• Title/Summary/Keyword: Broadcast protocol

Search Result 303, Processing Time 0.024 seconds

A Research on streaming protocol for User-Created Contents in Digital Cable Broadcasting environment (디지털 케이블 방송 환경에서 개인 미디어를 위한 스트리밍 프로토콜 연구)

  • Kim, Seong-Won;Kim, Jung-Hwan;Si, Jang-Hyun;Jung, Moon-Ryul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.239-244
    • /
    • 2006
  • 최근 인터넷에서 많은 관심을 보이고 있는 개인 미디어(UCC;User Created, Contents, VC2;Viewer Created Contents, 이하 UCC-사용자가 직접 제작한 미디어 콘텐츠를 불특정 다수에게 제공하는 서비스) 중에 비디오/오디오 콘텐츠를 영상 콘텐츠의 기본적인 매체라 할 수 있는 TV상에서 직접 즐길 수 있다면 미디어의 대상과 그 미디어의 Entertainment적인 효과는 배가될 것이다. 디지털 케이블 방송에서 UCC와 같은 다양하고 많은 미디어 콘텐츠를 디지털 TV상에서 서비스를 하고자 한다면 현재의 OCAP(OpenCable Application Plat form)기반에서는 RVOD(Real Video on Demand)와 동일한 서비스 모델을 가져야 하는 부담과 UCC 제공을 위한 방송 플랫폼별 인터페이스가 필요할 것이다. 이러한 문제점을 Return Path를 통한 RTP(Real-time Transport Protocol;RFC1889)을 이용해서 기존의 VoD(Video on Demand)스트림의 대역에서 분리하고 별도의 VOD프로토콜을 구현함으로써 라이브 방송환경과 동일한 인프라의 지속적인 확장보다는 일반적인 네트워크 프로토콜을 이용하여 VoD서비스를 위한 인프라에 많은 영향을 받지 않는 서비스가 가능할 수 있을 것이다. 따라서 본 논문에서는 RTP를 위한 Set-Top-Box상의 다운로드 가능한 구조의 클래스 분석과 클라이언트 대응의 UCC Transcoding 및 전송을 위한 스트리밍 서버의 설계에 중점을 두고 경량화 된 VOD서비스 및 시스템을 설계함으로써 방송환경 하에 On-Demand서비스의 효율적인 확장성과 보다 많은 콘텐츠 등록 및 활용의 기회를 가져올 수 있을 것으로 기대한다.

  • PDF

Verifier-Based Multi-Party Password-Authenticated Key Exchange for Secure Content Transmission (그룹 사용자간 안전한 콘텐츠 전송을 위한 검증자를 이용한 패스워드 기반 다자간 키 교환 프로토콜)

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Choi, Jae-Tark;Lee, Dong-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.251-260
    • /
    • 2008
  • In this paper, we present two verifier-based multi-party PAKE (password-authenticated key exchange) protocols. The shared key can be used for secure content transmission. The suggested protocols are secure against server compromise attacks. Our first protocol is designed to provide forward secrecy and security against known-key attacks. The second protocol is designed to additionally provide key secrecy against the server which means that even the server can not know the session keys of the users of a group. The suggested protocols have a constant number of rounds are provably secure in the standard model. To the best of our knowledge, the proposed protocols are the first secure multi-party PAKE protocols against server compromise attacks in the literature.

Improvement of OLSR Through MIMC's Decreased Overhead in MANET (모바일 애드 혹 네트워크 환경 하에서 멀티인터페이스 멀티채널의 오버헤드 감소를 통한 OLSR의 성능 개선)

  • Jang, Jae-young;Kim, Jung-ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.3
    • /
    • pp.55-70
    • /
    • 2016
  • The most critical research issue in MANET environment is on supporting reliable communication between various devices. Various Multi-Hop Routing Protocol studies have proceeded. However, some problems you might have found when you use the existing link state routing technique are that it increases Control Message Overhead and it is unstable when node moves in CR circumstance which has transformation of using channel and MIMC circumstance which uses a number of interfaces. This essay offers a technique which is based on On-Demand Hello and the other technique which used Broadcast Interface of optimization as a solution to decrease Control Message Overhead. Also it proposes Quick Route Restoration technique which is utilized by GPS and MPR Selection technique which consider mobility as a solution of stable communication when node moves. Those offered Routing Protocol and OPNET based simulator result will be expected to be an excellent comparison in related research fields.

