• 제목/요약/키워드: MAP protocol

검색결과 147건 처리시간 0.029초

Ad Hoc 네트워크를 위한 지역기반 오버레이 멀티캐스트 라우팅 프로토콜의 성능 분석 (A Performance Analysis of Region-based Overlay Multicast Routing Protocol for Ad Hoc Networks)

  • 김갑동;박준희;이광일;김학영;김상하
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1037-1040
    • /
    • 2006
  • This paper presents an efficient overlay multicast routing protocol (ROMP) and its architecture. ROMP using GPS and region map stands on the basis of scalable 2-tiered multicast architecture and maintains a global overlay multicast tree through reactive fashion. With this approach, the coarse-grain location-awareness for an efficient overlay multicasting and the determination of hot-spot area for efficient data delivery are feasible. The simulation results show that the localized control packets of ROMP prevent the overlay control packets from squandering the physical network resources.

  • PDF

무선 센서 네트워크에서 스마트기지국을 이용한 균형된 에너지소비 방안 (A Balanced Energy Consumption Strategy using a Smart Base Station in Wireless Sensor Networks)

  • 박선영
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.458-465
    • /
    • 2014
  • In this paper, we propose a strategy to distribute the energy consumption over the network. The proposed strategy is based on geographic routing. We use a smart base station that maintains the residual energy and location information of sensor nodes and selects a head node and an anchor node using this information. A head node gathers and aggregates data from the sensor nodes in a target region that interests the user. An anchor node then transmits the data that was forwarded from the head node back to the smart base station. The smart base station extends network lifetime by selecting an optimal head node and an optimal anchor node. We simulate the proposed protocol and compare it with the LEACH protocol in terms of energy consumption, the number of dead nodes, and a distribution map of dead node locations.

Ch를 이용한 직선형 5공 압력 프로브의 3차원 유동속도 계측시스템 개발 (Development of Three-Dimensional Flow Velocity Component Measurement System with Straight-Type Five-Hole Pressure Probe Using Ch Language)

  • 오석형;김장권
    • 동력기계공학회지
    • /
    • 제14권1호
    • /
    • pp.40-46
    • /
    • 2010
  • This paper shows the development process for measuring three-dimensional flow velocity components in a web-browser. The system is developed in an embeddable C/C++ interpreter Ch and Ch-CGI toolkit. The interface for the web-based measurement system consists of a set of web HTML files and Ch files for CGI. All of data in web browser are passed to Ch-CGI script to generate the output of new HTML file. PC-Server and PC-Client can submit measurement parameters and receive the text/graphical results each other. PC-Client can control the test equipment by using a parameters that received from PC-Server. It also can pass the test results between the web-based measurement system. In summary, the designed measurement system is evaluated, the outputs shown well on the web browser.

인공지능에 의한 MAP 네트워크의 성능관리기 개발 (Development of MAP Network Performance Manger Using Artificial Intelligence Techniques)

  • 손준우;이석
    • 한국정밀공학회지
    • /
    • 제14권4호
    • /
    • pp.46-55
    • /
    • 1997
  • This paper presents the development of intelligent performance management of computer communication networks for larger-scale integrated systems and the demonstration of its efficacy using computer simula- tion. The innermost core of the performance management is based on fuzzy set theory. This fuzzy perfor- mance manager has learning ability by using principles of neuro-fuzzy model, neuralnetwork, genetic algo- rithm(GA). Two types of performance managers are described in this paper. One is the Neuro-Fuzzy Per- formance Manager(NFPM) of which learning ability is based on the conventional gradient method, and the other is GA-based Neuro-Fuzzy Performance Manager(GNFPM)with its learning ability based on a genetic algorithm. These performance managers have been evaluated via discrete event simulation of a computer network.

  • PDF

Development of Patients Environmental Sustainability Performance in Healthcare Sector: A Conceptual Framework and Further Research Directions

  • KIM, Eunsung
    • 유통과학연구
    • /
    • 제17권7호
    • /
    • pp.99-109
    • /
    • 2019
  • Purpose - The purpose of this development the business model of the healthcare sector in order to promote patents satisfaction towards medical sector services improvement for the medical business model innovation to possess a competitive advantage in the medical and pharmaceutical industry. Research design, data, and methodology - Safety standard protocol from existing multidisciplinary literature is a process of theorization, which uses grounded theory methodology rather than a description of the data and the targeted phenomenon by using Jabareen (2009). The first task is to map the spectrum of food safety literature regarding the phenomenon in safety management. This process includes developing the implementation factors and other sources such as existing business models and practices into the protocol design. Results - The study suggests the conceptual framework to improve the safety management for patients' environmental sustainability performance. Conclusion - The business model may support the beneficial aspect to healthcare government's policymakers, hospital employees, and medical specialist who can apply the practical perspective of its value regarding an educational protocol. Originality/value - This study contributes to and extends our understanding of environmental sustainability performance, identifying the rationale for safety standards performance in the healthcare industry with suggested hybrid safety standards market consumer interconnector.

