• Title/Summary/Keyword: 메시지 확산

Search Result 114, Processing Time 0.028 seconds

Reliable Multicast MAC Protocol with Low Probability of Detection for Survivability in Tactical Ad-hoc Networks (생존성 향상을 위해 신뢰성 및 저피탐을 보장하는 멀티캐스팅 MAC 프로토콜 기법)

  • Kim, Jeong-Hun;Jung, Jun-Woo;Kim, Jung-Bin;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1685-1695
    • /
    • 2010
  • In this paper, we propose a new reliable multicast MAC protocol over the IEEE 802.11-based tactical ad hoc networks. The major contribution compared to the previous reliable multicast schemes using consecutive CTSs/ACKs is that the proposed scheme can send multiple CTS/ACK messages concurrently assisted by MC-DS/CDMA mechanisms. When multiple receivers receive the RTS/DATA message from a sender, they respond with the CTS/ACK message spread with pre-assigned code in the same time interval. The proposed scheme can reduce the overhead of multiple CTSs/ACKs. It is also possible to alleviate the received signal strength at the enemy detector and thus it improves low probability of detection performance. Through simulations and analysis, the proposed scheme outperforms that of the multiple CTSs/ACks in terms of the throughput, transmission delay and low probability of detection.

Development of a Remote Dust Collector Bag Control System using Power Line Communication (전력선 통신을 이용한 원격 집진기 bag 제어 시스템 개발)

  • Kim, Jung-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.91-98
    • /
    • 2010
  • Advances in communications and control technology, the strengthening of the Internet, and the growing recognition of the urgency to reduce the risk and production cost are motivating the development of improvements in the traditional manufacturing industry. In this paper, we developed a remote dust collector bag control system which is a combination of advanced IT and traditional dust collector based on the event. At first, we made the A/D(Analog/Digital) converter using a micro processor because the differential pressure transmission, which is a sensor of the dust collector, produces analog volt data. A/D converter can provide RS-232 communication to connect with Power Line Communication(PLC) modem. And, n-bytes message format was defined for the efficient dust collector bag information transmission from a dust collector to a user. Also, we designed the data types to model the dust collector and the dust collector bag, and they were logically modeled using XML and object-oriented modeling method. In addition to that, we implemented the system for showing the dust collector bag exchange time exactly to users at real-time using various visual user interfaces.

A Study on Automatic Generation Method of DDS Communication Class to Improve the Efficiency of Development of DDS-based Application Software (DDS 기반 응용 SW 개발의 효율성 향상을 위한 DDS 통신 클래스 자동생성 방법 연구)

  • Kim, Keun-hee;Kim, Ho-nyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.93-96
    • /
    • 2017
  • DDS (Data Distribution Serivce) communication middleware is spreading to various private sector as well as the defense sector because it can obtain a very high application effect in a complex system environment in which a plurality of data producers and data consumers are connected by a network. However, application development using DDS middleware is an inefficient structure with a lot of repetitive codes because most users perform 1: 1 mapping with the message they want to exchange. Accordingly, the user has to perform unnecessary repetitive tasks as the topic increases. Therefore, a development support tool that identifies a series of processes required for using DDS middleware and automatically generates the classes that are repeated by Topic is required. In this paper, we propose a method for DDS communication by automatically generating a common class for efficient use of DDS middleware.

  • PDF

Design and Implementation of SNS-linked Location based Mobile AR Systems using OpenAPI on Android (안드로이드 기반 OpenAPI를 이용한 SNS 연동 지역정보 서비스를 위한 모바일 증강현실 시스템 설계 및 구현)

  • Kim, Cheong-Ghil;Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • As the recent advances in network and wireless communications and semiconductor design and process technologies, our computing platform is rapidly shifting from desktop PCs to mobile devices such as UMPC (Ultra Mobile PC), Tablet PC, and Smartphone. Especially, wide-spreading Smartphones allow a new field of application based on location based services available with an user interface called augmented reality (AR). Therefore, this paper introduces an implementation of AR using various OpenAPls on Android Smartphones. In order to utilize enrich user data in real time, the system integrates with location based social network services also with OpenAPI. These APIs enable third-party developers to make use of rich contents of many portal web sites. The prototype was implemented on the real Android phone, Sky Sirius, and the result shows that it can provide an efficient location based service using AR technology without any constraints on mobile devices; in addition, it connects SNS to AR for sharing user data including photos, videos, and messages based on a specific location.

A study of real-time media streaming delivery over P2P networks (P2P 환경에서 실시간 미디어스트리밍의 전송에 관한 연구)

  • Liu Xu-dong;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.538-541
    • /
    • 2006
  • Recently researches of P2P media streaming have been actively published, but the research what kind of P2P overlay networks are better to delivering media data has not been attended. This paper designs a P2P streaming media system model. In this system, we constructs a Half-Structure P2P overlay protocol based on node's capability as the infrastructure of streaming application, which utilizes the heterogeneity of the nodes to maintain topology, presents a active contents diffusing algorithm and Two-stage search algorithm, make it possible for nodes in P2P system to collect information according their capacity and reduces the number of forwarding packet compared with flooding. Also, we give an optimal scheme to scheduling media data.

