• Title/Summary/Keyword: Message Transmission Protocol

Search Result 229, Processing Time 0.028 seconds

Total Ordering Algorithm over Reliable Multicast Protocol using Token Passing Mechanism (멀티캐스트 프로토콜상에서 토큰 전달 방법을 이용한 전체 순서화 알고리즘)

  • Won, Yu-Jae;Yu, Gwan-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2158-2170
    • /
    • 1999
  • It has been required more reliable communication on processes and improvement of system performance as distributed systems using multicast protocol became widespread. In distributed environment maintaining data consistency through asynchronous execution of processes and coordinating the activities of them would occurs. This paper proposes a total ordering algorithm, TORMP, in order to resolve these problems. TORMP takes advantage of multicast protocol and uses an effective token passing method. It reduces a process delaying time before transmitting its message by multicasting a token simultaneously to every process that initiates the request of the message. Moreover, the processes receiving the token start multicasting the message at the same time, which causes to cut down the overall transmission dely. In case that one process sends a message, TORMP hardly uses the procedure of controlling for ordering. It gives fairly the right of sending messages to all processes in a group with utilizing vector clock. In TORMP, unlike other algorithms, the number of packets generated during ordering process does not depend on the number of processes.

  • PDF

Packet Data Performance Measurement in D-TRS Wireless Network Environment (D-TRS 무선망 환경에서의 패킷 데이터 성능 측정)

  • Song, Byung-Kwen;Jin, Myung-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.6
    • /
    • pp.902-908
    • /
    • 2009
  • TETRA is the standard of Digital Trunked Radio System developed by the ETSI (European Telecommunications Standards Institute). It is currently adopted as Electric Power IT Wireless Backbone Network in Korea, and a national enterprise is going on for versatile utilization of TETRA. To use TETRA wireless network, TETRA modem is very necessary such that performance measurements are very crucial for each TETRA modem by various manufacturers. In this paper, PED (Protocol Evaluation Data) is suggested for PD performance measurement in D-TRS wireless network environment. The performance measurements for different data lengths and transmission intervals are done using TG (Traffic Generator) on Test Bed. The data size is increased by 10 bytes from 10-byte to 400-byte, and it is measured 1,000 times for each transmission interval of 0.5, 1.0, and 1.5 seconds. Based on the transmission time measured, average transmission speed and MER (Message Error Rate) are derived for TETRA Modem performance measurement. Two TMR880i's of EADS are used for TETRA modem, and SwMI (Switching and Management Infrastructure) of EADS is used for switching system in this paper.

A Non-Linear Overload Control Scheme for SIP Proxy Queues (SIP 프록시 큐의 비선형적 과부하 제어 방법)

  • Lee, Jong-Min;Jeon, Heung-Jin;Kwon, Oh-Jun
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Recently, the Internet telephony has been used rather than the traditional telephony by many Internet users, with low cost. Session Initiation Protocol(SIP) is the standard of application layer protocol for establishment and disconnection of the session for Internet telephony. SIP mainly runs over the UDP for transport. So in case of the loss of the INVITE request message, the message is retransmitted by an appropriate timer for reliable transmission of the UDP message. Though the retransmission is useful for ensuring the reliability of SIP messages sent by the users, it may cause the overload traffic in the SIP proxy server. The overload in SIP proxy servers results in the loss of many input messages. This paper presents a non-linear overload control algorithm to resolve the overload condition of the server. we simulate our proposed algorithm using the network simulator ns-2. The simulation results show that the throughput of the server with the proposed algorithm have been improved about 12% compared to the existing linear control algorithm.

MPMTP-AR: Multipath Message Transport Protocol Based on Application-Level Relay

  • Liu, Shaowei;Lei, Weimin;Zhang, Wei;Song, Xiaoshi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1406-1424
    • /
    • 2017
  • Recent advancements in network infrastructures provide increased opportunities to support data delivery over multiple paths. Compared with multi-homing scenario, overlay network is regarded as an effective way to construct multiple paths between end devices without any change on the underlying network. Exploiting multipath characteristics has been explored for TCP with multi-homing device, but the corresponding exploration with overlay network has not been studied in detail yet. Motivated by improving quality of experience (QoE) for reliable data delivery, we propose a multipath message transport protocol based on application level relay (MPMTP-AR). MPMTP-AR proposes mechanisms and algorithms to support basic operations of multipath transmission. Dynamic feedback provides a foundation to distribute reasonable load to each path. Common source decrease (CSD) takes the load weight of the path with congestion into consideration to adjust congestion window. MPMTP-AR uses two-level sending buffer to ensure independence between paths and utilizes two-level receiving buffer to improve queuing performance. Finally, the MPMTP-AR is implemented on the Linux platform and evaluated by comprehensive experiments.

Power control protocol for reduction of energy consumption in Wireless Sensor Netoworks (무선 센서 네트워크 환경에서 노드의 에너지 소비 절감을 위한 파워 제어 프로토콜)

  • Han Jung-ahn;Kim Yn-hyng;Kim Byung-gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.28-36
    • /
    • 2005
  • Wireless Sensor Networks are the technology, in which various applications such as surveillance and information gathering are possible in the uncontrollable area of human. And numerous studies are being processed for the application of ubiquitous network environment. One of major issues in sensor network is the research for prolonging the lifetime of nodes through the use of various algorithms, suggested in the mac and routing layer. In this paper, aiming at reducing energy waste, caused by redundant transmission and receipt message, we propose the mac protocol using active signal and analysis performance through simulation.