Performance Analysis of CMAP-WDMA MAC Protocol for Metro-WDMA Networks

  • Yun, Chang-Ho;Cho, A-Ra;Park, Jong-Won;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • 제7권4호
    • /
    • pp.480-488
    • /
    • 2009
  • A channel-shared modified accelerative pre-allocation wavelength division multiple access (CMAP-WDMA) media access control (MAC) has been proposed for metro-WDMA networks, as an extension of modified pre-allocation wavelength division multiple access (MAP-WDMA) MAC protocol. Similarly, CAP WDMA as an extension of accelerative pre-allocation wavelength division multiple access (AP-WDMA) MAC protocol. Performance of CMAP- and CAP-WDMA was extensively investigated under several channel sharing methods (CSMs), asymmetric traffic load patterns (TLPs), and non-uniform traffic distribution patterns (TDPs). The result showed that the channel utilization of the CMAP-WDMA always outperforms that of CAP-WDMA at the expense of longer channel access delay for channel shared case while CMAP-WDMA provided higher channel utilization at specific network conditions but always shorter channel access delay than CAP-WDMA for non-channel shared case. Additionally both for CMAP- and CAP-WDMA, determining an effective CSM is a critical design issue because TDPs and TLPs can be neither managed nor expected while CSM is manageable, and the CSM supporting the best channel utilization can be recommended.

기존 신규 방송통신서비스 분석을 통한 IPTV 서비스의 성장가능성 연구 (The Potential of IPTV Service: Is It a Bridging or Gap-filling Telecommunication Service?)

  • 이형직;김경태;정보영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.525-528
    • /
    • 2009
  • 본 논문은 신규 방송통신서비스인 IPTV(Internet Protocol Television)가 기존의 TV서비스와 차별화를 두고 향후 통신산업의 성장 동력으로서 성공적으로 성장할 수 있는지를 살펴보고자 한다. 먼저, 기존에 국내에서 상용화된 신규 방송통신서비스 - WiBro 및 위성 지상파 DMB - 주요 현황을 살펴보고, 신규 방송통신서비스 위치지도(Position Map of Emerging Telecommunications Services) 분석을 포함한 신규 방송통신서비스의 성장가능성을 분석하기 위한 개념 틀을 제시한다. 이를 바탕으로 기존 신규 방송통신서비스의 성공 장애 요인을 도출하고, IPTV 서비스의 향후 성장가능성을 분석한다. 마지막으로 향후 IPTV 서비스 시장의 성공적인 성장을 위한 정책적 시사점을 제시한다.

  • PDF

비대칭 컴퓨팅 환경을 위한 ID-기반의 인증된 키 동의 프로토콜 (ID-based Authenticated Key Agreement for Unbalanced Computing Environment)

  • 최규영;황정연;홍도원;이동훈
    • 정보보호학회논문지
    • /
    • 제16권1호
    • /
    • pp.23-33
    • /
    • 2006
  • 키 동의 프로토콜은 가장 기본적이고 널리 사용되는 암호 프로토콜 중 하나이다. 본 논문에서는 bilinear map을 이용한 효율적인 키 동의, 즉 서버와 저 전력 클라이언트를 위한 ID-기반의 인증된 키 동의 프로토콜을 제안한다. 특히 본 논문에서는 저 전력 클라이언트를 고려하여 클라이언트 측의 pairing 연산과 같은 복잡한 연산을 사용하지 않았다. 제안한 키 동의 프로토콜은 signcryption을 이용하며 랜덤 오라클 모델에서 그 안전성을 제공한다.

Bilinear map 기반 센서네트워크 보안프로토콜을 위한 Pairing용 곱셈 최적화 기법 (Optimization of multiplication-techniques for a Pairing for sensor network security protocol based on bilinear map)

  • 서화정;이동건;김호원
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2010년도 한국컴퓨터종합학술대회논문집 Vol.37 No.1(A)
    • /
    • pp.166-170
    • /
    • 2010
  • 센서네트워크는 유비쿼터스 환경을 실현할 수 있는 기술로서, 최근 무인 경비 시스템이나 에너지 관리, 환경 모니터링, 홈 자동화, 헬스케어 응용 등과 같은 다양한 응용 분야에 활용되고 있다. 하지만 자신의 정보가 무선통신상에 쉽게 노출됨으로써 도청과 전송 메시지에 대한 위변조, 서비스 거부 공격을 받을 위험이 있다. 더욱이 센서네트워크의 자원 제약성(적은 메모리, 컴퓨팅 성능의 제약)과 키분배 관리의 어려움으로 인해 기존의 공개키, 대칭키 기반의 면안프로토콜을 대체할 수 있는 프로토콜이 필요하다. 그러므로 키분배 관리에 장 접을 가지는 Bilinear map 기반 프로토콜은 적합한 대안이다. 하지만 프로토콜에 사용되는 Pairing연산은 높은 컴퓨팅 성능이 요구된다. 따라서 제한된 성능을 가진 센서상의 구현을 위해서는 Computation Cost를 줄이고 연산 수행 속도를 가속화 할 필요성이 있다. 본 논문에서는 프로토콜 구현에 필요한 Pairing의 핵심 연산인 Multiplication을 대표적인 센서노드 프로세서인 MSP430상에서 최적화 구현함으로써 성능을 개선한다.

  • PDF

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.