Design of the Energy Efficient Virtual Backbone Construction in the Zigbee Network (지그비 네트워크에서 효율적인 에너지 관리를 위한 가상 백본 설계)

  • Kim, Bo-Nam;Lee, Jin-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2413-2418
    • /
    • 2007
  • IN wireless sensor networks (WSNs), one challenging issue is to In wireless sensor networks (WSNs), one challenging issue is to construct a virtual backbone in a distributed and localized way while considering energy limitation. Dominating set has been used extensively as core or virtual backbone in WSNs for the purposes like routing and message broadcast. To ensure network performance, a good dominating set construction protocols should be simple and avoid introducing extra message. In addition, the resulting dominating set should be small, connected, and take into account the energy level at each node. This paper studies efficient and simple virtual backbone construction protocol using defer time in IEEE 802.15.4- based WSNs (e.g. Zigbee). The efficiency of our proposed protocol is confirmed through simulation results.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

Optimistic Concurrency Control Using Time-stamp Ordering in Mobile Databases (이동 데이터베이스 시스템에서 타임스탬프를 이용한 낙관적 동시성 제어 기법)

  • Kim Dae-Ho;Jeong Byeong-Soo;Lee Young-Koo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.79-90
    • /
    • 2006
  • Data broadcasting is an efficient method for disseminating data, and is widely accepted in the database applications of mobile computing environments because of its asymmetric communication bandwidth between a server and mobile clients. This requires new types of concurrency control mechanism to support mobile transactions executed in the mobile clients, which have low-bandwidths toward the server. In this paper, we propose an OCC/DTA (Optimistic Concurrency Control with Dynamic Time-stamp Adjustment) protocol that can be efficiently adapted to mobile computing environments. The protocol reduces communication overhead by using client-side validation procedure and enhances transaction throughput by adjusting serialization order without violating transaction semantics. We show that the proposed protocol satisfies data consistency requirements, and simulate that this protocol can improve the performance of mobile transactions in data broadcasting environments.

  • PDF

Dynamic Source Multi-path Routing Protocol for Wireless Ad-hoc Network Environments (무선 에드-혹 네트워크 환경을 위한 동적다중경로라우팅 프로토콜)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.336-346
    • /
    • 2001
  • A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastnlcture or centralized administration. Currently, numerous routing protocols have been developed for changing messages between nodes in a wireless ad-hoc network. Applications of wireless ad-hoc network technology are various and proper routing protocol must be used according to application domain or network size. In a wireless ad-hoc network. some hosts want services from fixed networks. For supporting such services, it is necessary to interconnect wireless ad-hoc networks and fixed networks. The DSMIHDynamic Source Multipath Routing) protocol, proposed in this paper, focuses on supporting seamless communication services between the nodes within a wireless ad-hoc network and providing fixed networks to the mobile hosts in wireless an-hoc networks. In DSMR protocol, each node need not broadcast routing messages periodically. and mobile hosts that to send data packets initiate route request and route establishment procedure. By maintaining multiple paths in each node. faster route re-establishment is also possible in our scheme.

  • PDF

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

An EIBS Algorithm for Wireless Sensor Network with Life Time Prolongation (수명 연장 기능의 무선 센서 네트워크용 EIBS 알고리즘)

  • Bae, Shi-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.65-73
    • /
    • 2014
  • Since Time synchronization is also critical in Wireless Sensor Networks (WSN) like other networks, a time synchronization protocol for WSN called IBS(Indirect-Broadcast Synchronization) has been already proposed in 2012. As IBS operates in cluster tree topology, network lifetime may be mainly shortened by cluster head node[s], which usually consumes more power than cluster member (i.e. non-cluster head) nodes. In this paper, I propose enhanced version of IBS (called EIBS) which saves overall energy and prolongs network lifetime by re-constructing partial cluster tree locally. Compared with other tree construction approaches, this tree reconstruction algorithm is not only simpler, but also more efficient in the light of overall power consumption and network lifetime.

Improvement of Anti-collision Algorithm for RF Air-Interface Protocol (무선통신 프로토콜의 충돌방지 알고리즘 개선)

  • Lim, Jung-Hyun;Lee, Kwoun-Ig;Yang, Doo-Yeong;Kim, Heung-Soo;Ko, Jae-Kweon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.97-100
    • /
    • 2007
  • 본 논문은 유비쿼터스 센서 네트워크와 텔레매틱스 서비스에 사용되는 무선 환경 프로토콜 표준 중 UHF 대역 프로토콜인 EPCglobal의 Class 1 Gen 1, Class 1 Gen 2의 에어인터페이스를 분석하고 각 프로토콜에서 규정된 충돌방지 알고리즘을 구현하였다. 그리고 각 프로토콜에서 규정하는 충돌방지 알고리즘의 성능을 개선한 알고리즘을 제안하고 성능을 비교하였다. 개선된 알고리즘과 표준 알고리즘의 성능 시뮬레이션 결과 개선된 Class 1 Gen 1 알고리즘은 태그 수 100개 일 때 54.5%, 태그 수 1000개 일 때 63.4% 감소하였다. 개선된 Class 1 Gen 2 알고리즘은 태그 수 100개 일 때 7.9%, 태그 수 1000개 일 때 11.7% 감소하였다. 개선된 충돌방지 알고리즘은 표준 알고리즘보다 태그 인식 성능이 상당히 개선됨을 알 수 있다. 따라서 개선된 충돌방지 알고리즘은 유비쿼터스 센서 네트워크와 텔레매틱스 서비스 등에 사용되는 무선인식 시스템의 성능 개선방안으로 적용될 수 있다.

  • PDF