• Title/Summary/Keyword: Message layer

Search Result 177, Processing Time 0.023 seconds

Transmission Time Analysis of WAP Packet Considering RLP Layer in CDMA Wireless Channel (CDMA 무선채널에서 RLP 계층을 고려한 WAP 패킷의 전송시간 분석)

  • 문일영;노재성;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.57-60
    • /
    • 2001
  • This paper has studied the WAP packet transmission time, using WTP SAR algorithm. One method that is improved transfer ability, SAR fragmented WTP total message down from upper layer and then packet is transmitted to RLP frame time slot. In this paper, we analysis the transmission time of WAP packet with variable HLP layer size on the CDMA wireless channel for next generation systems as well as PCS, DCS. From the results, we can obtain the WAP packet transmission time and optimal WTP packet size.

  • PDF

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Designing of Dynamic Sensor Networks based on Meter-range Swarming Flight Type Air Nodes

  • Kang, Chul-Gyu;Kim, Dae-Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.625-628
    • /
    • 2011
  • Dynamic sensor network(DSN) technology which is based on swarming flight type air node offers analyzed and acquired information on target data gathered by air nodes in rotation flight or 3 dimension array flight. Efficient operation of dynamic sensor network based on air node is possible when problems of processing time, data transmission reliability, power consumption and intermittent connectivity are solved. Delay tolerant network (DTN) can be a desirable alternative to solve those problems. DTN using store-and-forward message switching technology is a solution to intermittent network connectivity, long and variable delay time, asymmetric data rates, and high error rates. However, all processes are performed at the bundle layer, so high power consumption, long processing time, and repeated reliability technique occur. DSN based on swarming flight type air node need to adopt store-and-forward message switching technique of DTN, the cancelation scheme of repeated reliability technique, fast processing time with simplified layer composition.

Development of Mobile Station in the CDMA Mobile System

  • Kim, Sun-Young;Uh, Yoon;Kweon, Hye-Yeoun;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.202-227
    • /
    • 1997
  • This paper describes the development of the CDMA mobile station to support non-speech, mobile office services such as data, fax, and short message service in addition to voice. We developed some important functions of layer 2 and layer 3. To provide non-speech services, we developed a terminal adapter and user interface software. The description of development process, software architecture and external interfaces required to provide such services is given. The description of a TTA-62 message analysis tool, a mobile station monitoring software, and an automatic test system developed for integration tests and performance measurements is also given.

  • PDF

Design and Implementation of Web Service System for secure Message Transmission in Electronic Commerce (전자상거래 환경에서의 안전한 메시지 전송을 위한 웹 서비스 시스템 설계 및 구현)

  • Park, Jong-Hoon;Kim, Chul-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1855-1860
    • /
    • 2010
  • This paper describes construction of web services system for secure message transmission appling web services standards. This system composes single sign on module, SSL module and secure message module. We applied these modules to price comparison site. Single sign on module used SAML standards. This module was designed, in order to provide authentication and authorization. As SSL module processes message encryption among end to end, messages of this system are secure. Secure message module is designed according to WS-Security standards and processes authentication, XML signature and XML encryption.

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

Investigation of wind-induced dynamic and aeroelastic effects on variable message signs

  • Meyer, Debbie;Chowdhury, Arindam Gan;Irwin, Peter
    • Wind and Structures
    • /
    • v.20 no.6
    • /
    • pp.793-810
    • /
    • 2015
  • Tests were conducted at the Florida International University (FIU) Wall of Wind (WOW) to investigate the susceptibility of Variable Message Signs (VMS) to wind induced vibrations due to vortex shedding and galloping instability. Large scale VMS models were tested in turbulence representative of the high frequency end of the spectrum in a simulated suburban atmospheric boundary layer. Data was measured for the $0^{\circ}$ and $45^{\circ}$ horizontal wind approach directions and vertical attack angles ranging from $-4.5^{\circ}$ to $+4.5^{\circ}$. Analysis of the power spectrum of the fluctuating lift indicated that vertical vortex oscillations could be significant for VMS with a large depth ratio attached to a structure with a low natural frequency. Analysis of the galloping test data indicated that VMS with large depth ratios, greater than about 0.5, and low natural frequency could also be subject to galloping instability.

Analysis of Response Characteristics of CAN-Based Feedback Control System Considering Message lime Delays (메시지 지연시간을 고려한 CAN 기반 피드백 제어시스템의 응답특성 분석)

  • Jeon, Jong-Man;Kim, Dae-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.5
    • /
    • pp.190-196
    • /
    • 2002
  • In this paper, the response characteristics of CAN-based feedback control system are analyzed when message time delays through the network are considered. The message time delays are composed of computation time delay and communication time delay. The application layer of CAN communication is modeled mathematically to analyze two time delays, and the communication time delay is redefined under several assumption conditions. The CAN-based feedback control system is proposed as a target system that is the machining system with the three axes. The response characteristics of time delays in the proposed system are analyzed through computer simulations, and can be improved by the compensation using the PID tuning method to satisfy the design specifications of the system.

CoAP-based Reliable Message Transmission Scheme in IoT Environments

  • Youn, Joosang;Choi, Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.79-84
    • /
    • 2016
  • In this paper, we propose reliable message transmission scheme based on CoAP, considering the constrained feature of IoT device, such as low power, the limited memory size and low computing capacity. Recently, the various kinds of application protocol has been studied to support IoT environments. In particular, CoAP protocol was developed as application protocol for IoT at the IETF core WG. However, because CoAP protocol is deigned to be used in constrained node, this protocol uses UDP at transport layer. Thus, data loss may occur frequently in network congestion environments. The proposed scheme, in this paper, is to overcome the problem of frequent data loss with low overhead. Also it includes the function which is to minimize the data loss in sleep mode of IoT device.

An LV-CAST algorithm for emergency message dissemination in vehicular networks (차량 망에서 긴급 메시지 전파를 위한 LV-CAST 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1297-1307
    • /
    • 2013
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or disseminate useful traffic information to othet vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collision at the link layer due to an excessive number of broadcast packets. To solve broadcast storm problem, we propose an RPB-MACn-based LV-CAST that is a vehicular broadcast algorithm for disseminating safety-related emergency message. The proposed LV-CAST identifies the last node within transmission range by computing the distance extending on 1 hop from the sending node of an emergency message to the next node of receiving node of the emergency message, and the last node only re-broadcasts the emergency message. The performance of LV-CAST is evaluated through simulation and compared with other message dissemination algorithms.