• 제목/요약/키워드: Internet Protocol

검색결과 2,424건 처리시간 0.029초

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

An Internet Based Data Storage Protocol for ATA devices

  • Singh, Kulveer;Lim, Hyo-Taek
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1167-1170
    • /
    • 2007
  • This paper introduces a data storage transport protocol internet Advanced Technology Attachment (iATA) for ATA storage devices that can be accessed over (TCP/IP) networks. As the access speed of Advanced Technology Attachment (ATA) type storage is increasing, the importance of sharing the ATA type storages over internet is also increasing. We are proposing a protocol in which we have implemented the basic ATA command set to access the ATA type remote storage devices over the TCP/IP networks.In this paper, we give basic details of the protocol and discuss the existing storage protocols which are mainly used for accessing block storage like internet Small Computer System Interface (iSCSI) Hyper Small Computer System Interface (HyperSCSI) and ATA over Ethernet (AoE).

  • PDF

TCP/IP를 이용한 다중PC의 고장허용 제어기 설계 (Design of A Fault-Tolerance Controller of A Multiplex PC Using TCP/IP Internet Protocol)

  • 박기광;김홍필;양해원
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 D
    • /
    • pp.2376-2378
    • /
    • 2002
  • Redundant Programmable Logic Controllers are used in practice with the aim of achieving higher degree of availability or fault tolerance. In the paper a proposed Multiplex-PC is controled for fault tolerance design. In order to select a Different-Vender by a Supervisor computer, a Multiplex-PC is designed by TCP/IP internet protocol[1]. Because TCP/IP internet protocol can not connect to CPU. We use TCP/IP internet protocol to join CPU. We have to use TCP congestion control to select Different-Vender [4]. The reliability of the fault tolerant is measured with MTBF(Mean Time Between Failures)[3].

  • PDF

복수의 검출방법을 병렬화한 IP 공유기 검출 시스템에 관한 연구 (A study on the IP Router detection system using parallel multi-detection method)

  • 마정우;이희조
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.793-796
    • /
    • 2013
  • 스마트폰, IPTV(Internet Protocol Television), VoIP(Voice over Internet Protocol) 등의 인터넷을 활용한 서비스의 증가는 IPv4(Internet Protocol Version4)의 주소 부족문제를 야기시켰으며 이를 해결하기 위한 장기적인 해결방안으로는 IPv6(Internet Protocol Version6)가 제시되었고 단기적으로는 NAT(Network Address Translator)가 제안되었다. NAT는 사설 IP 주소를 공인 IP 주소로 활용하여 네트워크에 접속할 수 있도록 지원하며 주소 부족 문제를 해결하고 내부 네트워크를 보호하는 긍정적인 기능도 하지만 역으로 해커들에게 숨은 공간을 제공하는 역할을 하기도 한다. 본 논문에서는 NAT 기능을 활용한 IP 공유기를 통해 내부 보안 프로세스를 우회할 수 있는 단말기를 검출하는 탐색 알고리즘을 분석하고 이를 병렬화하여 정확도를 높일 수 있는 검출 시스템을 연구하고자 한다.

Hybrid Fiber Coaxial망에서 VoIP 서비스 구현 (Implementation of VoIP Service in Hybrid Fiber Coaxial Network)

  • 주재한
    • 한국항행학회논문지
    • /
    • 제21권1호
    • /
    • pp.113-118
    • /
    • 2017
  • 최근 모바일기기 및 네트워크에 대한 관심이 높아짐에 따라 기존의 IP (internet protocol) 망을 이용하여 음성데이터를 전송하는 기술인 VoIP (voice over internet protocol)서비스가 급속히 확산됨에 따라 무선 인터넷망을 활용하여 언제 어디서나 저렴한 음성 통화 서비스가 가능해졌다. 그리고 디지털방송서비스가 보급되면서 방송과 통신의 융합을 통해 광대역케이블망을 이용하는 HFC (hybrid fiber coaxial)망 기술은 기존의 통신시스템 및 망설비를 활용하여 양방향 방송서비스 및 인터넷, 전화 등 다양한 신규 서비스를 제공하고 있다. 따라서 실제 HFC 인터넷서비스망에서 음성데이터의 품질보장을 위해 VoCM에 UGS-AD를 MTA에는 RTPS를 적용하면 실제 상용 HFC 인터넷서비스망에서 문제가 되는 협소한 상향대역에서의 음성데이터 전송을 원활히 수행할 수 있음을 확인하였으며, HFC 인터넷서비스 망에서 음성데이터의 QoS개선을 통해 기존 대비 개선된 VoIP서비스를 구현하는 방안을 제시하였다.

