首页 > 最新文献

2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

英文 中文
Novel radio resource management for high density chaotic wireless LANs 高密度混沌无线局域网无线资源管理新方法
Suparerk Manitpornsut
It is well known that WLAN based on the IEEE 802.11 standard suffers from interference and scalability problems due to the limited number of non-overlapping channels. In order to mitigate the interference problem, channel assignment algorithms have been a popular research topic in recent years. It has been shown that such algorithms can greatly reduce the interference among wireless access points. However, in this paper we present our findings that traditional channel assignment algorithm can introduce a high hidden node index in high network density, thus greatly reducing the WLAN performance. We show that careful consideration needs to be taken when assigning channels using such algorithms. In addition, we propose a novel algorithm, called Cluster Channel Assignment (CCA), which is presented in the form of a state diagram. From our simulation results, we show that CCA can outperform traditional channel assignment in densely deployed scenarios, and is therefore a better alternative in such settings.
众所周知,基于IEEE 802.11标准的WLAN由于非重叠信道数量有限而存在干扰和可扩展性问题。为了缓解干扰问题,信道分配算法是近年来研究的热点。研究表明,这种算法可以大大减少无线接入点之间的干扰。然而,在本文中,我们发现传统的信道分配算法会在高网络密度下引入高隐藏节点指数,从而大大降低WLAN的性能。我们表明,在使用这种算法分配信道时需要仔细考虑。此外,我们提出了一种新的算法,称为群集信道分配(CCA),它以状态图的形式呈现。从我们的模拟结果中,我们表明,在密集部署的场景中,CCA可以优于传统的信道分配,因此在这种设置中是一个更好的选择。
{"title":"Novel radio resource management for high density chaotic wireless LANs","authors":"Suparerk Manitpornsut","doi":"10.1109/JCSSE.2011.5930089","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930089","url":null,"abstract":"It is well known that WLAN based on the IEEE 802.11 standard suffers from interference and scalability problems due to the limited number of non-overlapping channels. In order to mitigate the interference problem, channel assignment algorithms have been a popular research topic in recent years. It has been shown that such algorithms can greatly reduce the interference among wireless access points. However, in this paper we present our findings that traditional channel assignment algorithm can introduce a high hidden node index in high network density, thus greatly reducing the WLAN performance. We show that careful consideration needs to be taken when assigning channels using such algorithms. In addition, we propose a novel algorithm, called Cluster Channel Assignment (CCA), which is presented in the form of a state diagram. From our simulation results, we show that CCA can outperform traditional channel assignment in densely deployed scenarios, and is therefore a better alternative in such settings.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coexistence of SCTP and TCP variants under self-similar network 自相似网络下SCTP和TCP变体的共存
L. Charoenwatana, Sunya Rattanabung
SCTP will co-exist with TCP on the Internet in a near future as its maturity progresses. Self-similarity is long known as an inherent characteristic of the IP network in which performance of SCTP under such environment is yet to be investigated. This paper reports behaviors and throughput of SCTP and TCP streams when co-existed together in the same channel under self-similar traffic environment. Simulation tests on several TCP variants including New-Reno, Reno, Tahoe, Vegas, and SACK using ns2 simulator are conducted. Results reveal that SCTP acquires averagely only 50% throughput when competing with TCP. Although found that self-similarity does not extensively distort SCTP-TCP performance, it, nevertheless, offers indirect advantage to SCTP in gaining throughput proportion against TCP.