The Performance of Multistage Cooperation in Relay Networks

  • Vardhe, Kanchan;Reynolds, Daryl
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.499-505
    • /
    • 2015
  • We analyze the performance of multistage cooperation in decode-and-forward relay networks where the transmission between source and destination takes place in $T{\geq}2$ equal duration and orthogonal time phases with the help of relays. The source transmits only in the first time phase. All relays that can decode the source's transmission forward the source's message to the destination in the second time phase, using a space-time code. During subsequent time phases, the relays that have successfully decoded the source message using information from all previous transmitting relays, transmit the space-time coded symbols for the source's message. The non-decoding relays keep accumulating information and transmit in the later stages when they are able to decode. This process continues for T cooperation phases. We develop and analyze the outage probability of multistage cooperation protocol under orthogonal relaying. Through analytical results, we obtain the near-optimal placement strategy for relays that gives the best performance when compared with most other candidate relay location strategies of interest. For different relay network topologies, we also investigate an interesting tradeoff between an increased SNR and decreased spectral efficiency as the number of cooperation stages is increased. It is also shown that the largest multistage cooperation gain is obtained in the low and moderate SNR regime.

Performance Analysis of the DQDB Protocol (DQDB (Distributed Queue Dual Bus) 프로토콜의 성능분석)

  • 이창훈;박광만;홍정완
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.19 no.3
    • /
    • pp.1-14
    • /
    • 1994
  • In this paper, an analytical model of the message delay in the DQDB (Distributed Queue Dual Bus) network is investigated. The DQDB network has been adopted as a subnetwork for the IEEE 802 MAN (Metropolitan Area Network) standard. The DQDB network consists of two high speed undirectional buses and a series of stations attached to both of the buses. Massages arriving at each station consists of severla packets according to its size. This system is approximated into " $B^{[x]}$/G/1 with exceptional first service queueing " by defining the concept of service time on a packet. The service time for a packet is defined as the time from the instant the packet arrives at the transmission buffer until the time the packet is fully transmitted. By using the BASTA property and the average work in the system, the mean message delay time is obtained.age work in the system, the mean message delay time is obtained.d.

  • PDF

Routing Attack Detection for Performance Enhancement of AODV Protocol In Mobile Ad Hoc Networks (모바일 Ad Hoc 네트워크에서 AODV 프로토콜의 성능 향상을 위한 라우팅 공격 탐지)

  • Lee, Jae-Young;Choi, Seung-Kwon;Lee, Byong-Rok;Kim, Sun-Chul;Sin, Byoung-Gon;Cho, Yong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.632-641
    • /
    • 2007
  • Since the mobile node acts as the router, the Mobile Ad Hoc network requires the security methods that are different from that of network of the wire environment. Also, since the total network can't be included in the transmission area of the mobile node, when one node sends the message to the other node, we need the middle node. But if the middle node is the unreliable malicious node, we can't guarantee the secure message transmission. Also, because all nodes configuring the network are the mobile nodes, they use the restricted battery capacity and the restricted resources. Therefore, because we have trouble performing the encryption that many resources are required when we sending the message, it is vulnerable to the security than the network of the wire environment. Last, because the network topology continues to change by the mobility of nodes configuring the network, we need the security measure that matches the network characteristics. We suggest the routing attack detection for performance enhancement of AODV protocol in Mobile Ad Hoc networks.

Speech Recognition based Message Transmission System for the Hearing Impaired Persons (청각장애인을 위한 음성인식 기반 메시지 전송 시스템)

  • Kim, Sung-jin;Cho, Kyoung-woo;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1604-1610
    • /
    • 2018
  • The speech recognition service is used as an ancillary means of communication by converting and visualizing the speaker's voice into text to the hearing impaired persons. However, in open environments such as classrooms and conference rooms it is difficult to provide speech recognition service to many hearing impaired persons. For this, a method is needed to efficiently provide it according to the surrounding environment. In this paper, we propose a system that recognizes the speaker's voice and transmits the converted text to many hearing impaired persons as messages. The proposed system uses the MQTT protocol to deliver messages to many users at the same time. The end-to-end delay was measured to confirm the service delay of the proposed system according to the QoS level setting of the MQTT protocol. As a result of the measurement, the delay between the most reliable Qos level 2 and 0 is 111ms, confirming that it does not have a great influence on conversation recognition.

An Implementation of communication protocol between control centers (전력제어센터간의 ICCP에 구현에 관한 연구)

  • Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • Proceedings of the KIEE Conference
    • /
    • 1998.11a
    • /
    • pp.226-228
    • /
    • 1998
  • Current power systems are integrated and operated in the form of EMS/SCADA with the development of computer and communication. With this EMS/SCADA system, the production, transmission and distribution of power are effectively operated. But if the communication protocol are different from each other, it is difficult to integrate the whole system. To solve this problem, Electric Power Research Institute (EPRI) issued new standard communication protocol between control centers named Inter-Control Center Protocol (ICCP). ICCP specifies the use of Manufacturing Message Specification(MMS) for the messaging services needed by ICCP in layer 7 and support the communication between heterogeneous control centers. This study deals the characteristics of ICCP, relation between ICCP and MMS and also implements the data exchange between control centers using ICCP.

  • PDF