• Title/Summary/Keyword: Manager Protocol

Search Result 158, Processing Time 0.024 seconds

Development of The DCCP for Data Reliability in IP Traffic System (IP기반 교통시스템에서 데이터의 신뢰성을 위한 DCCP 개발)

  • Park, Hyun-Moon;Seo, Hae-Moon;Lee, Gil-Yong;Park, Soo-Hyun;Kim, Sung Dong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.7-17
    • /
    • 2010
  • ITS(Intelligent Transport System) as things are used for Broadcast service using TDMB/TPEG/NAVI rather than personal seamless service. It is attaching weight to Traffic information gathering, Charging, Settlement service. This research is applied to improve DCCP(Datagram Congestion Control Protocol) which has function as protecting data and preserving message boundary. The improving method is like that we solve data trust in UDP because Connection and Transmission overhead in UDP is less than in TCP. We fix the data loss which is generated from unordered delivery section of IP base wireless service by using DCCP protocol. We guarantee of connection with OBE(On-Board Equipment) and reliance about transmission of data by complement to mapping table and multi-hoping. Finally, We evaluate the performance about transmission of IP based data. We constructed a test-bed near research center for this test.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

An MPEG-4 Compliant Interactive Multimedia Streaming Platform Using Overlay Networks

  • Kim, Hyun-Cheol;Patrikakis, Charalampos Z.;Minogiannis, Nikos;Karamolegkos, Pantelis N.;Lambiris, Alex;Kim, Kyu-Heon
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.411-424
    • /
    • 2006
  • This paper presents a multimedia streaming platform for efficiently transmitting MPEG-4 content over IP networks. The platform includes an MPEG-4 compliant streaming server and client, supporting object-based representation of multimedia scenes, interactivity, and advanced encoding profiles defined by the ISO standard. For scalability purposes, we employ an application-layer multicast scheme for media transmission using overlay networks. The overlay network, governed by the central entity of the network distribution manager, is dynamically deployed according to a set of pre-defined criteria. The overlay network supports both broadcast delivery and video-on-demand content. The multimedia streaming platform is standards-compliant and utilizes widespread multimedia protocols such as MPEG-4, real-time transport protocol, real-time transport control protocol, and real-time streaming protocol. The design of the overlay network was architected with the goal of transparency to both the streaming server and the client. As a result, many commercial implementations that use industry-standard protocols can be plugged into the architecture relatively painlessly and can enjoy the benefits of the platform.

  • PDF

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design and Implementation of the Surrogate Transaction Manager for Mobile GIS (모바일 GIS를 위한 대리 트랜잭션 관리자의 설계 및 구현)

  • 반재훈;문선희;김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.4
    • /
    • pp.397-407
    • /
    • 2003
  • Transactions of updating spatial dta with mobile clients are log transactions because a user disconnected from a server surveys real features and updates them. In this environment, it is appropriate to exploit the optimistic approach based on the validation test in order to control the concurrency of transactions. On the contrary, the pessimistic concurrency control scheme makes transactions wait for a long time due to the lock. In this paper, we propose the surrogate transaction model and implement its manager for the S-S-M(Server-Surrogate PC-Mobile Client) structure which is appropriate for updating spatial data in mobile environments. In the S-S-M structure, the mobile client communicates with the server by the surrogate PC. We extend the validation condition in consideration of spatial relationships between spatial objects in this model. We also present the commit protocol where the user of a surrogate PC adjusts objects of the conflicted surrogate transaction to minimize costs for the abortion of the transaction.

Design and Implementation of Bio-data Monitering System Based on ISO/IEEE 11073 DIM/REST for IoT Healthcare Service (IoT 헬스케어 서비스를 위한 ISO/IEEE 11073 DIM/REST 기반 생체정보 모니터링 시스템 설계 및 구현)

