• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.027 seconds

Multiple Conference Servers Architecture using Extended Control Channel Framework (확장 제어 채널 프레임워크를 사용한 다중 컨퍼런스 서버 구조)

  • Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1335-1341
    • /
    • 2017
  • In this paper, a new architecture of multiple conference servers which use extended control channel framework in SIP(session initiation protocol) session has been presented. For this purpose, in this study, a new extended control channel framework architecture which can distribute total conference system loads to multiple servers effectively has been presented. In the implementation, extended control channels have been connected by using SIP sessions that was established between each conference servers, and extended control channel messages which can be transferred through control channels have been designed in this study. These extended control channel messages can distribute system load effectively between multiple conference servers, and conference information data format that can represent extended control channel framework has also been designed. Furthermore, exchange procedures of extended control channel messages have also been presented. The performance of the proposed system has been analysed by simulation. The analysis results show that average SIP messages delay time and average media stream delay time have improved.

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Optimization Routing Protocol based on the Location, and Distance information of Sensor Nodes (센서 노드의 위치와 거리 정보를 기반으로 전송 경로를 최적화하는 라우팅 프로토콜)

  • Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.127-133
    • /
    • 2015
  • In order for location information to deliver the collected information, it needs Sensor Nodes in an environment of Sensor Network. Each sensor sends data to a base station through the process of routing in a wireless sensor network environment. Therefore, Offering accurate location information is very important in a wireless sensor network environment. Most of existed routing methods save all the informations of nodes at the area of 1-hop. In order to save these informations, unnecessary wasted energy and traffics are generated. Routing Protocol proposed in this paper doesn't save node's location information, and doesn't exchange any periodic location information to reduce wasted energy. It includes transmission range of source nodes and nodes with the location information, however it doesn't include any nodes' routing near 1-hope distance.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

SANETconf: an IP configuration protocol for a shipborne ad-hoc network (SANET) (SANETconf: 선박 애드혹 네트워크를 위한 IP 할당 프로토콜)

  • Yun, Changho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.179-192
    • /
    • 2019
  • Additional frequencies are allocated in maritime digital data exchange to alleviate overload of the VHF data link. The shipborne ad-hoc network (SANET) for this frequencies was subsequently proposed, which provides various IP-based services to ships on behalf of satellite communications. In SANET, a ship should determine its own IP address to achieve IP connectivity to the shore. Accordingly, this paper proposes a SANET configuration (SANETconf) protocol as an IP configuration protocol. SANETconf propagates non-overlapping IP addresses across the network from the shore to ships. A ship obtains its IP address by exchanging Request and Response messages with its neighbors. Therefore, SANETconf eliminates the process of DAD and managing the movement of ships. Extensive simulations were performed to verify the applicability of SANETconf. Based on results, 85% of the ships can determine their own IP address within one frame. Also, SANETconf has a high resource efficiency by using 0.024 percent of resources for IP configuration.

A Study on the Acquisition of Usage Statistics based on SUSHI Project (SUSHI 기반 학술정보 이용통계 수집 모델 연구)

  • Kim, Sun-Tae;Lim, seok-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.35-39
    • /
    • 2007
  • Recently Usage statistics are widely available from online content providers. However. the statistics are not yet available in a consistent data container and the administrative cost of individual provider-by-provider downloads is high. The Standardized Usage Statistics Harvesting Initiative (SUSHI) is developing an automated request and response protocol for moving Project COUNTER (Counting Online Usage of Networked Electronic Resources) Code of Practice usage statistics from providers to library electronic repositories. SUSHI will help libraries make better decisions by reducing the administrative overhead of using Project COUNTER statistics. Publishers in the recording and exchange of usage statistics for electronic resources, initially journals and databases. By following COUNTER's Code of Practice, vendors can provide library customers with Excel or CSV (comma delimited) files of usage data using COUNTER's standardized formats and data elements. The result is a consistent, credible, and compatible set of usage data from multiple content providers. On this study, We propose the acquisition model of usage data based on SUSHI for KESLI that is overseas electronic journal consortium in korea.

  • PDF

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.

Adaptive Packet Transmission Scheme for Exchanging Information between Endpoints in DDS Middleware (DDS 미들웨어에서 단말개체 간 정보교환을 위한 적응형 패킷 전송 기법)

  • Ahn, Sung-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.110-113
    • /
    • 2012
  • DDS middleware transmits data packets through unicast or multicast method for discovering endpoints on a distributed network and exchanging information between endpoints. Depending on the communicating situation between endpoints, the transmission method which is used to exchange packets is already defined by the standard protocol. However, the predefined usage of the transmission method has a problem that the middleware does not deal with increasing usage of the system resources properly when the configuration of endpoint is changed dynamically. To solve this problem, we propose the scheme of selecting the packet transmission method in an adaptive manner.

  • PDF

SELFCON: An Architecture for Self-Configuration of Networks

  • Boutaba, Raouf;Omari, Salima;Singh Virk, Ajay Pal
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.317-323
    • /
    • 2001
  • Traditional configuration management involves complex labor-intensive processes performed by experts. The configuration tasks such as installing or reconfiguring a system, provisioning network services and allocating resources typically involve a large number of activities involving multiple network elements. The network elements may be associated with proprietary configuration management instrumentation and may also be spread across heterogeneous network domains thereby increasing the complexity of configuration management. This paper introduces an architecture for the self-configuration of networks (SELFCON). The proposed architecture involves a directory server, which is uses to maintain configuration information. The configuration information stared in the directory server is modeled using the standard DEN specification thereby allowing effective exchange of network, system and configuration management data among heterogeneous management domains. SELFCON associates configuration intelligence with the components of the network, rather than limit it to a centralized management station. The network elements are notified about related changes in configuration policies, based upon which, they perform self-configuration. SELFCON is able to provide automation of configuration management and also an effective unifying framework for enterprise management.

  • PDF

Design and Implementation of Video Conference System Using Hybrid Type P2P (하이브리드형 P2P를 이용한 화상회의 시스템의 설계 및 구현)

  • Kim Hyen-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.21-28
    • /
    • 2006
  • This paper describes the design and implementation of video conference system using hybrid type P2P(Peer to Peer). The proposed video conference system has hybrid type P2P architecture based on a client-server and P2P(Peer to Peer), where client-server is used for exchange of account management, client list and status information and P2P is used for the real time video conference. The proposed video conference system decreases the traffic of server, and cuts down the load of a network. Because the multimedia data is decentralized to client by P2P. Also, this system is tested by the multi-party video conference system using communication protocol and application software through high speed networks.

  • PDF