• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.026 seconds

Routing Protocols for VANETs: An Approach based on Genetic Algorithms

  • Wille, Emilio C. G.;Del Monego, Hermes I.;Coutinho, Bruno V.;Basilio, Giovanna G.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.542-558
    • /
    • 2016
  • Vehicular Ad Hoc Networks (VANETs) are self-configuring networks where the nodes are vehicles equipped with wireless communication technologies. In such networks, limitation of signal coverage and fast topology changes impose difficulties to the proper functioning of the routing protocols. Traditional Mobile Ad Hoc Networks (MANET) routing protocols lose their performance, when communicating between vehicles, compromising information exchange. Obviously, most applications critically rely on routing protocols. Thus, in this work, we propose a methodology for investigating the performance of well-established protocols for MANETs in the VANET arena and, at the same time, we introduce a routing protocol, called Genetic Network Protocol (G-NET). It is based in part on Dynamic Source Routing Protocol (DSR) and on the use of Genetic Algorithms (GAs) for maintenance and route optimization. As G-NET update routes periodically, this work investigates its performance compared to DSR and Ad Hoc on demand Distance Vector (AODV). For more realistic simulation of vehicle movement in urban environments, an analysis was performed by using the VanetMobiSim mobility generator and the Network Simulator (NS-3). Experiments were conducted with different number of vehicles and the results show that, despite the increased routing overhead with respect to DSR, G-NET is better than AODV and provides comparable data delivery rate to the other protocols in the analyzed scenarios.

A New Distributed Conference System Architecture using Extended CCMP in SIP Environment (SIP 환경에서 확장 CCMP를 사용한 새로운 분산 컨퍼런스 시스템 구조)

  • Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2252-2258
    • /
    • 2016
  • CCMP(centralized conferencing manipulation protocol) enables adding and removing conference participants, changing their roles, adding and removing media streams in conference system. In this paper, by using extended CCMP, a new distributed conference system architecture which can be used to multiple servers distributed conference system in SIP(session initiation protocol) environment has been presented. In this study, according to increasing number of participants, a new extended CCMP architecture which can distribute conference system loads to multiple servers dynamically to decrease loads of servers has been designed. This extended CCMP architecture also can add dynamically new servers from the prepared servers pool. Furthermore, new conference information data format which can represent extended CCMP has been designed, and exchange procedures of extended CCMP control messages which can distribute loads between servers have also been presented. The performance of the proposed system has been analysed by simulation.

TDMA based Multi-channel MAC Protocol for Improving Channel Efficiency in Wireless Ad Hoc Networks (무선 애드혹 네트워크에서 채널 효율성 향상을 위한 TDMA 기반의 멀티채널 MAC 프로토콜)

  • Kim, Jun-Ho;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.153-164
    • /
    • 2010
  • In this paper, we propose a multi-channel MAC protocol to improve the channel efficiency and network performance in wireless ad hoc networks. There are two main problems encountered in designing multi-channel MAC protocols. The first problem is the rendezvous problem and the second is multi-channel hidden node problem. In order to solve these problems, most of previous researches that have considered multi-channel MAC protocols use a common control channel to exchange control packets. However, they have a bottleneck problem at common control channel as increasing the number of data channels. The proposed MAC protocol solves the multi-channel hidden node problem using a TDMA scheme and increases the network throughput because transmitting and receiving data at the same time is possible. Also, since there is no common control channel, the network does not suffer from the common control channel saturation problem. Moreover, it achieves energy savings by allowing nodes that are not involved in communication to go into sleep mode. Simulation results show that the proposed MAC protocol improves the network throughput and channel efficiency and provides energy savings.

A MAC Protocol Based on Adaptive Timeout for Energy Efficient Wireless Sensor Networks (에너지 효율적인 무선 센서 네트워크를 위한 적응형 Timeout 기반 MAC 프로토콜)

  • Kwon, Yong-Hun;Kong, In-Yeup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.890-893
    • /
    • 2010
  • In wireless sensor networks, each node generally uses a battery because it is hard to replace or charge. For this reason, study for life time prolongation of each node within the limited energy source has become an important issue. So many ways are suggested to minimize the energy consumption for each node, especially energy efficient MAC protocols have been studied actively. T-MAC of contention based MAC protocol is that added the adaptability on fixed duty cycle of S-MAC. T-MAC allocates the fixed timeout before each node goes to sleep mode from active mode. If no data exchanged in a timeout, each node goes to sleep mode. Because of the timeout is always fixed, the absence of data exchange in a timeout will cause unnecessary energy consumption. In this paper, in order to improve the energy efficiency, we propose a MAC protocol based on adaptive timeout that analyze the probability of the timeout, and provides the modified timeout.

