• Title/Summary/Keyword: Message layer

Search Result 177, Processing Time 0.026 seconds

Efficient Flooding Algorithm for Mobile P2P Systems using Super Peer (슈퍼피어를 이용한 모바일 P2P시스템을 위한 효율적인 플러딩 알고리즘)

  • Kang, So-Young;Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.217-221
    • /
    • 2010
  • As the appearances of various new mobile devices and the explosive growth of mobile device users, many researches related to mobile P2P systems have been proceeded actively. In this paper, we propose a new search algorithm for the double-layered super peer system in the mobile environment. For the proposed search algorithm, we divide the entire experiment region into a grid of cells, each of which has the same size. The grid is configured properly by considering the communication range of a mobile device and the number of peers in the system. The proposed search algorithm is a partial flooding search method based on the directions of cells involved with the search. It reduces successfully the network traffic, but shows a low search hit ratio. To enhance the search hit ratio, we introduce a bridge-peer table for a super peer and utilize an n-way search. The experimental results show that the proposed algorithm made an average of 20~30% reduction in the number of message packets over the double-layered system. The success ratio was also improved about 2~5% over the double-layered system.

Authentication Interworking Protocol based on Media Independent Handover in Heterogeneous Networks (MIH 기반의 이기종 네트워크 환경에서 대리 서명을 이용한 인증 연동 프로토콜)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.86-94
    • /
    • 2010
  • This paper proposed an authentication interworking protocol (AIP) based on IEEE 802.21 MIH in the heterogeneous networks. The proposed AIP using the RSA signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AIP TLV in MIH frame format and uses the MIH Information Server (MIHIS) for proxy signature issue instead of the authentication server for the heterogeneous networks. For low handover delay, the proposed AIP performs pre-authentication processes with MIH protocol before layer 2 handover. Also, this paper analyzed the performance of the handover and compared with the non-secure MIH protocol.

Modeling and Interoperability Test Case Generation of a Real-Time QoS Monitoring Protocol

  • Chin, Byoung-Moon;Kim, Sung-Un;Kang, Sung-Won;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.52-64
    • /
    • 1999
  • QoS monitoring is a kind of real-time systems which allows each level of the system to track the ongoing QoS levels achieved by the lower network layers. For these systems, real-time communications between corresponding transport protocol objects is essential for their correct behavior. When two or more entities are employed to perform a certain task as in the case of communication protocols, the capability to do so is called interoperability and considered as the essential aspect of correctness of communication systems. This paper describes a formal approach on modeling and interoperability test case generation of a real-time QoS monitoring protocol. For this, we specify the behavior of flow monitoring of transport layer QoS protocol, i.e., METS protocol, which is proposed to address QoS from an end-to-end's point of view, based on QoS architecture model which includes ATM net work in lower layers. We use a real-time Input/Output finite State Machine to model the behavior of real-time flow monitoring over time. From the modeled real-time I/OFSM, we generate interoperability test cases to check the correctness of METS protocol's flow monitoring behaviors for two end systems. A new approach to efficient interoperability testing is described and the method of interoperability test cases generation is shown with the example of METS protocol's flow monitoring. The current TTCN is not appropriate for testing real-time and multimedia systems. Because test events in TTCN are for message-based system and not for stream-based systems, the real-time in TTCN can only be approximated. This paper also proposes the notation of real-time Abstract Test Suite by means of real-time extension of TTCN. This approach gives the advantages that only a few syntactical changes are necessary, and TTCN and real-time TTCN are compatible. This formal approach on interoperability testing can be applied to the real-time protocols related to IMT-2000, B-ISDN and real-time systems.

  • PDF

An Implementation of the RGB Remote Controller for LED Emotion Lighting of AtoN Facilities (항로표지 시설의 LED 감성조명을 위한 RGB 원격 콘트롤러의 구현)

  • Jeong, Yeong-Cheol;Choi, Jo-Cheon;Cho, Dae-Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.5
    • /
    • pp.475-480
    • /
    • 2012
  • This study on the methode is easied to distinguish with emotional visual lighting on AtoN facility using 3colors LED, and which is controlled to on-off switching of approach light in shore or harbor. The identification have easied to provide a differentiation between the AtoN facility of red and white light and surrounding light in harbor both sides. And the integrated controller have designed to left-right and serial sequential lighting system for harbor guidance using the GPS synchronous or timer. There is expectation effect that is prevent a confusion about distinguish of facility by ship's operator and to beautify a night scene of harbor, which is expressed to emotional identification lighting and variable color lighting on AtoN body by vertical layer color lighting using LED. In addition, the performance of AtoN is implemented to display with guidance light the harbor safety message by morse code lighting. Effectiveness of system is enhanced that age and power consumption reduce by candle alternated high light LED.

A Packet Collision Avoidance Technique in IEEE1609.4 Based Time Synchronization Multi-channel Environment (IEEE1609.4 기반 시간 동기 멀티채널 환경에서의 패킷 충돌 회피 기법)

  • Jin, Seong-Keun;Lim, Ki-Taeg;Shin, Dae-Kyo;Yoon, Sang-Hun;Jung, Han-Gyun
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.385-391
    • /
    • 2015
  • In this paper, we analyze the communication performance in a time synchronous multi-channel environment and deal with a packet collision avoidance technique to improve it based on IEEE1609.4 for increasing the efficiency of the control channel IEEE802.11p WAVE communication system. In previous works, they tried to solve this problem by message scheduling method on application layer software or changing the value of the random back-off optionally Contention Window. In this paper, we propose a method for adjusting the Channel Guard Interval for packet collision avoidance. The performance was evaluated by the actual vehicle test. The result was confirmed performance over 90% PDR(Packet Delivery Ratio).

