We present our own research work that uses extents of Peer-to-Peer technology with a framework th... more We present our own research work that uses extents of Peer-to-Peer technology with a framework that allows reliable Grid computing (P2P Grid) over the Internet. We propose how to decide optimized redundancy level of group peers by using system cost function and grid local reliability. Moreover we discuss an effectiveness of SLA-constrained load scheduling policy with multi-probing technology in order to maintain group more stable. Especially SLA-constrained load scheduling policy is designed for handling divisible loads and indivisible loads simultaneously and guaranteeing the shortest time of completing task. Finally through the simulation, we provide that these two proposed schemes can be evaluated to the reasonable solution to overcome unexpected system fault or down regarding system dependability issues in redundant group peers based P2P Grid environment.
Due to lack of considerations on media scalability and reuse, most selective encryption schemes p... more Due to lack of considerations on media scalability and reuse, most selective encryption schemes previously proposed might be hard to meet challenging requirements with a certain level of security which are induced from the multi-layer based video technique, for example scalable video coding. As a reason of that, first we discuss security concerns on this issue and then analyze the existing selective encryption algorithms in a media scalability point of view. Secondly, we propose the dynamic load balancing strategy for readjusting protection strength of reconstructed media and suggest operational mode which can be more suitable for media reuse. Finally, we demonstrate scalable security mechanism’s decryption overhead compared with decoding burden in time and effect of visual distortion through our designed simulation.
2009 11th International Conference on Advanced Communication Technology, 2009
Currently, network media (i.e., video) tends to be delivered to users through IP-based networks, ... more Currently, network media (i.e., video) tends to be delivered to users through IP-based networks, particularly P2P. However, due to operational complexities of risky P2P-based streaming model and less reflecting about media characteristics, the optimized performance (e.g., QoS or QoE) is rarely expected. Therefore, we describe constraints and then discuss our solutions of P2P video streaming services with respects to structure, operation, network, and media.
In the mobile cloud computing, the mobile node should request and receive the services while bein... more In the mobile cloud computing, the mobile node should request and receive the services while being connected. In PMIPv6, all packets sent by mobile nodes or correspondent nodes are transferred through the local mobility anchor. This unnecessary detour still results in high delivery latency and significant processing cost. Several PMIPv6 route optimization schemes have been proposed to solve this issue. However, they also suffer from the high signaling costs and handover latency when determining the optimized path. We propose the route optimization handover scheme which adopts the prediction algorithm in PFMIPv6. In the proposed scheme, the new mobile access gateway establishes the bi-directional tunnel with the correspondent node's MAG using the context message when the mobile node's handover is imminent. This tunnel may eliminate the need of separate route optimization procedure. Hence, the proposed scheme can reduce the signaling cost than other conventional schemes do. An...
The purpose of this paper proposes a network flow identification methodology considering network ... more The purpose of this paper proposes a network flow identification methodology considering network traffic dynamics caused by various types of recent network-based applications. In particular, P2P applications that generate encrypted packets are rarely visible to previous schemes, which have been proposed to handle packet filtering and control. Therefore, as a new strategy, we propose an efficient flow analysis scheme using a distributed monitoring agent for successful P2P and non-P2P traffic identification and management with statistical and application-level heuristic algorithm.
We present our own research work that uses extents of Peer-to-Peer technology with a framework th... more We present our own research work that uses extents of Peer-to-Peer technology with a framework that allows reliable Grid computing (P2P Grid) over the Internet. We propose how to decide optimized redundancy level of group peers by using system cost function and grid local reliability. Moreover we discuss an effectiveness of SLA-constrained load scheduling policy with multi-probing technology in order to maintain group more stable. Especially SLA-constrained load scheduling policy is designed for handling divisible loads and indivisible loads simultaneously and guaranteeing the shortest time of completing task. Finally through the simulation, we provide that these two proposed schemes can be evaluated to the reasonable solution to overcome unexpected system fault or down regarding system dependability issues in redundant group peers based P2P Grid environment.
Due to lack of considerations on media scalability and reuse, most selective encryption schemes p... more Due to lack of considerations on media scalability and reuse, most selective encryption schemes previously proposed might be hard to meet challenging requirements with a certain level of security which are induced from the multi-layer based video technique, for example scalable video coding. As a reason of that, first we discuss security concerns on this issue and then analyze the existing selective encryption algorithms in a media scalability point of view. Secondly, we propose the dynamic load balancing strategy for readjusting protection strength of reconstructed media and suggest operational mode which can be more suitable for media reuse. Finally, we demonstrate scalable security mechanism’s decryption overhead compared with decoding burden in time and effect of visual distortion through our designed simulation.
2009 11th International Conference on Advanced Communication Technology, 2009
Currently, network media (i.e., video) tends to be delivered to users through IP-based networks, ... more Currently, network media (i.e., video) tends to be delivered to users through IP-based networks, particularly P2P. However, due to operational complexities of risky P2P-based streaming model and less reflecting about media characteristics, the optimized performance (e.g., QoS or QoE) is rarely expected. Therefore, we describe constraints and then discuss our solutions of P2P video streaming services with respects to structure, operation, network, and media.
In the mobile cloud computing, the mobile node should request and receive the services while bein... more In the mobile cloud computing, the mobile node should request and receive the services while being connected. In PMIPv6, all packets sent by mobile nodes or correspondent nodes are transferred through the local mobility anchor. This unnecessary detour still results in high delivery latency and significant processing cost. Several PMIPv6 route optimization schemes have been proposed to solve this issue. However, they also suffer from the high signaling costs and handover latency when determining the optimized path. We propose the route optimization handover scheme which adopts the prediction algorithm in PFMIPv6. In the proposed scheme, the new mobile access gateway establishes the bi-directional tunnel with the correspondent node's MAG using the context message when the mobile node's handover is imminent. This tunnel may eliminate the need of separate route optimization procedure. Hence, the proposed scheme can reduce the signaling cost than other conventional schemes do. An...
The purpose of this paper proposes a network flow identification methodology considering network ... more The purpose of this paper proposes a network flow identification methodology considering network traffic dynamics caused by various types of recent network-based applications. In particular, P2P applications that generate encrypted packets are rarely visible to previous schemes, which have been proposed to handle packet filtering and control. Therefore, as a new strategy, we propose an efficient flow analysis scheme using a distributed monitoring agent for successful P2P and non-P2P traffic identification and management with statistical and application-level heuristic algorithm.
Uploads
Papers by Jae Hoon Nah