• Title/Summary/Keyword: Data Transfer Protocol

Search Result 346, Processing Time 0.024 seconds

Design and Implementation of Data Protocol for Environmental Information Monitoring in Wired and Wireless Networks (유무선 통신망에서 운용 가능한 환경정보 모니터링 데이터 프로토콜 설계 및 구현)

  • Ye, Seoung-Bin;Ceong, Hee-Taek;Han, Soon-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.312-320
    • /
    • 2010
  • Most online monitoring systems of running currently based on the wired network and local area wireless network generate an increase of administrative costs such as synchronization of data protocol conversion, flexible operation of measurement devices and maintenance. To solve this problem, this paper proposes the SMS data transmission protocol which allows multiple data collecting device to manage effectively including implementation method of cdma-based environmental information monitoring system. Also this paper shows operational safety of the proposed protocol and analyzes efficiency of data transfer and operating using SMS.

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Ra In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1055-1059
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts the acquisited sensing data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In his paper, we proposes a reliable congestion protocol, called HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

On Concealing Data-Path Against Eavesdropping in Wireless Networks (무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.433-438
    • /
    • 2020
  • Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols

  • Won, Chul-Ho;Lee, Ben;Park, Kyoung;Kim, Myung-Joon
    • Journal of Information Processing Systems
    • /
    • v.4 no.4
    • /
    • pp.133-144
    • /
    • 2008
  • Clusters have become a popular alternative for building high-performance parallel computing systems. Today's high-performance system area network (SAN) protocols such as VIA and IBA significantly reduce user-to-user communication latency by implementing protocol stacks outside of operating system kernel. However, emerging parallel applications require a significant improvement in communication latency. Since the time required for transferring data between host memory and network interface (NI) make up a large portion of overall communication latency, the reduction of data transfer time is crucial for achieving low-latency communication. In this paper, Eager Data Transfer (EDT) mechanism is proposed to reduce the time for data transfers between the host and network interface. The EDT employs cache coherence interface hardware to directly transfer data between the host and NI. An EDT-based network interface was modeled and simulated on the Linux-based, complete system simulation environment, Linux/SimOS. Our simulation results show that the EDT approach significantly reduces the data transfer time compared to DMA-based approaches. The EDTbased NI attains 17% to 38% reduction in user-to-user message time compared to the cache-coherent DMA-based NIs for a range of message sizes (64 bytes${\sim}$4 Kbytes) in a SAN environment.

Secure FTP Technique with TLS and OTP (TLS와 OTP를 이용한 보안 FTP 기법)

  • Kim, Eui-jeong;Seo, Tae-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.197-200
    • /
    • 2019
  • File Transfer Protocol (FTP) is a protocol for transferring files between computers, FTPS with TLS, and SFTP based on similar SSH. The keynote to apply one-time password (OTP) has been diffused to resolve identity and password theft cases. In this paper, it has been confirmed that both data transmission and identity authentication using OTP at TLS level are possible without significant change in user client.

  • PDF

Cluster-based Geocasting Protocol in Ad-hoc Networks (애드 혹 네트워크에서 클러스터 기반 지오캐스팅 프로토콜)

  • Lee Jung-Hwan;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5A
    • /
    • pp.407-416
    • /
    • 2005
  • This paper suggests a new geocasting protocol which is used to transfer the geographic packets to the specific region in MANET. Geocasting protocol is basically different from the conventional multicasting protocol that needs group addition and maintenance. A geocasting protocol using the mobile node's position information is the new area of multicasting protocols. The existing geocasting protocols have the following problems; it may be impossible to transfer data to some mobile hosts even if there are alternate routes and they have low adaptability and efficiency when the number of mobile hosts increases. The proposed CBG (Cluster-Based Geocasting) uses the proactive routing strategy and clustering technique with mobile host's location information. The CBG achieves high successful data transmission ratio and low data delivery cost to mobile hosts at specific region.

