• Title/Summary/Keyword: Data Transfer Protocol

Search Result 346, Processing Time 0.026 seconds

Adaptive Error Control Based on Traffic Type and Channel Error Rate in Wireless ATM (무선 ATM에서의 트래픽 형태 및 채널 오율에 기반한 적응 오류 제어)

  • 김영웅;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1532-1538
    • /
    • 1999
  • In general, because error rate of wireless link is higher than that of wired link, DLC layer protocol for wired network with low error rate is not proper for wireless environments. In addition, the conventional DLC layer protocol for wireless network is optimized for the low-speed data service, so it is difficult to use conventional DLC protocol in the current mobile communication environments handing high-speed and multimedia services. Therefore, a DLC layer protocol that is suitable to current wireless communication environments is required. In this paper, we propose a novel error control scheme that supports a variety of traffic attribute and is applicable to high-speed and multimedia data service in WATM. The proposed scheme provides enhanced throughput performance for real-time traffic by using modified ASR ARQ without ACK and reduces loss rate by using FEC in the case of high error condition. Also, for non real-time traffic, the use of ASR ARQ without ACK enhances throughput performance and delay time is decreased by using FEC in the case of high error rate channel. As a result of simulation, the proposed scheme has better performance than conventional ASR ARQ protocol in view of delay and throughput.

  • PDF

A Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment

  • Byun, Byung-Kil;Lee, Ki-Young
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.187-192
    • /
    • 2011
  • Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal authentication are examined. And we propose new system model which uses our novel user authentication protocol based on strong one-time password (OTP) and short message service (SMS). We verify our system model and protocol by implementation.

Routing Protocol for Link Reliability Improvement in ad hoc network (애드 혹 네트워크에서의 연결 신뢰성 향상 라우팅)

  • Seo, Soon-Young;Koo, Young-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.25-31
    • /
    • 2006
  • According to the development of a mobile node and the increase of number of its users, the demands for connecting to the networks beyond the spaces through the existing wire or wireless communications have abruptly been increasing, which not only allows the ad hoc networks to be developed actively but also makes us consider the routing policy to transfer data safely. In this thesis, the routing protocol to send data stably by improving the route stability in the ad hoc networks is proposed, and its performance is analyzed through the simulations.

  • PDF

The Development of Industrial Communication Monitoring Board using AVR (AVR을 이용한 산업용 통신 모니터링 보드 개발)

  • Eum, Sang-hee;Lee, Byong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1177-1182
    • /
    • 2016
  • The most industrial instruments for monitoring and control are occurring the extension problem and the external protocol compatibility. In this paper, we developed the boards for the industrial communication monitoring that are able to convert the protocol in various communication between devices and instruments. These are consisted the main board and several sub-board. They can have extension using the main board connection. The sub-board support the each communication method or data transfer. The main board was used the Atmega 2560 Microprocessor of AVR series, and the sub-boards are have the Atmega 256 or Atmega 128 in the AVR series. We have designed to connect the sub-board using placed the 4 RS485 serial slots in the main board. The sub-boards were developed to support the analog and digital I/O. These are able to have monitoring by CAN and Ethernet communication. The experimental results, we obtained good data transfer rate and conversion rate.

A Buffer-based Video Quality Control Scheme for HTTP Adaptive Streaming in Long-Delay Networks (높은 지연을 갖는 네트워크에서 HTTP 적응적 스트리밍을 위한 버퍼 기반의 비디오 품질 조절 기법)

  • Park, Jiwoo;Kim, Dongchil;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.824-831
    • /
    • 2014
  • HTTP (Hypertext Transfer Protocol) Adaptive Streaming is gaining attention because it changes bitrates to adapt changing network conditions. Since HAS (HTTP Adaptive Streaming) client downloads the video data based on TCP (Transmission Control Protocol), it estimates incorrectly the available bandwidth and leads to an unnecessary video quality change in long-delay networks. In this paper, we propose a buffer-based quality control scheme in order to improve the service quality and smooth playback in the HAS. The proposed scheme estimates accurately the available bandwidth based on a modified streaming model that considers network delay. It also calculates the sustainability of the video quality to prevent an unnecessary quality change and determines the inter-request time on the basis of the buffer status. Through the simulation, we prove that our scheme improves the QoS (Quality of Service) of the HAS service and controls the video quality smoothly in long-delay networks.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

