• Title/Summary/Keyword: Internet Protocol

Search Result 2,437, Processing Time 0.029 seconds

A Study on the Efficiency Improving of Communication Protocols on the Internet of Things. (사물인터넷 통신프로토콜 성능 개선 연구)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Soh, Woo-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.427-430
    • /
    • 2016
  • Internet of Things is one of the technologies that become a hot topic in recent years, is a technology that connects objects with wired or wireless network and share a information between objects. Gartner predicts that spread rapidly devices for end users, also increase revenue from enterprise equipment through the Annual 'Internet of Things' reports. By this trend, Internet of Things is becoming the platform of various kinds, the platform and the protocol for that have been developed a new technique. In this paper, we compared the performance of the communication protocol between devices in the Internet of Things, and propose a way to improve performance efficiency.

  • PDF

Implementation and Analysis of Automation using IoT Based on MQTT Protocol

  • PHAM DUC NANG;Youngmi Baek;Jung Kyu Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.5
    • /
    • pp.1199-1207
    • /
    • 2024
  • Automation systems have gained great attention with the evolution of communications technology. A smart automation is an Internet of Things (IoT) application that employs the Internet to monitor and control appliances using an automation system. Lack of IoT technology adoption, unattractive user interface, restricted wireless transmission range, and expensive costs are the constraints of existing home automation systems. The idea of integrating a large number of devices has a substantial impact on the widespread advancement in the field of autonomous systems. The Internet of Things is being used more and more to create internet-connected gadgets. In addition, a wide range of data and services centered on human connection are accessible through mobile sensing devices powered by the Internet of Things, such as smartphones, tablets, digital cameras, sensors, etc. This study describes the implementation and analysis of a MQTT protocol-based IoT-based home automation system utilizing NodeMCU. This enables customers to use a mobile application over the internet to monitor and manage household appliances from a distance.

A Scalable Resource-Lookup Protocol for Internet File System Considering the Computing Power of a Peer (피어의 컴퓨팅 능력을 고려한 인터넷 파일 시스템을 위한 확장성 있는 자원 탐색 프로토콜 설계)

  • Jung Il-dong;You Young-ho;Lee Jong-hwan;Kim Kyongsok
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.89-99
    • /
    • 2005
  • Advances of Internet and rC accelerate distribution and sharing of information, which make P2P(Peer-to-Peer) computing paradigm appear P2P computing Paradigm is the computing paradigm that shares computing resources and services between users directly. A fundamental problem that confronts Peer-to-Peer applications is the efficient location of the node that stoles a desired item. P2P systems treat the majority of their components as equivalent. This purist philosophy is useful from an academic standpoint, since it simplifies algorithmic analysis. In reality, however, some peers are more equal than others. We propose the P2P protocol considering differences of capabilities of computers, which is ignored in previous researches. And we examine the possibility and applications of the protocol. Simulating the Magic Square, we estimate the performances of the protocol with the number of hop and network round time. Finally, we analyze the performance of the protocol with the numerical formula. We call our p2p protocol the Magic Square. Although the numbers that magic square contains have no meaning, the sum of the numbers in magic square is same in each row, column, and main diagonal. The design goals of our p2p protocol are similar query response time and query path length between request peer and response peer, although the network information stored in each peer is not important.

A LAN Protocol Analyzer including Simulation Function for PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 LAN 프로토콜 분석장비)

  • Chung, Joong-Soo;Lee, Jun-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.583-589
    • /
    • 2002
  • The Internet is absolutely contributed to information telecommunication revolution nowadays. Realizing local network at the various type of buildings such as a company and a university, ethernet is used for subnet and FDDI, ATM are used for backbone mainly in order to get internet services. Processing TCP/IP protocol suite and analyzing the protocol exactly is essential to detecting the problem occurring in the network and developing communication equipment. This paper presents implementation of ethernet LAN protocol analyser which monitors and simulates ICP/IP protocol suite carrying the Internet and non-Internet protocol such as Netware and NetBIOS. MS window98 and visual C are used for development environment and application program operates on the NDIS firmware. The performance analysis on the proposed system is carried out as monitoring and simulating the traffic over LAN of a university. In the result of monitoring the system, the processing time of a packet captured over the LAN is about 1.5ms. In case of simulating the system, the processing time to be taken carrying out TCP connection and disconnection once is packet is about 8.6ms. The performance analysis of monitoring and simulation results satisfies with 10 Mbps ethernet LAN environment.