IPv4 네트워크와 IPv6 네트워크 간의 연동 (A study on the interworking between IPv4 network and IPv6)

  • 김상범;김두석
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(1)
    • /
    • pp.89-92
    • /
    • 2000
  • In this paper, we consider the interworking methods for Internet layer 3 protocols. The legacy protocol for Internet is IPv4(IP version 4). The ability of IPv4 is not enough for modern real time multimedia communication services. So IPv6(IP version 6) protocol was suggested to resolve the problems of IPv4. 6Bones(IPv6 Backbones) have also constructed from 1996 in many countries. The 6Bones should be interoperatable to the legacy internet. To support all data services including voice and video, IP protocol should be enhanced because the characteristics of modern network services are requiring QoS(Quality of Service) functions, plug and play, security, mobility and so on. So a new IP protocol, IPv6, has been developing to meet the requirements. In this paper, some migration methods for internets are described. We first describe the protocol compatibility problems and suggest some solutions and scenario to solve the problems.

  • PDF

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability

  • Yen, Yi-Chung;Wu, Tzong-Chen;Lo, Nai-Wei;Tsai, Kuo-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2956-2979
    • /
    • 2012
  • Along with the development of Information Technology, online transactions through Internet have become more popular for the reasons of convenience and efficiency. In order to provide secure and reliable online transactions, an effective electronic payment protocol is crucial. In this paper, we propose a novel electronic payment protocol for digital product transactions with an offline arbiter to achieve fair exchange, automated dispute resolution, customer anonymity, and customer unlinkability. In our protocol a product token is adopted to eliminate the need of key management for digital product decryption in the offline arbiter. In addition, Elliptic Curve Cryptography (ECC)-based self-certified public key is utilized to further reduce computing overheads. According to our analysis, the efficiency of our protocol can be greatly increased in comparison with previous literatures.

Design and Performance Analysis of a Contention-Based Reservation Protocol for a Local Area Optical Internet

  • Choi, Jin-Seek;Lee, Jang-Won;Kang, Min-Ho
    • ETRI Journal
    • /
    • 제24권2호
    • /
    • pp.142-152
    • /
    • 2002
  • In this paper, we propose and analyze a new multiple access protocol for a local area optical Internet based on a wavelength division multiplexing technique which uses a passive star coupler. The proposed contention-based reservation protocol can support variable-length as well as fixed-length messages for transporting Internet packets with one reservation of a minislot at the beginning of a packet transmission. The minislot is used to reserve the data channel on the basis of the slotted ALOHA protocol and the control node ensures subsequent message transmission on the same wavelength. Thus, all messages need not be broken down to many fixed-length packets, and consecutive messages are transmitted through the same wavelength. Moreover, the proposed protocol reduces the collision probability of minislots and improves wavelength utilization. We determine the maximum throughput and verify the results with simulation.

  • PDF

The Improved Energy Efficient LEACH Protocol Technology of Wireless Sensor Networks

  • Shrestha, Surendra;Kim, Young Min;Jung, Kyedong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제7권1호
    • /
    • pp.30-35
    • /
    • 2015
  • The most important factor within the wireless sensor network is to have effective network usage and increase the lifetime of the individual nodes in order to operate the wireless network more efficiently. Therefore, many routing protocols have been developed. The LEACH protocol presented by Wendi Hein Zelman, especially well known as a simple and efficient clustering based routing protocol. However, because LEACH protocol in an irregular network is the total data throughput efficiency dropped, the stability of the cluster is declined. Therefore, to increase the stability of the cluster head, in this paper, it proposes a stochastic cluster head selection method for improving the LEACH protocol. To this end, it proposes a SH-LEACH (Stochastic Cluster Head Selection Method-LEACH) that it is combined to the HEED and LEACH protocol and the proposed algorithm is verified through the simulation.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • 제43권3호
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.