocol such as LDP, RSVP-TE should be implemented for supporting LSP and LDP proposed by Martini or BGP extended by Kompella. Also, MPLS protocol should be implemented for negotiating the specific virtual circuit. In this paper, we implement the Layer 2 VPN that is controlled by Martini protocol and static. And we evaluate the Layer 2 data traffic including both LSP protection and QoS features
VPN是由位于不同位置的主机和系统组成的网络。过去,连接这些站点的最常用方法是使用由服务提供商提供的ATM或帧中继租用线路。由于服务提供商网络通常使用包括ATM和帧中继在内的各种协议来实现,因此传统上这些都是直接提供的。最近,服务提供商一直在寻找创建VPN解决方案的替代技术。为了支持第二层VPN业务,需要实现LDP、RSVP-TE等MPLS协议,支持Martini提出的LSP、LDP或Kompella扩展的BGP。此外,还需要实现MPLS协议来协商特定的虚电路。在本文中,我们实现了由Martini协议控制的二层静态VPN。我们评估了包括LSP保护和QoS功能的第二层数据流量
{"title":"Design and implementation of Martini based Layer 2 VPN","authors":"Suncheul Kim, Ho-yong Ryu, Jaehyung Park, Taell Kim","doi":"10.1109/ICACT.2006.206268","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206268","url":null,"abstract":"A VPN is a network composed of hosts and system in different locations. In the past, the most common way to connect these sites was to use an ATM or frame relay leased line, supplied by a service provider. These were traditionally straightforward to provide, as service provider networks were often implemented using a variety of protocols including ATM and frame relay. Recently, service providers have been looking at alternative technologies for creating VPN solutions. For supporting Layer 2 VPN service, MPLS protocol such as LDP, RSVP-TE should be implemented for supporting LSP and LDP proposed by Martini or BGP extended by Kompella. Also, MPLS protocol should be implemented for negotiating the specific virtual circuit. In this paper, we implement the Layer 2 VPN that is controlled by Martini protocol and static. And we evaluate the Layer 2 data traffic including both LSP protection and QoS features","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134548164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A revised LKK proxy blind signature scheme 修改后的LKK代理盲签名方案
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205934
Jong-ho Ryu, Kook-han Kim, D. Seo
In 1996, the concept of proxy signature was introduced by Mambo, Usuda and Okamoto in M. Mambo et al. (1996). A strong proxy signature scheme has been introduced in B. Lee et al. (2001), which we call LKK (B. Lee, H. Kim, K. Kim) scheme. In Z. Dong et al. (2003), the authors showed that the LKK scheme is vulnerable to their attack. In this paper, based on the vulnerability of the LKK scheme and blind Schnorr signature scheme, we propose a revised proxy signature and a proxy blind signature scheme. The basic idea is to propose the revised scheme resisting their attack and to make it difficult for the original signer to delete a delegation value
1996年,Mambo、Usuda和Okamoto在M. Mambo et al.(1996)中引入了代理签名的概念。B. Lee等人(2001)提出了一种强代理签名方案,我们称之为LKK (B. Lee, H. Kim, K. Kim)方案。在Z. Dong et al.(2003)中,作者证明了LKK方案容易受到他们的攻击。本文针对LKK方案和盲Schnorr签名方案的漏洞,提出了一种改进的代理签名方案和代理盲签名方案。其基本思想是提出修改后的方案,以抵抗他们的攻击,并使原始签名者难以删除委托值
{"title":"A revised LKK proxy blind signature scheme","authors":"Jong-ho Ryu, Kook-han Kim, D. Seo","doi":"10.1109/ICACT.2006.205934","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205934","url":null,"abstract":"In 1996, the concept of proxy signature was introduced by Mambo, Usuda and Okamoto in M. Mambo et al. (1996). A strong proxy signature scheme has been introduced in B. Lee et al. (2001), which we call LKK (B. Lee, H. Kim, K. Kim) scheme. In Z. Dong et al. (2003), the authors showed that the LKK scheme is vulnerable to their attack. In this paper, based on the vulnerability of the LKK scheme and blind Schnorr signature scheme, we propose a revised proxy signature and a proxy blind signature scheme. The basic idea is to propose the revised scheme resisting their attack and to make it difficult for the original signer to delete a delegation value","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel techniques of a list sphere decoder for high throughput 面向高吞吐量的表球解码器新技术
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206335
Jin Lee, Sin-Chong Park
Since finding the nearest point in a lattice for multi-input multi-output (MIMO) channels is NP-hard, simplified algorithms such as a sphere decoder (SD) have been proposed. List sphere decoder (LSD), which is a modified version of SD, allows soft information to be extracted for channel decoding and iterative detection/decoding. In this paper, recently proposed efficient methods for reducing the computational complexity of a sphere decoder (SD) and a list sphere decoder (LSD) with depth-first tree searching are summarized. Numerous simulations have been carried out and comparison has been made based on of the average number of processing cycles
由于在多输入多输出(MIMO)信道中寻找晶格上的最近点是np困难的,因此提出了一些简化算法,如球面解码器(SD)。列表球解码器(List sphere decoder, LSD)是SD的改进版本,可以提取软信息进行信道解码和迭代检测/解码。本文总结了近年来提出的降低球解码器(SD)和列表球解码器(LSD)计算复杂度的有效方法。在平均处理周期数的基础上进行了大量的仿真和比较