Design of enhanced communications transport service for multimedia applications (멀티미디어 응용을 위한 향상된 트랜스포트 서비스 설계)

  • 강신각;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2150-2164
    • /
    • 1997
  • Two distinct features required in transport service and protocol to meet new multimedia applications requirements are multicast transmission capability and enhanced QoS facility. In this paper, we presents major functions and facilities of enhanced communications transport service definition supporting these requirements. At first, major fundamental issues, that should be handled to design multi-peer communcation service and protocol, are resoved and applied to design service definition. Secondly, we proposed several new functions for enhanced transport service such as heterogeneous TC establishment, invitation capability, TC-ownership transfer, restriction of transmit concurrency. The detils of proposed enhanced transport service are TC creation, TC invitation, TC join, multicase data transfer, pause of data transfer, resulme of data transfer, report of specific status, TC leave, TC termination, TC-ownership transfer, Token transfer services. The proposed transport service was submitted and accepted as a draft text for committee draft of international standard by the international standradization body such as JTC1/SC6 and ITU-T SG 7.

  • PDF

A Resource Adaptive Data Dissemination Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 자원 적응형 데이터 확산프로토콜)

  • Kim, Hyun-Tae;Choi, Nak-Sun;Jung, Kyu-Su;Jeon, Yeong-Bae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2091-2098
    • /
    • 2006
  • In this paper, it proposes a protocol of resource adaptive data dissemination for sensor nodes in a wireless sensor network. In general, each sensor node used in a wireless sensor network delivers the required information to the final destination by conducting cooperative works such as sensing, processing, and communicating each other using the battery power of a independent sensor node. So, a protocol used for transferring the acquired information to users through the wireless sensor network can minimize the power consumption of energy resource given to a sensor node. Especially, it is very important to minimize the total amount of power consumption with a method for handling the problems on implosion. data delivery overlapping, and excessive message transfer caused by message broadcasting. In this paper, for the maintaining of the shortest path between sensor nodes, maximizing of the life time of a sensor node and minimizing of communication cost, it presents a method for selecting the representative transfer node for an event arising area based on the negotiation scheme and maintaining optimal transfer path using hop and energy information. Finally, for the performance evaluation, we compare the proposed protocol to existing directed diffusion and SPIN protocol. And, with the simulation results, we show that the proposed protocol enhances the performance on the power consumption rate when the number of overall sensor nodes in a sensor network or neighbor sensor nodes in an event area are increased and on the number of messages disseminated from a sensor node.

The Design and Implementation of the SRTPIO Module for a Real-time Multimedia Data Transport (실시간 멀티미디어 데이타 전송을 위한 SRTPIO 모듈 설계 및 구현)

  • Nam, Sang-Jun;Lee, Byung-Rae;Kim, Tai-Woo;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.621-630
    • /
    • 2001
  • Recently, users' demands for multimedia service are increasing. But, server systems offer inefficient multimedia data service to users. In this paper, to transport multimedia data in the server system more efficiently, we propose the SRTPIO(Special RTP Input/Output) module that process the RTP(Real-time Transport Protocol) data in the kernel with the SIO(Special Input/Output) Mechanism. The SIO mechanism improve a transfer speed because it reduces overheads associated with data copying and context-switching between the user mode and the kernel mode occured in general server system in the kernel-level. The SRTPIO module, integrating the SIO mechanism and the RTP data processing in the kernel, support efficient multimedia data transfer architecture.

  • PDF

Protocol converting method for the Real-time Safety Supervision System in Railway (실시간 철도안전 관제를 위한 프로토콜 변환 방안 연구)

  • Ahn, Jin;Kim, Sung-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1335-1341
    • /
    • 2016
  • For the safety of train operation, monitoring & supervisory systems for train, signal, power, communication and facilities is operating independently in another place, so, its sensors are interdependently connected from each other to transfer gathering datas of sensing to control center. A Goal of Real-time railway safety supervision system is to improve the safety oversight efficiency and to prevent accidents by means of hazard prediction based on big data by integrating all of safety sensing data in wayside of railway, and the System is requested acquisition of all of sensing data of safety. So, we need special method of protocol converting for the purpose of integrating all of detecting data concerning safety without any changing application. In this paper we investigate the existing converting method in communication field, and propose a new progress to converting protocol adding function of transfer using XML file, and implemented this algorithm, and tested with example packets, finally.