在不久的将来,随着SCTP的成熟,它将与TCP在Internet上共存。自相似性一直被认为是IP网络的固有特征,在这种环境下,SCTP的性能尚未得到研究。本文研究了自相似流量环境下SCTP和TCP流在同一通道中共存时的行为和吞吐量。利用ns2模拟器对New-Reno、Reno、Tahoe、Vegas、SACK等几种TCP变种进行了仿真测试。结果表明,SCTP在与TCP竞争时平均只获得50%的吞吐量。虽然发现自相似性并没有广泛地扭曲SCTP-TCP的性能,但它在获得相对于TCP的吞吐量比例方面为SCTP提供了间接的优势。
{"title":"Coexistence of SCTP and TCP variants under self-similar network","authors":"L. Charoenwatana, Sunya Rattanabung","doi":"10.1109/JCSSE.2011.5930082","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930082","url":null,"abstract":"SCTP will co-exist with TCP on the Internet in a near future as its maturity progresses. Self-similarity is long known as an inherent characteristic of the IP network in which performance of SCTP under such environment is yet to be investigated. This paper reports behaviors and throughput of SCTP and TCP streams when co-existed together in the same channel under self-similar traffic environment. Simulation tests on several TCP variants including New-Reno, Reno, Tahoe, Vegas, and SACK using ns2 simulator are conducted. Results reveal that SCTP acquires averagely only 50% throughput when competing with TCP. Although found that self-similarity does not extensively distort SCTP-TCP performance, it, nevertheless, offers indirect advantage to SCTP in gaining throughput proportion against TCP.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A model of ontology driven case-based reasoning for electronic issue management systems 面向电子问题管理系统的本体驱动案例推理模型
Thitiphob Pangjitt, T. Sunetnanta
An electronic issue management system, alternatively known as a help desk system, refers to a computer application that can be used to electronically automate the process of managing business issues, including problems, defects, tasks, changes or new requests. The difficulties found in using such a system are often from the lack of expertise to resolve the issues that are stored by the system. This paper proposes to use ontology and case-based reasoning to better provide structured information and enable the capturing of tacit knowledge of experts for issue management.
电子问题管理系统,也称为帮助台系统,是指一种计算机应用程序,可用于电子自动化管理业务问题的过程,包括问题、缺陷、任务、更改或新请求。在使用这种系统时发现的困难通常来自缺乏解决系统所存储的问题的专门知识。本文提出利用本体和基于案例的推理来更好地提供结构化信息,并使专家隐性知识的获取成为问题管理的必要条件。
{"title":"A model of ontology driven case-based reasoning for electronic issue management systems","authors":"Thitiphob Pangjitt, T. Sunetnanta","doi":"10.1109/JCSSE.2011.5930099","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930099","url":null,"abstract":"An electronic issue management system, alternatively known as a help desk system, refers to a computer application that can be used to electronically automate the process of managing business issues, including problems, defects, tasks, changes or new requests. The difficulties found in using such a system are often from the lack of expertise to resolve the issues that are stored by the system. This paper proposes to use ontology and case-based reasoning to better provide structured information and enable the capturing of tacit knowledge of experts for issue management.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131933351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance optimization of Thai virtual keyboard for social networking 面向社交网络的泰语虚拟键盘性能优化
Jirapat Simathamanand, K. Piromsopa
Using Thai virtual keyboard for social network function on a tablet-based device has proven to be inefficient. In this paper, we design a new layout for Thai virtual keyboard by applying constraints to genetic algorithm. Our experiment is validated with data collected from social network website. With Fitts' law as our performance model, the result shows that the new Thai keyboard layout performs better than traditional layouts.
在基于平板电脑的设备上使用泰语虚拟键盘来实现社交网络功能已经被证明是低效的。本文采用约束遗传算法设计了一种新的泰文虚拟键盘布局。我们的实验用从社交网站收集的数据进行了验证。以Fitts定律作为性能模型,结果表明新的泰语键盘布局比传统布局性能更好。
{"title":"Performance optimization of Thai virtual keyboard for social networking","authors":"Jirapat Simathamanand, K. Piromsopa","doi":"10.1109/JCSSE.2011.5930122","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930122","url":null,"abstract":"Using Thai virtual keyboard for social network function on a tablet-based device has proven to be inefficient. In this paper, we design a new layout for Thai virtual keyboard by applying constraints to genetic algorithm. Our experiment is validated with data collected from social network website. With Fitts' law as our performance model, the result shows that the new Thai keyboard layout performs better than traditional layouts.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying software fault tolerance patterns to WS-BPEL processes 将软件容错模式应用于WS-BPEL流程
Thawee Thaisongsuwan, T. Senivongse
WS-BPEL is a standard language for orchestrating business processes of Web services. During service invocation, errors may occur from latent faults, e.g. partner services may not be available or not respond within time. Fault tolerance patterns, such as those for architectural design, error detection, and error recovery, can be used to handle partner service faults. This paper proposes an approach to applying patterns for fault tolerant software to WS-BPEL. Templates of WS-BPEL constructs to implement fault handling logic according to the patterns will be presented. With this approach, business processes can be made to execute in a fault tolerant manner within standard WS-BPEL execution environment.
