• Title/Summary/Keyword: Message Protocol

Search Result 946, Processing Time 0.025 seconds

A Study on Optimization of Networking Mechanism of Distributed List (분산리스트 네트워킹 메카니즘의 최적화에 관한 연구)

  • 임동주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.3
    • /
    • pp.475-482
    • /
    • 2001
  • In this paper, I describe the implementation of the distributed lists based on socket and on RMI(Remote Method Invocation). First, I describe and implement an interface of distributed list based on socket using object stream in a distributed environment, when encapsulating the message in the distributed list. Second, the major purpose to implement a distributed list in RMI is to compare advantages and disadvantages with other networking mechanisms by implementing complicated applications. The major advantage in using RMI is to implement simply the programs without using application-level protocol. In terms of program efficiency, the applications using HMI can degrade the performance due to many TCP/IP connections generated every update. TCP/IP connection requires much less cost than RMI. Even though RMI has the mechanism processing many method calls using a sing]e network connection, RMI is less efficient than the direct use of socket. However, RMI makes it possible to communicate beyond firewall using HTTP proxying mechanism. Consequently, I present a modeling of networking mechanism in finding out optimization solution by comparing and analyzing the two systems.

  • PDF

An Integrated Intrusion Detection System for a Large-scale Network Environment (대규모 네트워크 환경을 위한 통합 침입탐지 시스템)

  • 안정모;조진성;정병수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.985-996
    • /
    • 2004
  • In order to solve the increasing security problems, IDSs(Intrusion Detection System) have appeared. However, local IDSs have a limit to detect various intrusions in a large-scale network environment. So there are a lot of researches in progress which organize the elements of IDS in a distributed or hierarchical manner. In this paper, we design a integrated IDS which exchanges messages between them through the standardized message format (IDMEF) and communication protocol (IDXP). We also propose a policy profile for an effective control of IDSs, and employ the PKI mechanism for mutual authentication. We implement a prototype system for the proposed IDSs communicating with Snort and analyze its performance.

Accuracy Analysis of Code-based PPP-RTK Positioning Utilizing K-SSR Correction Messages Outside the Reference Network

  • Yoon, Woong-Jun;Park, Kwan-Dong;Kim, Hye-In;Woo., Seung;Park, Junpyo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.6 no.2
    • /
    • pp.79-86
    • /
    • 2017
  • Precise Point Positioning-Real Time Kinematic (PPP-RTK) refers to a technology that combines PPP with network-RTK in which a user does not directly receive observed data from a reference station but receives State-Space Representation (SSR) messages corrected for error components from a central processing station through Networked Transport of RTCM via Internet Protocol (NTRIP) or Digital Multimedia Broadcasting (DMB) for purposes of positioning. SSR messages, which refer to corrections used in PPP-RTK, are generated by a central processing station using real-time observed data collected from reference stations and account for corrections needed due to the ionosphere, troposphere, satellite orbital errors, satellite time offsets, and satellite biases. This study used a type of SSR message provided in South Korea, known as Korea-SSR (K-SSR), to implement a PPP-RTK algorithm based on code-pseudorange measurements and validated its accuracy within the reference station network. In order to validate the accuracy of the implemented algorithm outside of the network, the K-SSR was extrapolated and applied to positioning in reference stations in Changchun, China (CHAN) and Japan (AIRA). This also entailed a quantitative evaluation that measured improvements in accuracy in comparison with point positioning. The results of the study showed that positioning applied with extrapolated K-SSR correction data was more accurate in both AIRA and CHAN than point positioning with improvements of approximately 20~50%.

ROHMIP : Route Optimization Employing HMIP Extension for Mobile Networks (ROHMIP : 이동망에서 확장된 HMIP를 적용한 경로 최적학)

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.235-242
    • /
    • 2007
  • Network Mobility Basic Support protocol reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the mobile router (MR), but causes some problems such as sub-optimal routing and multiple encapsulations. This paper proposes an Route Optimization Employing HMIP Extension for Mobile Networks (ROHMIP) scheme for nested nubile networks support which introduces HMIP concept with relation information between MNNs behind a MR and the MR in order to localize handoff, to optimize routing and especially reduce handoff signal overhead. With ROHMIP, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to mobility anchor point (MAP) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead.

  • PDF

An Enhanced Greedy Message Forwarding Protocol for Increasing Reliability of Mobile Inter-Vehicle Communication (이동하는 차량 간 통신의 신뢰성 향상을 위한 개선된 탐욕 메시지 포워딩 프로토콜)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Vehicle-to-Vehicle (V2V) is a special type of vehicle ad-hoc network (VANET), and known as a solution to provide communication among vehicles and reduce vehicle accidents. Geographical routing protocols as Greedy Perimeter Sateless Routing (GPSR) are very suitable for the V2V communication due to special characters of highway and device for vehicles. However, the GPSR has problem that appears local maximum by some stale neighbor nodes in the greedy mode of the GPSR. It can lose transmission data in recovery mode, even if the problem is can be solved by the recovery mode of the GPSR. We therefore propose a Greedy Perimeter Reliable Routing (GPRR), can provide more reliable data transmission, to resolve the GPSR problem in the V2V environment. Simulation results using ns-2 shown that the GPRR reveals much better performance than the GPSR by remarkably reducing the local maximum rate in the greedy mode.