Development of Interactive Content Services through an Intelligent IoT Mirror System (지능형 IoT 미러 시스템을 활용한 인터랙티브 콘텐츠 서비스 구현)

  • Jung, Wonseok;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.472-477
    • /
    • 2018
  • In this paper, we develop interactive content services for preventing depression of users through an intelligent Internet of Things(IoT) mirror system. For interactive content services, an IoT mirror device measures attention and meditation data from an EEG headset device and also measures facial expression data such as "sad", "angery", "disgust", "neutral", " happy", and "surprise" classified by a multi-layer perceptron algorithm through an webcam. Then, it sends the measured data to an oneM2M-compliant IoT server. Based on the collected data in the IoT server, a machine learning model is built to classify three levels of depression (RED, YELLOW, and GREEN) given by a proposed merge labeling method. It was verified that the k-nearest neighbor (k-NN) model could achieve about 93% of accuracy by experimental results. In addition, according to the classified level, a social network service agent sent a corresponding alert message to the family, friends and social workers. Thus, we were able to provide an interactive content service between users and caregivers.

Test Case Generation for Conformance Test of DSM-CC U-U (DSM-CC U-U 적합성 시험을 위한 시험열 생성)

  • Kim, Young-Gyu;Lee, Ok-Bin;Kim, Hak-Suh;Kwon, Young-Duk;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2171-2178
    • /
    • 1999
  • In these days, as rapid growth of multimedia industries and development of techniques, and effort to develop DAVIC(Digital Audio-Visual Council) systems which support multimedia services such as VOD(Video onn Demand) and teleshopping is being done. Therefore it will be indispendable to establish a new conformance testing method related DAVIC system with respect to their standard specification. DSM-CC is a core part of DAVIC and adopts DSM-CC U-N for S3 information stream which plays a part in connection establishment and release of session and transmission layer, and DSM-CC U-U for S2 which operates user application of the system. In this paper, we propose a new conformance testing architecture and methodology based on scenario in order to test DSM-CC U-U which doesn't have any message sequences.

  • PDF

Evaluation of Security Protocols for the Session Initiation Protocol (SIP 보안 프로토콜의 성능 분석)

  • Cha, Eun-Chul;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.55-64
    • /
    • 2007
  • Behind the popularity of VoIP in these days, it may present significant security challenges in privacy and accounting. Authentication and message encryption are considered to be essential mechanisms in VoIP to be comparable to PSTN. SIP is responsible for setting up a secure call in VoIP. SIP employs TLS, DTLS or IPSec combined with TCP, UDP or SCTP as a security protocol in VoIP. These security mechanisms may introduce additional overheads into the SIP performance. However, this overhead has not been understood in detail by the community. In this paper we present the effect of the security protocol on the performance of SIP by comparing the call setup delays among security protocols. We implement a simulation of the various combinations of three security protocols and three transport layer protocols suggested for SIP. UDP with any combination of security protocols performs a lot better than the combination of TCP. TLS over SCTP may impose higher impact on the performance in average because TLS might have to open secure channels as the same number of streams in SCTP. The reasons for differences in the SIP performances are given.

Fast Handoff Technique using Improved Cashing Agent and CoA Pool in Mobile IP (모바일 아이피에서 개선된 캐싱 에이전트와 CoA 풀을 사용한 빠른 핸드오프 기법)

  • Lee, Jang-Su;Kim, Sung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.75-82
    • /
    • 2008
  • Mobile IP was proposed to overcome identity problem of original IP address system caused by mobility of wireless mobile host. To complete its network handoff procedure, it must receive a mobile advertisement broadcasted by mobile agent. Generally, in a mobile IP system, mean time delay, 500ms, in a network handoff procedure is a critical problem of wireless service such as Voip, multimedia streaming. A caching agent caches a latest mobile advertisement, and replays it by receiving solicitation message from a mobile node finishing link layer detection. But, during the procedure of mobile registration, many packets from service provider to the mobile host would be lost and handoff time delay would be increased. In this thesis, we propose an unproved caching agent technique which can forward data packets while handoff procedure, and CoA pool for fast mobile IP registration.

Hybrid Priority Medium Access Control Scheme for Wireless Body Area Networks (무선 인체통신 네트워크를 위한 복합 우선순위 MAC 기법)

  • Lee, In-Hwan;Lee, Gun-Woo;Cho, Sung-Ho;Choo, Sung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1305-1313
    • /
    • 2010
  • Last few years, wireless personal area network (WPAN) has been widely researched for various healthcare applications. Due to restriction of device hardware (e.g., energy and memory), we need to design a highly-versatile MAC layer protocol for WBAN (Wireless Body Area Network). In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. This paper presents a priority mechanism referred to as hybrid priority MAC for WBAN. Through extensive simulation, we show the proposed MAC protocol can minimize the average packet latency for urgent data. Thus, when patients have an emergency situation, our MAC allows adequate assistance time and medical treatment for patients. The simulation based on NS-2 shows that our Hybrid Priority MAC has the good performance and usability.