  • PDF

Delay Tolerant Network Routing Algorithm based on the Mobility Pattern of Mobile Nodes (이동 노드의 이동 패턴을 고려한 Delay Tolerant Network 라우팅 알고리즘)

  • So, Sang-Ho;Park, Man-Kyu;Park, Se-Chul;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young;Shin, Min-Su;Chang, Dae-Ig;Lee, Ho-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.13-28
    • /
    • 2009
  • Routing protocols in Delay/Disruption Tolerant Networks(DTN) are important to enhance the performance of transmission delay and delivery success ratio. In this paper, we propose an efficient DTN routing algorithm, called "Nobility Pattern based Routing(MPR)", that controls the total number of transferred message copies based on mobility patterns of mobile nodes. We consider a realistic "Levy walk" mobility pattern that has a super-diffusive property which well represents human mobility pattern. We implemented a DTN simulator using ONE simulator for the proposed MPR algorithm and Levy walk mobility pattern. Simulation results show that mobility patterns are very important for accurate evaluation of DTN routing performance, and the proposed MPR enhances the routing performance of delivery delay and success delivery ratio under realistic mobility pattern.

Verification Test for Web service of River Geospatial Information (하천공간정보 웹 서비스에 관한 검증 테스트 방안)

  • Hong, Sung Soo;Shin, Hyung Jin;Hwang, Eui Ho;Chae, Hyo Suk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.548-548
    • /
    • 2015
  • 과거 1990년대에 인터넷 이용이 전 세계로 확산되면서 World Wide Web를 이용하여 다양한 웹 서비스 기술의 구현 및 유통은 현재에도 개발되고 있다. 일반적으로 오늘날의 서비스는 XML 및 인터넷을 통하여 웹 서비스로 구현한 응용프로그램간의 연동을 가능하게 하는 기반기술이다. 이는 단순 객체 접근 프로토콜(SOAP), 웹 서비스 기술 언어(WSDL), 전역 비즈니스 레지스트리(UDDI) 등의 표준 기술을 사용하여 네트워크에 연결된 다른 컴퓨터 간의 분산 컴퓨팅을 지원하는 소프트웨어 및 기술이다. 이러한 웹 서비스의 발전으로 웹 서비스의 성능이 웹 서비스 제공자의 성패를 좌우하게 되고, 제공하고 있는 웹 서비스에 대한 검증이 필요하게 되었다. 웹 서비스에 대한 검증은 미국 Bloor NA(Bloor Research-North America)에서 웹 서비스 아키텍처의 단점을 발표하여 서비스의 품질과 신뢰성 및 개선점에 대하여 제시되어 활발한 연구가 진행 중에 있다. 그러나 사용자 관점에서 웹 서비스의 성능을 측정하고, 단순한 서비스 제공자의 서비스 검증 목적만이 아닌 서비스 제공자의 성능을 서비스 사용자에게 제공하는 검증 방법에 관한 연구가 많지 않은 실정이다. 하천공간정보에 대하여 웹 서비스 방식 중 통신 프로토콜인 HTTP 등을 이용한 인터넷상의 메시지 교환을 가능하게 하는 통신 프로토콜인 SOAP 및 WWW와 같은 분산 하이퍼미디어 시스템을 위한 소프트웨어 아키텍처의 한 형식인 REST(Representational State Transfer)를 실행하여 이에 따른 검증 프로세스를 수립하였다. 하천공간정보 웹 서비스에 대한 테스트 시나리오는 응답시간, 임계성능, 이용가능성, 신뢰성 및 접근성에 대하여 검증하며 하나 이상의 웹 서비스들 간의 호환성 표준의 준수 여부와 상호 운용 가능 여부를 테스트 하는 상호운용성 테스트, 신뢰성 메시징 및 분산 환경에서의 트랜잭션 처리 성능을 검증하는 웹 서비스 프로세스 품질 테스트를 실시하는 방안을 도출하고자 한다.

  • PDF

A Study on 5G-based Text Alert Service Requirements and Scenarios for Realizing Active Geo-Targeting (능동적 Geo-Targeting을 위한 5G 기반의 긴급재난문자 서비스 요구사항 및 시나리오 연구)

  • Lee, Tae-Gyeom;Kang, Seung-Woo;Kim, Yewon;Oh, Seung-Hee;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.23-30
    • /
    • 2021
  • Due to the recent advancements of mobile telecommunication technology and high mobile phone penetration rate, researches on emergency text alert service for enhancing the accessibility have been actively conducted. The worldwide spread of COVID-19 further accelerates the efforts for the alert services. Existing emergency text services are simple and efficient. However, unclear reception area may cause unintended alert messages frequently. In this paper, we analyze survey results regarding the 5G-based text-alert services to derive service requirements for technological advancement. Then we propose an emergency disaster text service scenario using Active Geo-Targeting that enables active disaster text reception of terminals. In addition, we newly define an interface protocol that is CIB(Control Information Block) to operate the proposed scenario.

Female College Students' Perception on Cervical Cancer, HPV Vaccine, HPV Vaccine Campaign (여대생들의 자궁경부암 및 자궁경부암 예방접종 캠페인에 대한 인식)

  • Jang, Ahnlee;Kim, YooJung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.586-597
    • /
    • 2021
  • The purpose of the study is to investigate how females in the 2nd vaccination group(that is, women between the ages of 14-26) perceive cervical cancer, HPV vaccine, and the current campaign on HPV vaccine. In-depth interviews with 19 female college students between the ages of 20-26 revealed that the participants perceive the cervical cancer and vaccine as unimportant due to limited information; they were exposed to related information at random and there were lack of important information; and information provided were viewed as gender-biased. Moreover, social taboo-ness, cost and fear of its side-effects were found to influence women from getting vaccinated. Results show that participants want more fact-based and practical information, information that includes peers and men, as well as a campaign that has more frequent contact and accessibility. Findings of the study can be used for HPV prevention education in the future targeting women between the ages of 13-35. The study provides suggestion for future research and changes needed in HPV vaccine campaigns.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.