A Distributed Dynamic Address Assignment for Tactical Mobile Ad-hoc Networks (전술 MANET에서 그룹 단위 분산된 동적 주소 할당 기법)

  • Park, Mun-Young;Lee, Jong-Kwan;Baek, Ho-Ki;Kim, Du-Hwan;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.327-335
    • /
    • 2014
  • In this paper, we propose a group distributed dynamic address assignment scheme suitable for tactical mobile ad hoc networks(MANET). Efficient address assignment is an important issue in the MANET because a node may frequently leave the current network and join another network owing to the mobility of the node. The conventional schemes do not consider the features of the tactical networks: existence of a leader node and network activity on a group basis. Thus, they may not be suitable for military operations. In our proposed scheme, called grouped units dynamic address assignment protocol(G-DAAP), a leader node maintains the address information for the members in the network and any of the nodes can exploit the information for the assignment or request of the IP address by a simple message exchange procedure. This leads to fast address assignment with small overheads. In addition, G-DAAP based on the modified IEEE 802.11e Enhanced Distributed Channel Access(EDCA) can assign addresses more quickly. We describe the delay performance of the G-DAAP and compare it with conventional schemes by numerical analysis and computer simulations. The results show that the G-DAAP significantly improves the delay performance as compared with the conventional schemes.

Development of a High Performance Web Server Using A Real-Time Compression Architecture (실시간 압축 전송 아키텍쳐를 이용한 고성능 웹서버 구현)

  • Min Byungjo;Hwang June;Kim Hagbae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.781-786
    • /
    • 2004
  • In these days, such services are popularized as E-commerce, E- government, multimedia services, and home networking applications. Most web traffics generated contemporarily basically use the Hyper Text Transfer Protocol(HTTP). Unfortunately, the HTTP is improper for these applications that comprise significant components of the web traffics. In this paper, we introduce a real-time contents compression architecture that maximizes the web service performance as well as reduces the response time. This architecture is built into the linux kernel-based web accelerating module. It guarantees not only the freshness of compressed contents but also the minimum time delay using an server-state adaptive algorithm, which can determine whether the server sends the compressed message considering the consumption of sewer resources when heavy requests reach the web server. Also, We minimize the CPU overhead of the web server by exclusively implementing the compression kernel-thread. The testing results validates that this architecture saves the bandwidth of the web server and that elapsed time improvement is dramatic.

Performance Evaluation of Deferrd Locking for Maintaining Transactional Cache Consistency (트랜잭션 캐쉬 일관성을 유지하기 위한 지연 로킹 기법의 성능 평가)

  • Kwon, Hyeok-Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2310-2326
    • /
    • 2000
  • Client-server DBMS based on a data-shipping model can exploit e1ient resources effectively by allowing inter-transaction caching. However, inter-transaction caching raises the need of transactional cache consistency maintenancetTCCM protocol. since each client is able to cache a portion of the database dynamically. Deferred locking(DL) is a new detection-based TCCM scheme designed on the basis of a primary copy locking algorithm. In DL, a number of lock ,ujuests and a data shipping request are combined into a single message packet to minimize the communication overhead required for consistency checking. Lsing a simulation model. the performance of the prolxlsed scheme is compared with those of two representative detection based schemes, the adaptive optimistic concurrency control and the caching two-phase locking. The performance results indicate that DL improves the overall system throughput with a reasonable transaction abort ratio over other detection - based schemes.

  • PDF

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Analysis of TDM-based Ad Hoc Network Transmission Technologies (다중시간분할 방식 기반의 에드혹 망 전송기술 분석)

  • Chung, Jong-Moon;Cho, Hyung-Weon;Jin, Ki-Yong;Cho, Min-Hee;Kim, Ji-Hyun;Jeong, Wun-Cheol;Joo, Seong-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8A
    • /
    • pp.618-624
    • /
    • 2009
  • In the evolution from wireless sensor networks(WSNs) to ubiquitous sensor networks(USNs), technologies that can support intensive data-traffic loads, large number of users, improved interoperability, and extreme longevity are required. Therefore, efficient communication time coordination control and low power consumption becomes one of the most important design goals for USN MAC protocols. So far several time division multiplexed (TDM) MAC protocols have been proposed. However, since the pros and cons of existing protocols are not easy to analyze, it becomes a challenging task to design improved TOM MAC protocols. Based on this objective, this paper provides a novel protocol analysis along with a message complexity derivation and comparison of the existing TDM MAC protocols.