The Web Viewer System Development of Real-Time Patient Monitering using HL7(Healthy Level Seven) Protocol (HL7(Healthy Level Seven) 프로토콜을 이용한 실시간 환자 모니터링 웹 뷰어시스템 개발)

  • Kim, Gwang-Jun;Lim, Se-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.546-555
    • /
    • 2009
  • HL7 is well-known standard protocol for text data generated in hospital information systems. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In this paper, we have to design to obtain useful vital sign information, which is generated at data receiver modulor of HIS, that is offered by the central monitor. Vital sign informations of central monitor is composed of the row data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. It is able to apply to remote medical examination and treatment. we proposed integration method between vital sign database systems and hospital information systems. Through the proper exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

THE DESIGN OF NETWORK MODEL FOR THE IMPLEMENTATION OF e-VLBI (e-VLBI 구현을 위한 네트워크 모델 설계)

  • Song, Min-Gyu;Byun, Do-Young;Kim, Hyun-Goo;Oh, Se-Jin;Han, Seog-Tae;Roh, Duk-Gyoo;Lee, Bo-Ahn
    • Publications of The Korean Astronomical Society
    • /
    • v.20 no.1 s.24
    • /
    • pp.63-71
    • /
    • 2005
  • e-VLBI was invented to enhance the efficiency of VLBI (Very-Long-Baseline Interferometry) system by transmitting the data via high speed network. Korean VLBI Network (KVN) has a plan to construct e-VLBI system named e-KVN. High speed backbone network and efficient network model are essential to implement successful e-VLBI system. This paper introduces a network model based on PC cluster technology. The present status of high speed backbone network in Korea is overviewed. We suggest that the network link via Korea Advanced Research Network (KOREN) is one of feasible way for e-KVN. We also describe the principles of e-VLBI and protocol for network transmission such as VSI-E (VLBI Standard Interface - Electronic), RTP (Real-Time Transport Protocol) and RTCP (Real-Time Transport Control protocol).

Analysis of Flow and Congestion control in USN (USN의 전송 계층 프로토콜에서 에러 및 흐름제어의 성능 평가)

  • Cha, Hyun-Soo;Kang, Chul-Kun;Yoo, Seung-Wha;Kim, Ki-Hyung
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.45-50
    • /
    • 2008
  • Many applications of sensor network require connection to the Internet. The transmission protocol of traditional sensor network was designed within the sensor network itself. However, based on 6LoWPAN which can be accessed using IPv6, direct connection is possible between the sensor network and the TCP/IP network outside. Transmission of data in applications of sensor network falls into two main categories. One is a small packet that is periodically produced such as packet related to temperature and humidity. The other is a relatively large packet that brings about network overheads such as images. We investigated the conformance test and pros and cons of application data over the transmission protocol of Zigbee and 6LoWPAN. As a result, both Zigbee and 6LoWPAN have shown low rate of loss for periodic data and have in creased reliability of data transfer. When transmitting streaming image data, both ACK, non ACK mode of Zigbee and UDP of 6LoWPAN minimized transmission time but suffered the consequences of high packet loss. Even though TCP of 6LoWPAN required a long transmission time, we were able to confirm that no loss has occurred.

  • PDF

Multiple Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network (Ad Hoc 네트워크 라우팅 보안을 위한 다중경로 기반의 MP-SAR 프로토콜)

  • Han, In-Sung;Ryou, Hwang-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.260-267
    • /
    • 2008
  • As pervious the SAR(Security Aware Routing)[10] protocol is an secure Ad Hoc network protocol that finds a secure path, it is the security routing protocol that uses the security level of nodes as the routing information. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV[6], it will cause transmission delay as researching of security routing path. when a node is out of the data transmission range as its battery dying or movement. Although it is possible to connection of nodes because a characteristic of the SAR protocol, the connection is not easy to reconnect when the security level of intermediate node is lower than the level requested by a source node. In this paper, we suggest the MP-SAR based on the SAR to solve the SAR protocol's problem. The MP-SAR seeks multiple secure path for maintenance of data confidentiality using the expanded secure path detection techniques based on the SAR. It can transfer data quickly and reliably by using the shortest efficient path among multiple paths. In the research result, we proved a outstanding performance of MP-SAR than the previous SAR through comparison and analysis.