WS-BPEL是用于编排Web服务的业务流程的标准语言。在服务调用期间,潜在的错误可能会导致错误,例如合作伙伴服务可能不可用或无法及时响应。容错模式(例如用于体系结构设计、错误检测和错误恢复的容错模式)可用于处理合作伙伴服务故障。本文提出了一种将容错软件模式应用于WS-BPEL的方法。将提供WS-BPEL构造的模板,用于根据模式实现故障处理逻辑。使用这种方法,可以使业务流程在标准WS-BPEL执行环境中以容错方式执行。
{"title":"Applying software fault tolerance patterns to WS-BPEL processes","authors":"Thawee Thaisongsuwan, T. Senivongse","doi":"10.1109/JCSSE.2011.5930133","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930133","url":null,"abstract":"WS-BPEL is a standard language for orchestrating business processes of Web services. During service invocation, errors may occur from latent faults, e.g. partner services may not be available or not respond within time. Fault tolerance patterns, such as those for architectural design, error detection, and error recovery, can be used to handle partner service faults. This paper proposes an approach to applying patterns for fault tolerant software to WS-BPEL. Templates of WS-BPEL constructs to implement fault handling logic according to the patterns will be presented. With this approach, business processes can be made to execute in a fault tolerant manner within standard WS-BPEL execution environment.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129011435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
3D Hand pose modeling from uncalibrate monocular images 从未校准的单眼图像3D手姿势建模
Theeraphat Sajjawiso, P. Kanongchaiyos
Hand pose modeling is one of the most challenging research areas in Computer Animation due to the difficulty of hand model, which consist of more than 20 degrees of freedom and require the construction of a large high-dimensional database of poses. In this paper, we propose a method of 3D hand pose modeling based on a new set of constraints and optimization framework to reduce the ambignity between 2D joint location and 3D hand poses. Our method does not need prior knowledge of the bone length and camera parameters. Furthermore, a large high-dimension database used for searching is not needed to be constructed. An experiment was performed on the real data set captured from a webcam. the results shows that the proposed set of constraints are sufficient to reconstruct the hand poses with desirable accuracy.
手部姿态建模是计算机动画中最具挑战性的研究领域之一,因为手部模型具有20多个自由度,需要构建庞大的高维姿态数据库。本文提出了一种基于一组新的约束和优化框架的三维手姿建模方法,以降低二维关节位置与三维手姿之间的模糊度。我们的方法不需要事先知道骨长度和相机参数。此外,不需要构建用于搜索的大型高维数据库。实验采用网络摄像头采集的真实数据集进行。结果表明,所提出的约束集足以以理想的精度重建手位姿。
{"title":"3D Hand pose modeling from uncalibrate monocular images","authors":"Theeraphat Sajjawiso, P. Kanongchaiyos","doi":"10.1109/JCSSE.2011.5930116","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930116","url":null,"abstract":"Hand pose modeling is one of the most challenging research areas in Computer Animation due to the difficulty of hand model, which consist of more than 20 degrees of freedom and require the construction of a large high-dimensional database of poses. In this paper, we propose a method of 3D hand pose modeling based on a new set of constraints and optimization framework to reduce the ambignity between 2D joint location and 3D hand poses. Our method does not need prior knowledge of the bone length and camera parameters. Furthermore, a large high-dimension database used for searching is not needed to be constructed. An experiment was performed on the real data set captured from a webcam. the results shows that the proposed set of constraints are sufficient to reconstruct the hand poses with desirable accuracy.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing service selection with a provider trustworthiness model 使用提供者可信度模型增强服务选择
Aekkachai Sumetanupap, T. Senivongse
In service selection, service consumers usually consider service functionalities and use technical quality of service (QoS) or price to differentiate between services of the same functionalities. That alone, in practice, is not adequate since the quality of servce providers can also have infuence on selection decisions. This paper applies a concept of interpersonal trust, especially trusting beliefs, to devise a quality of provider model. The model is based on competence, benevolence, and integrity of service providers, and trust score can be computed using the fuzzy set theory. Service consumers can then use the trust scores, in addition to technical QoS and price, in service selection.