Trajectory Information-based Routing Protocol for Mobile Mesh Router in Wireless Mesh Networks (무선 메쉬 네트워크에서 이동 메쉬 라우터의 이동 경로 정보를 고려한 라우팅 프로토콜)

  • Cho, Yong-Jin;Jeong, Hong-Jong;Kim, Dong-Kyun;Ryu, Kwan-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.912-923
    • /
    • 2011
  • In this paper, we propose a routing protocol for WMNs to provide passengers in public transportation vehicles (e.g., bus and tram) with Internet access service. In order to support end users with a reliable Internet connection despite the mobility of vehicles, we assume that mesh router, called mobile mesh router (MMR), is installed in a vehicle and manages a route to Internet Gateway (IGW). We therefore propose an efficient routing protocol and its routing metric, called ETT-TR, considering trajectory information of vehicle as well as link quality in order to find a route between them. Using NS-2 simulations, we observe that our proposed routing protocol reduces the end-to-end delay and improves throughput performance.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

PA-RSVP: An Efficient RSVP Protocol for Real-time Services in the Mobile Internet (PA-RSVP: 무선 인터넷에서 실시간 서비스를 위한 효율적인 RSVP 프로토콜)

  • Kim Taehyoun;Park Hyosoon;Lee Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.7-16
    • /
    • 2005
  • Resource Reservation Protocol(RSVP) can provide Quality-of-Service(QoS) guarantees for real-time services in wired networks. However, RSVP suffers from mobility problem in the mobile Internet. Therefore, to provide seamless QoS services, it is needed that a mobile node makes a reservation everywhere it visits. Recently, many protocols have been proposed to provide QoS guarantees through advance resource reservation. But, these proposals have problems with a waste of bandwidth and the signaling overhead due to advance resource reservation. In this paper, we propose new advance resevation protocol, Proportional Aggregate RSVP(PA-RSVP) to minimize the resource reservation bandwidth and the signaling overhead in the mobile Intemet while providing QoS guarantees. Based on the performance evaluation, we show that the proposed protocol provides an improved performance over existing protocols under various system conditions.

Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device

  • Bang, Jong-ho;Lee, Song-Yeon;Paik, Jong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Social issues for environmental pollution are continuously increasing globally. Especially, Users require services to measure environmental factors in indoor and outdoor and manage related data effectively and conveniently. According to this demand, sensors that can measure environmental factors in indoor and outdoor have been developed. However, since one sensor is composed of independent module, the interface of output data from each sensor is different. To solve the problem, we propose a customized protocol for low-power short-range wireless communication between smartphone using Bluetooth and All-in-One sensor device board and analyze the performance of the proposed customized protocol by developing program for performance verification of interface with user smartphone through Bluetooth. In addition, we implement a smartphone application using proposed protocol.

Design of Multiprocess Models for Parallel Protocol Implementation (병렬 프로토콜 구현을 위한 다중 프로세스 모델의 설계)

  • Choi, Sun-Wan;Chung, Kwang-Sue
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2544-2552
    • /
    • 1997
  • This paper presents three multiprocess models for parallel protocol implementation, that is, (1)channel communication model, (2)fork-join model, and (3)event polling model. For the specification of parallelism for each model, a parallel programming language, Par. C System, is used. to measure the performance of multiprocess models, we implemented the Internet Protocol Suite(IPS) Internet Protocol (IP) for each model by writing the parallel language on the Transputer. After decomposing the IP functions into two parts, that is, the sending side and the receiving side, the parallelism in both sides is exploited in the form of Multiple Instruction Single Data (MISD). Three models are evaluated and compared on the basis of various run-time overheads, such as an event sending via channels in the parallel channel communication model, process creating in the fork-join model and context switching in the event polling model, at the sending side and the receiving side. The event polling model has lower processing delays as about 77% and 9% in comparison with the channel communication model and the fork-join model at the sending side, respectively. At the receiving side, the fork-join model has lower processing delays as about 55% and 107% in comparison with the channel communication model and the event polling model, respectively.

  • PDF

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.