{"title":"Novel techniques of a list sphere decoder for high throughput","authors":"Jin Lee, Sin-Chong Park","doi":"10.1109/ICACT.2006.206335","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206335","url":null,"abstract":"Since finding the nearest point in a lattice for multi-input multi-output (MIMO) channels is NP-hard, simplified algorithms such as a sphere decoder (SD) have been proposed. List sphere decoder (LSD), which is a modified version of SD, allows soft information to be extracted for channel decoding and iterative detection/decoding. In this paper, recently proposed efficient methods for reducing the computational complexity of a sphere decoder (SD) and a list sphere decoder (LSD) with depth-first tree searching are summarized. Numerous simulations have been carried out and comparison has been made based on of the average number of processing cycles","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PEAQ-based psychoacoustic model for perceptual audio coder 基于peaq的感知音频编码器心理声学模型
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206344
Xiaopeng Hu, Guiming He, Xiaoping Zhou
For the purpose of improving the coding efficiency, this paper attempts to combine psychoacoustic model for perceptual evaluation of audio quality in BS.1387 with perceptual audio coder. The principle of this new psychoacoustic model is analyzed in theory, and corresponding improvements are proposed to make it be effectively applied to actual audio coder. Both this new model and MPEG psychoacoustic model 2 are implemented in the latest AVS reference coder of China, and comparison of output masking parameter and subjective hearing test between the two models are conducted. Experimental results show that the proposed psychoacoustic model is feasible
为了提高编码效率,本文尝试将BS.1387中用于音质感知评价的心理声学模型与感知音频编码器相结合。从理论上分析了这种新的心理声学模型的原理,并提出了相应的改进措施,使其能够有效地应用于实际的音频编码器中。将该模型与MPEG心理声学模型2在国内最新的AVS参考编码器上实现,并对两种模型的输出掩蔽参数和主观听力测试进行了比较。实验结果表明,所提出的心理声学模型是可行的
{"title":"PEAQ-based psychoacoustic model for perceptual audio coder","authors":"Xiaopeng Hu, Guiming He, Xiaoping Zhou","doi":"10.1109/ICACT.2006.206344","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206344","url":null,"abstract":"For the purpose of improving the coding efficiency, this paper attempts to combine psychoacoustic model for perceptual evaluation of audio quality in BS.1387 with perceptual audio coder. The principle of this new psychoacoustic model is analyzed in theory, and corresponding improvements are proposed to make it be effectively applied to actual audio coder. Both this new model and MPEG psychoacoustic model 2 are implemented in the latest AVS reference coder of China, and comparison of output masking parameter and subjective hearing test between the two models are conducted. Experimental results show that the proposed psychoacoustic model is feasible","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PN code acquisition using signed-rank-based detector in non-Gaussian impulsive channels 非高斯脉冲信道中基于符号秩检测器的PN码采集
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206096
Dahae Chong, Byeongyun Lee, Sanghun Kim, Seokho Yoon, Sun Yong Kim
In this paper, a new detector is proposed for code acquisition, which employs the signs and ranks of the received signal samples, instead of their actual values, and so does not require knowledge of the non-Gaussian noise dispersion. The mean acquisition performance of the proposed detector is compared with that of the detector of S. Yoon et al. (2004). The simulation results show that the proposed scheme is not only robust to deviations from the true value of the non-Gaussian noise dispersion, but also has comparable performance to that of the scheme of S. Yoon et al. (2004) using exact knowledge of the non-Gaussian noise dispersion
本文提出了一种新的码采集检测器,它利用接收到的信号样本的符号和秩,而不是它们的实际值,因此不需要了解非高斯噪声的色散。将该检测器的平均采集性能与S. Yoon等人(2004)的检测器进行了比较。仿真结果表明,所提出的方案不仅对非高斯噪声色散的真实值的偏差具有鲁棒性,而且与S. Yoon等人(2004)使用精确的非高斯噪声色散知识的方案具有相当的性能
{"title":"PN code acquisition using signed-rank-based detector in non-Gaussian impulsive channels","authors":"Dahae Chong, Byeongyun Lee, Sanghun Kim, Seokho Yoon, Sun Yong Kim","doi":"10.1109/ICACT.2006.206096","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206096","url":null,"abstract":"In this paper, a new detector is proposed for code acquisition, which employs the signs and ranks of the received signal samples, instead of their actual values, and so does not require knowledge of the non-Gaussian noise dispersion. The mean acquisition performance of the proposed detector is compared with that of the detector of S. Yoon et al. (2004). The simulation results show that the proposed scheme is not only robust to deviations from the true value of the non-Gaussian noise dispersion, but also has comparable performance to that of the scheme of S. Yoon et al. (2004) using exact knowledge of the non-Gaussian noise dispersion","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of session management for n-to-n multicast n对n组播会话管理的设计与实现
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206361
O. Jung, Juyoung Park, Shingak Kang
ITU-T SG17 is standardizing overlay multicast protocol for n-plex group multicast. It contains multicast agent and session manager. In this paper, we provide design of session management for n-to-n multicast protocol and also describe the implementation of session management services according to ITU-T RMCP-3