  • PDF

Economic analysis of integrated data analysis at variety marine protocols (다양한 해양 프로토콜의 분류 및 통합 데이터를 분석한 독립서버에 대한 경제적 분석)

  • Jang, Hyun-Young;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.243-246
    • /
    • 2016
  • Data transfer technique is one of the key elements of the IT infrastructure, in accordance with each environment and function, using some kind of protocol. Using the three protocols such as WCDMA, AIS, and TRS at sea IT industry. so It uses three protocols saw has a problem that the operation of each protocol-specific server. so server maintenance costs increase and sea Device Manager has been placed in a situation which operates to develop each of the protocol-specific analysis program. The reason of the protocol is divided into three, marine equipment (lighthouses, buoys, light buoy) manufacturing companies and the date of manufacture, such as, communication environment (distance, communication speed) because such is wrong all, trying to unify this and enormous cost and time is a situation that can not be the exchange occurred when. So in the Ministry of Maritime Affairs and Fisheries, the number of frequency of use is low, communication performance is seeking to refrain from Kure each local organizations and companies the use of low TRS protocol. his paper is intended to conduct research on the basis of the actual data to analyze whether the method is how economical to store a single DB by analyzing other types of protocols. This reduces the shortage of marine IT industry, even a little, shall helps reduce administrative costs.

  • PDF

Design and Implementation of EAI(Enterprise Application Integration) System for Privacy Information (개인정보 보호를 위한 EAI 시스템 설계 및 구현)

  • Kim, Yong Deok;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2013
  • This paper describes the design and implementation of the PKI-based EAI system which is used for delivery of sensitive personal information between business systems. For this purpose, we propose a key exchange protocol with some key process : Diffie-Hellman Schema is used to provide forward secrecy, public key-based digital signature is used for EAI Server authentication, data integrity. In addition, in order to minimize the performance impact on the overall EAI systems. The EAI server was designed simply to be used only as a gateway. This paper shows the implementation of Korea public key authentication algorithm standard and a symmetric encryption algorithm for data encryption.

A Research and development of healthcare gateway for international standards that support a WiBro / WiMAX (WiBro/WiMAX 지원 국제표준 헬스케어 게이트웨이 연구 개발)

  • Lee, Jeong-Gi;Kim, Kuk-Se;Kim, Choong-Won;Ahn, Seong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3020-3028
    • /
    • 2014
  • In the present study, A protocol gateway between agent is designed by using an optimized protocol for the exchange of ISO / IEEE 11073-20601 in order to compensate the disadvantage of the existing gateway and a international standard healthcare set-top. The gate way was designed to smooth data transmission to overcoming the geographical limits of the service and to enable data transfer on emergency vehicle and the mountain area.

Analysis of Performance and IKEv2 Authentication Exchange model in Mobile IPv6 Network (MIPv6망에서 IKEv2 인증 교환 모텔 및 성능 분석)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Kim, Dong-Kook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1085-1091
    • /
    • 2006
  • For an experiment in this paper, designed test bed to secure confidentiality of data and safe transmission that Mobile node exchanges in Mobile network. And, For IPsec use that support basically in MIPv6, modeling and experimented IKEv2 protocol that is used for reliable authentication key management and distribution between End Point. When Mobile node handoff in Mobile network, analyzed effect that authentication key re-exchange and limited bandwidth that happen often get in key exchange. And studied about Performance and latency about authentication setting and exchange process that use multi interface. To conclusion, when Mobile node transmits using IPSec, re-authentication of key confirmed that re-setting by limit of bandwidth that existent Mobile network has can be impossible. According to other result, proposed MN's multi interface is expected to minimise key exchange latency by hand-off when transmit IPSec.

Study on Energy Efficient Mobility-MAC Protocol for Underwater Networks (수중통신망에서 노드 이동성을 고려한 에너지 효율적인 매체접속제어 프로토콜 연구)

  • Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Due to difficulties of continuous electric power provision to underwater communication nodes, the efficient power usage is highly required in underwater network protocol. In this paper, we studied the energy efficient MAC(Medium Access Control) protocol for underwater network supporting mobile nodes such as UUV(Unmanned Underwater Vehicle) and AUV(Autonomous Underwater Vehicle). The mobile nodes could waste the electric power in vain when the receiver moves out of the radio propagation coverage during the data exchange and thus the transmitted data fails in reaching the receiver. Expecially, such a failure is much more obvious in underwater acoustic channels since the propagation delay is about $10^5$ times slower than in terrestrial radio channels. This proposed mobility-MAC controls the data dropping stochastically in the Dropping Zone by considering the receiver's location and moving velocity. In conclusion, this selective dropping method not only improves latency and throughput by reducing invalid droppings but also boosts power efficiency by valid droppings.

Implementation of Security Plan from .NET Remoting Environment (닷넷 리모팅 환경에서의 보안 방안 구현)

  • Kim, Young-Sear
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.256-261
    • /
    • 2009
  • While .NET and J2EE bisects recent distributed environment, .NET displays "Remoting" as a technology to call remote object. Remoting is frequently used as a protocol in OLTP's WEB program development in form of RPC that exchange data in XML form under HTTP environment. Purpose of this research is to draw problems when applying security to .NET remoting technology that is recently used in web programming, and to find effective application plan by implementing. The main discussion is following. First, network layer security should be replaced to application layer security for better performance and flexibility. Second, the serialization procedure that is repeated in both remoting and encryption module should take place once. Lastly, implementation of "Surrogate" and "Compress" will be discussed that enables to eliminate unnecessary data(table relations, keys, etc) that is used in dataset object of .NET in order to reduce the size of data. It is possible to achieve improvement in speed by two times through immediate implementation in these cases. In order for easier use, component based framework should be supplied hereafter.

  • PDF