在服务选择中,服务消费者通常考虑服务的功能,并使用服务的技术质量(QoS)或价格来区分具有相同功能的服务。实际上,仅此一点是不够的,因为服务提供者的质量也会影响选择决策。本文引入人际信任的概念,特别是信任信念,设计了一个提供者质量模型。该模型基于服务提供者的能力、仁慈和诚信,并利用模糊集理论计算信任分数。然后,除了技术QoS和价格之外,服务消费者还可以在服务选择中使用信任分数。
{"title":"Enhancing service selection with a provider trustworthiness model","authors":"Aekkachai Sumetanupap, T. Senivongse","doi":"10.1109/JCSSE.2011.5930135","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930135","url":null,"abstract":"In service selection, service consumers usually consider service functionalities and use technical quality of service (QoS) or price to differentiate between services of the same functionalities. That alone, in practice, is not adequate since the quality of servce providers can also have infuence on selection decisions. This paper applies a concept of interpersonal trust, especially trusting beliefs, to devise a quality of provider model. The model is based on competence, benevolence, and integrity of service providers, and trust score can be computed using the fuzzy set theory. Service consumers can then use the trust scores, in addition to technical QoS and price, in service selection.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evolutionary Artificial Neural Networks on simulated soccer robots 模拟足球机器人的进化人工神经网络
Kunthawat Suthambut, Jumpol Polvichai
A soccer robot is a cooperative robot agent system on a soccer game. Robot controllers in this project must react to different environments on each robot to achieve the goal while the optimal solution of controller configuration is hard to define. The Artificial Neural Networks (ANNs) and Genetic Algorithms (GAs) give us a key to solve these problems. An ANN develops itself to process complex problem while a GA finds acceptable solutions with the ability of randomness. The project shows that these hybrid methods used in soccer league simulation yield a promising result.
足球机器人是一种基于足球比赛的协作机器人代理系统。该项目中的机器人控制器必须对每个机器人的不同环境做出反应才能实现目标,而控制器配置的最优解难以定义。人工神经网络(ann)和遗传算法(GAs)为我们解决这些问题提供了一把钥匙。人工神经网络的发展是为了处理复杂的问题,而遗传算法则是利用随机的能力来寻找可接受的解。该项目表明,这些混合方法用于足球联赛模拟取得了良好的效果。
{"title":"Evolutionary Artificial Neural Networks on simulated soccer robots","authors":"Kunthawat Suthambut, Jumpol Polvichai","doi":"10.1109/JCSSE.2011.5930105","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930105","url":null,"abstract":"A soccer robot is a cooperative robot agent system on a soccer game. Robot controllers in this project must react to different environments on each robot to achieve the goal while the optimal solution of controller configuration is hard to define. The Artificial Neural Networks (ANNs) and Genetic Algorithms (GAs) give us a key to solve these problems. An ANN develops itself to process complex problem while a GA finds acceptable solutions with the ability of randomness. The project shows that these hybrid methods used in soccer league simulation yield a promising result.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126792944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event recognition from information-linkage based using phrase tree traversal 基于短语树遍历的信息链接事件识别
R. Sukhahuta, Chadchai Sukanun
In this paper we present an approach to extracting significant events from digital documents. OpenNLP syntactical parser for English is used for generating parse trees from the sentences, followed by the extraction of events from the parse trees using tree traversal algorithms. The extraction system is developed and tested on 50 sentences from terrorism documents of The Federation of American Scientists (FAS). The results showed that with this technique we can achieve high recall and precision yielding accuracy of 89.68 recall and 78.44 precision with an overall performance of 83.66 in term of F-measure.