ITU-T SG17正在标准化n-plex组播覆盖组播协议。它包含多播代理和会话管理器。本文给出了n对n多播协议的会话管理设计,并根据ITU-T RMCP-3描述了会话管理服务的实现
{"title":"Design and implementation of session management for n-to-n multicast","authors":"O. Jung, Juyoung Park, Shingak Kang","doi":"10.1109/ICACT.2006.206361","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206361","url":null,"abstract":"ITU-T SG17 is standardizing overlay multicast protocol for n-plex group multicast. It contains multicast agent and session manager. In this paper, we provide design of session management for n-to-n multicast protocol and also describe the implementation of session management services according to ITU-T RMCP-3","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless Network 无线网络中考虑WTP SAR算法和RLP的WAP数据包性能评价
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206212
Il-Young Moon
With the growth of data communication service by mobile devices, WAP is a protocol proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. In this paper, it has analyzed transmission time for wireless application protocol (WAP) in wireless CDMA network. In order for segmentation and reassembly (SAR) to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the wireless transaction protocol (WTP) to define the resultant packet size and the level of fragmentation for each proceeding layer. SAR decreases transmission time of radio link protocol (RLP) baseband packets by sending packets. From the results, it was able to obtain packet transmission time and optimal WTP packet size in wireless network
WAP是随着移动设备数据通信业务的发展,为了在无线条件下根据用户请求高效访问互联网内容而提出的一种协议,具有较高的错误率和移动性。本文分析了无线CDMA网络中无线应用协议(WAP)的传输时间。为了进行分段和重组(SAR)以提高传输能力,使用从总包开始的分段和每层的增量分段来模拟消息的传输,使用无线事务协议(WTP)来定义生成的数据包大小和每个处理层的分段级别。SAR通过发送报文来减少RLP (radio link protocol)基带报文的传输时间。结果表明,该算法能够得到无线网络中WTP包的传输时间和最佳包大小
{"title":"Performance Evaluation of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless Network","authors":"Il-Young Moon","doi":"10.1109/ICACT.2006.206212","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206212","url":null,"abstract":"With the growth of data communication service by mobile devices, WAP is a protocol proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. In this paper, it has analyzed transmission time for wireless application protocol (WAP) in wireless CDMA network. In order for segmentation and reassembly (SAR) to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the wireless transaction protocol (WTP) to define the resultant packet size and the level of fragmentation for each proceeding layer. SAR decreases transmission time of radio link protocol (RLP) baseband packets by sending packets. From the results, it was able to obtain packet transmission time and optimal WTP packet size in wireless network","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-based grid caching for grid datafarm 基于块的网格缓存
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206436
T. Hiruntaraporn, N. Nupairoj
Conventional grid cache follows Web-based caching concept, which stores the whole object as one piece in the cache storage. Although this object-based approach can be very effective for Web-based files, which are typically small, grid data files are usually large. Thus, conventional grid cache performs rather poor and becomes less-effective as the cache storage is not well-managed. This paper presents a new block-based grid caching model which divide caching space into fixed-size cache blocks for storing data. We evaluate the performance of our block-based approach and the impact of different block sizes using real-world data on our ns-based simulator. The results strongly indicate that our block-based grid caching perform reasonably well comparing to the conventional file-based grid caching
传统的网格缓存遵循基于web的缓存概念,将整个对象作为一个整体存储在缓存存储器中。尽管这种基于对象的方法对于通常较小的基于web的文件非常有效,但网格数据文件通常很大。因此,传统的网格缓存性能相当差,并且由于缓存存储没有得到很好的管理而变得不那么有效。本文提出了一种新的基于块的网格缓存模型,该模型将缓存空间划分为固定大小的缓存块来存储数据。我们在基于nss的模拟器上使用真实世界数据评估基于块的方法的性能和不同块大小的影响。结果强烈表明,与传统的基于文件的网格缓存相比,我们基于块的网格缓存的性能相当好
{"title":"Block-based grid caching for grid datafarm","authors":"T. Hiruntaraporn, N. Nupairoj","doi":"10.1109/ICACT.2006.206436","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206436","url":null,"abstract":"Conventional grid cache follows Web-based caching concept, which stores the whole object as one piece in the cache storage. Although this object-based approach can be very effective for Web-based files, which are typically small, grid data files are usually large. Thus, conventional grid cache performs rather poor and becomes less-effective as the cache storage is not well-managed. This paper presents a new block-based grid caching model which divide caching space into fixed-size cache blocks for storing data. We evaluate the performance of our block-based approach and the impact of different block sizes using real-world data on our ns-based simulator. The results strongly indicate that our block-based grid caching perform reasonably well comparing to the conventional file-based grid caching","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 8th International Conference Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1