• Title/Summary/Keyword: Message Service

Search Result 999, Processing Time 0.03 seconds

Design and Implementation of IP-based Network Management System Supporting WLAN Integrated Management System (IP 네트워크를 기반으로 하는 무선망 통합 관리 시스템 설계 및 구현)

  • Shin, Myung-Sik;Yang, Hae-Sool;Lee, Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.33-40
    • /
    • 2010
  • The hand over between different radio access networks, especially where their coverage overlaps, suffers various complications since the different access networks provide different service characteristics. In this paper, it is about the system which can control the wireless LAN network management system and the wireless LAN access point of variety vendor which is in different areas. Successful development of mobile sink wireless LAN network management system which supports multi-vendor devices and have center-local interoperability structure. In proposed system, speed of the mobile station give about 10% improvement when the map domain size is 5 than the existing system. Through a data plane and management system of message way, it give a stability system and consistency network.

Study on Wireless Body Area Network System Design Based on Transmission Rate (전송률을 고려한 WBAN 시스템 설계에 관한 연구)

  • Park, Joo-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we proposed WBAN system model to management an application that requires low rate data transfer in IEEE 802.15.4. We have to use different wireless sensor network technology to transfer different date rate and emergency message in medical application service. A suitable system model for WBAN and a WBAN MAC protocol in order to solve these existing system problems are proposed. Firstly, the priority queuing was applied to contention access period, and the system model which could guarantee transmission of a MAC command frame was proposed. Secondly, the MAC frame was newly defined to use the system model which was proposed above. Thirdly, WBAN CSMA/CA back-off algorithm based on data transmission rate was proposed to enhance data throughput and transmission probability of the data frame which does not have priority in the proposed WBAN system. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of WBAN CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.

Debt-Use Intention of Young Defaulters on the Theory of Reasoned Action (20·30대 채무불이행자의 부채사용의도 : 합리적 행동이론을 중심으로)

  • Kim, Mi-Ra;Kim, Hea-Seon
    • Journal of Families and Better Life
    • /
    • v.29 no.6
    • /
    • pp.9-25
    • /
    • 2011
  • This study was performed to explore the factors that affect debt-use intention of young defaulters. In addition, this study compares three models that predict the intention to use debt by young defaulters: the theory of reasoned action and two variations of it. Specifically, this study proposes an extended theory of reasoned action by introducing Ao in place of the cognitive structure in the theory of reasoned action. In addition, this study proposes Ao as an independent variable that acts on BI rather than a dependent variable. Self-administered questionnaires were completed by 196 young defaulters attending a credit management education session held by the Credit Counseling & Recovery Service in Kwang-ju, Korea. Based on the study, the conclusions are as follows: the extended theory of reasoned action as proposed in this article most suitably explained the intention to use debt by young defaulters. It was also found that young defaulters were affected by attitudes toward debt, attitudes toward using debt, and subjective norms. It is therefore suggested that an attitudinal message would change the behavior effectively for young defaulters. The findings appeared to support the usefulness of the extended theory of reasoned action and the role of Ao as an independent variable as proposed in this article to explain the intention to use debt by young defaulters. These findings have an important theoretical meaning in that they modify two existing attitude theories in the context of consumer behavior.

A Basic Study on Development of VTS Control Guideline based on Ship's Operator's Consciousness (선박운항자 의식 기반 적정 관제시기 분석에 관한 기초 연구)

  • Park, Sang-Won;Park, Young-Soo
    • Journal of Navigation and Port Research
    • /
    • v.40 no.3
    • /
    • pp.105-111
    • /
    • 2016
  • In ports of Korea, the marine traffic flow is congested due to a large number of vessels coming in and going out. In order to improve the safety and efficiency of these vesse's movement, South Korea is operating with a Vessel Traffic System, which is monitoring its flow 24-7. However despite these efforts of the VTS (Vessel Traffic System) officers, marine accidents are occurring continuously in their control area. VTS Officers are controlling subjectively based on their experience due to no VTS control guideline of dangerous situation among vessels. On this paper, we listened to Busan VHF channel for 3days and analyzed the message. With collision risk model, We analyzed a moment of risk which officers advise or recommend to vessel in encounter situation, VTSO's career, and day&night.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

BeanFS: A Distributed File System for Large-scale E-mail Services (BeanFS: 대규모 이메일 서비스를 위한 분산 파일 시스템)

  • Jung, Wook;Lee, Dae-Woo;Park, Eun-Ji;Lee, Young-Jae;Kim, Sang-Hoon;Kim, Jin-Soo;Kim, Tae-Woong;Jun, Sung-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.247-258
    • /
    • 2009
  • Distributed file systems running on a cluster of inexpensive commodity hardware are being recognized as an effective solution to support the explosive growth of storage demand in large-scale Internet service companies. This paper presents the design and implementation of BeanFS, a distributed file system for large-scale e-mail services. BeanFS is adapted to e-mail services as follows. First, the volume-based replication scheme alleviates the metadata management overhead of the central metadata server in dealing with a very large number of small files. Second, BeanFS employs a light-weighted consistency maintenance protocol tailored to simple access patterns of e-mail message. Third, transient and permanent failures are treated separately and recovering from transient failures is done quickly and has less overhead.

PDO Packing Mechanism for Reducing CANopen Network Utilization (CANopen 네트워크 이용률 감소를 위한 PDO 패킹 메커니즘)

  • Kang, Min-Koo;Park, Kie-Jin;Kim, Jong-Cheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.124-133
    • /
    • 2009
  • CANopen which is one of the in-vehicle network (IVN) protocols is adopted to solve the hardware dependency problem of the CAN-based application. CANopen makes different CAN devices interoperable each others. By the advantage of the device profiling concept, it can make the period of developing CAN-based application system shorten. The utilization of CANopen network must be reduced to improve the communication performance (e.g. worst-case response time). For reducing network utilization, messages need to be packed as many as possible so that message frame overhead can be decreased. In this paper, we suggested a PDO packing mechanism using object dictionary (OD) and process data object (PDO) communication service in CANopen. Through experiments, the performance of the mechanism is evaluated with SAE benchmark. As a result, network utilization is decreased about 10% compared to the result of the previous works.

An Approach of Presenting NAVTEX message on Mobile Device using ee-INS (ee-INS를 이용한 육상안전정보시스템과의 연계를 고려한 선내 응용 미들웨어 개념 설계)

  • Lee, Seo-Jeong;Lee, Jae-Wook;Kim, Hyo-Seung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.10a
    • /
    • pp.123-124
    • /
    • 2012
  • Over the past decades, information and communication service providing safe and efficient navigation have been tried in maritime area. However, there were provided different ways such as different protocol or different policy. It made hard to serve efficiently. The introduction of MSI as a part of e-navigation development can be a kind of concepts to solve this problem. This paper tries to suggest a conceptual design of onboard application middleware to be able to communicate the shore-side maritime safety information system, take into account the reuse of open-source software.

  • PDF

Design of IoT Gateway based Event-Driven Approach for IoT related Applications (IoT 게이트웨이 기반의 이벤트 중심 접근 방식 응용프로그램 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2119-2124
    • /
    • 2016
  • The Internet of things (IoT) needs to be an event-driven approach for efficient related time response and processing. The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The gateway based RESTful technology responsible for handling clients'requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. The gateway based event-driven architecture is designed for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub.

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.