在本文中,我们提出了一种从数字文档中提取重要事件的方法。OpenNLP英语语法解析器用于从句子生成解析树,然后使用树遍历算法从解析树中提取事件。该提取系统以美国科学家联合会(FAS)恐怖主义文件中的50句话为对象进行了开发和测试。结果表明,该方法具有较高的查全率和查准率,查全率为89.68,查准率为78.44,F-measure的综合性能为83.66。
{"title":"Event recognition from information-linkage based using phrase tree traversal","authors":"R. Sukhahuta, Chadchai Sukanun","doi":"10.1109/JCSSE.2011.5930104","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930104","url":null,"abstract":"In this paper we present an approach to extracting significant events from digital documents. OpenNLP syntactical parser for English is used for generating parse trees from the sentences, followed by the extraction of events from the parse trees using tree traversal algorithms. The extraction system is developed and tested on 50 sentences from terrorism documents of The Federation of American Scientists (FAS). The results showed that with this technique we can achieve high recall and precision yielding accuracy of 89.68 recall and 78.44 precision with an overall performance of 83.66 in term of F-measure.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114799471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An FPGA implementation of ATA Host Controller toward scalable iATA NAS 面向可扩展iATA NAS的ATA主控制器的FPGA实现
Napat Luevisadpaibul, Salita Sombatsiri, K. Piromsopa
Each business and organization owns an excessive amount of corporate data. Therefore, Storage Area Network (SAN) is built to support the need of data storage over the network. However, it is not worthy for Small Office, Home Office (SOHO) and small businesses to invest on the high-cost SAN system. Therefore, the implementation of Advanced Technology Attachment (ATA) Device Host Controller to support internet Advanced Technology Attachment (iATA) Protocol for ATA Network Attached Storage (NAS) is introduced to enable the capability to read data from and write data to ATA Device over the existing network. In this paper, we have implemented ATA Device Host Controller which supports a iATA application layer protocol on Field Programmable Gate Arrays (FPGA) to enable the data transfer over the internet. On the FPGA, we have implemented a module for each of the internet layer protocol, which are 1) 10/100 Ethernet MAC Module for the Physical and the Data Link Layer 2) IP header de/encapsulation Module for the Network Layer 3) TCP header de/encapsulation Module for the Transport Layer 4) iATA Controller Module for the Application Layer, and a Disk Controller Module for the read/write operations to a hard disk. These modules operate sequentially. As a result of the implementation, the experiment shows that our prototype systems can operate the read operation with the average speed of 1250 KB/sec and the write operation with the average speed of 1170 KB/sec. The experiment also shows that there is a clock frequency limitation in the implementation.
每个企业和组织都拥有大量的公司数据。因此,存储区域网络SAN (Storage Area Network)应运而生,以满足网络上数据存储的需求。然而,对于小型办公室、家庭办公室(SOHO)和小型企业来说,投资于高成本的SAN系统是不值得的。因此,引入了支持internet Advanced Technology Attachment (ATA) Protocol for ATA Network Attached Storage (NAS)的Advanced Technology Attachment (ATA) Device Host Controller的实现,以实现通过现有网络从ATA Device读取数据和向其写入数据的能力。在本文中,我们在现场可编程门阵列(FPGA)上实现了支持iATA应用层协议的ATA设备主机控制器,以实现互联网上的数据传输。在FPGA上,我们为每个互联网层协议实现了一个模块,它们是1)用于物理层和数据链路层的10/100以太网MAC模块2)用于网络层的IP头解码/封装模块3)用于传输层的TCP头解码/封装模块4)用于应用层的iATA控制器模块,以及用于硬盘读写操作的磁盘控制器模块。这些模块按顺序运行。实验结果表明,我们的原型系统能够以平均1250 KB/sec的速度进行读操作,以平均1170 KB/sec的速度进行写操作。实验还表明,在实现中存在时钟频率限制。
{"title":"An FPGA implementation of ATA Host Controller toward scalable iATA NAS","authors":"Napat Luevisadpaibul, Salita Sombatsiri, K. Piromsopa","doi":"10.1109/JCSSE.2011.5930125","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930125","url":null,"abstract":"Each business and organization owns an excessive amount of corporate data. Therefore, Storage Area Network (SAN) is built to support the need of data storage over the network. However, it is not worthy for Small Office, Home Office (SOHO) and small businesses to invest on the high-cost SAN system. Therefore, the implementation of Advanced Technology Attachment (ATA) Device Host Controller to support internet Advanced Technology Attachment (iATA) Protocol for ATA Network Attached Storage (NAS) is introduced to enable the capability to read data from and write data to ATA Device over the existing network. In this paper, we have implemented ATA Device Host Controller which supports a iATA application layer protocol on Field Programmable Gate Arrays (FPGA) to enable the data transfer over the internet. On the FPGA, we have implemented a module for each of the internet layer protocol, which are 1) 10/100 Ethernet MAC Module for the Physical and the Data Link Layer 2) IP header de/encapsulation Module for the Network Layer 3) TCP header de/encapsulation Module for the Transport Layer 4) iATA Controller Module for the Application Layer, and a Disk Controller Module for the read/write operations to a hard disk. These modules operate sequentially. As a result of the implementation, the experiment shows that our prototype systems can operate the read operation with the average speed of 1250 KB/sec and the write operation with the average speed of 1170 KB/sec. The experiment also shows that there is a clock frequency limitation in the implementation.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1