  • Choi, Ju-Hyun;Chun, Seung-Man;Jang, Dong-Hyun;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.3-12
    • /
    • 2015
  • Recently, various studies have been attempted to provide a biological information monitoring service through integrating with the web service. The medical information transmission standard ISO/IEEE 11073 PHD defines the optimized exchange protocol ISO/IEEE 11073-20601 based on the No-IP to exchange the biometric information between the ISO/IEEE 11073 agent and the manager. It's system structure based on the No-IP using ISO/IEEE 11073-20601 is not suitable for providing a remote biological information monitoring services. That is because it is difficult to provide to control and manage the biological information measurement devices, which have installed IP protocol stack at the remote. Furthermore, ACSE and CMDISE in ISO/IEEE 11073-20601 are not suitable to provide U-healthcare services based on IoT because they are complicated and difficult to implement it caused by the structural complexity. In order to solve the problems, in this paper, we propose the biological information monitoring architecture based on ISO/IEEE 11073 DIM/REST of IoT environment to provide the biological information monitoring service based on IoT. To do this, we designed biological information monitoring system architecture based on IoT and the message exchange protocol of ISO/IEEE 11073 DIM/REST between the ISO/IEEE 11073 agent and the ISO/IEEE 11073 manager. In order to verify the realistic possibility of the proposed system architecture, we developed the service prototype.

The Flexible Design Architecture for a Continuous Packet Connectivity Protocol on High Speed Packet Access Platform (고속 패킷 접속 규격 플랫폼 기반 연속적인 패킷 연결 프로토콜의 유연한 구조 설계)

  • Kwon, Hyun-Il;Kim, Kyung-Ho;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.30-35
    • /
    • 2009
  • In this paper, we propose the flexible design architecture for a continuous packet connectivity (CPC) Protocol among additional features of 3GPP HSPA+. In order to meet a practical intellectual property (IP) reuse and the developing time reduction design goals, we utterly take a CPC protocol into account to be realized by reusing digital signal processor (DSP) IP of the proven high speed packet access (HSPA) platform with the minimum hardware modification and addition. Based on the Teak series DSP, the proposed CPC protocol is divided into discontinuous transmit and receive mode, CPC manager, and interface with the proven HSPA platform. According to the regularized verification flow for wireless cellular communication applications, the proposed CPC protocol has been verified in various test scenarios.

An Energy Efficient Communication Protocol using Location Information in Wireless Sensor Networks (무선 센서 망에서 위치 정보를 이용한 에너지 효율적인 통신 프로토콜)

  • Jin, Min-Sook;Park, Ho-Sung;Lee, Eui-Sin;Kim, Tae-Hee;Lee, Jeong-Cheol;Kim, Sang-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.322-329
    • /
    • 2009
  • Many researches in wireless sensor networks have used a geographic routing to effectively disseminate data between sinks and sources. To know the location information, the geographic routing has proposed two manners. A sink-initiated and a source-initiated are flooding to disseminate its location information in WSN. However, these two manners have two problems. Firstly, whenever they move, they flood their location information. Secondly, their location information is disseminated unnecessary nodes besides nodes which send and receive data in actually. Therefore, this paper proposes a protocol that can solve the two problems and disseminate effectively data between few sinks and few sources. The proposed protocol exploits a location information manager that manages location information of the sinks and the sources. We also compare the performance of the proposed protocol with the existing protocols through a simulation.

Design and Implementation of an SNMP-based Integrated Management System for Efficient Management of Naval Combat System (해상 전투 체계의 효율적 관리를 위한 SNMP 기반의 통합 관리 시스템 설계 및 구현)

  • Kim, Eun-Hee;Choi, Mi-Jung;Hong, James W.K.;Cho, Myeong-Seob;Chun, Sung-Eun;Lee, Yong-Ook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.32-42
    • /
    • 2008
  • The existing management system of Naval combat system does not provide efficient management methods since an integrating management mechanism does not exist. This paper examines the existing Naval combat system management techniques and summarizes their shortcomings. To solve the drawbacks, we apply the Simple Network Management Protocol(SNMP) mechanism and propose a more efficient management method. Based on SNMP, we analyze the requirements of management system from the perspective of an agent and a manager. We design the management system and also define the management information as SNMP Management Information Base(MIB). We implement a prototype based on our proposed design and verify our prototype by applying the system to the management of selected network devices in a real environment.

RFID Middleware System based on XML for Processing Large-Scale Data (대용량 데이터처리를 위한 XML기반의 RFID 미들웨어시스템)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.7
    • /
    • pp.31-38
    • /
    • 2007
  • We implement the RFID middleware system based on XML for large-scale data processing. The Implemented middleware system are consist of the reader interface for tag data collection, the event manager for a data filtering, and application interface for the RFID application. The implemented RFID middleware system is to support both a fixed type's reader and portable type's reader. we analyze the middleware function with four application accessing protocol, HTTP, XML, JMS, and SOAP, and demonstrate a filtering speed in terms of CPU utilization.