• Title/Summary/Keyword: Negotiation Protocol

Search Result 73, Processing Time 0.026 seconds

UMMAC: A Multi-Channel MAC Protocol for Underwater Acoustic Networks

  • Su, Yishan;Jin, Zhigang
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.75-83
    • /
    • 2016
  • In this paper, we propose a multi-channel medium access control (MAC) protocol, named underwater multi-channel MAC protocol (UMMAC), for underwater acoustic networks (UANs). UMMAC is a split phase and reservation based multi-channel MAC protocol which enables hosts to utilize multiple channels via a channel allocation and power control algorithm (CAPC). In UMMAC, channel information of neighboring nodes is gathered via exchange of control packets. With such information, UMMAC allows for as many parallel transmissions as possible while avoiding using extra time slot for channel negotiation. By running CAPC algorithm, which aims at maximizing the network's capacity, users can allocate their transmission power and channels in a distributed way. The advantages of the proposed protocol are threefold: 1) Only one transceiver is needed for each node; 2) based on CAPC, hosts are coordinated to negotiate the channels and control power in a distributed way; 3) comparing with existing RTS/CTS MAC protocols, UMMAC do not introduce new overhead for channel negotiation. Simulation results show that UMMAC outperforms Slotted floor acquisition multiple access (FAMA) and multi-channel MAC (MMAC) in terms of network goodput (50% and 17% respectively in a certain scenario). Furthermore, UMMAC can lower the end-to-end delay and achieves a lower energy consumption compared to Slotted FAMA and MMAC.

Multi-lateral Concurrent Automated Negotiation for Optimal Freight Settlement (최적 수송가격 결정을 위한 다자간 동시 자동협상 방법론 개발)

  • Park, Yong-Sung;Cho, Min-Je;Choi, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Goo
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.1-12
    • /
    • 2008
  • The development of IT and explosively growing number of Internet users are rapidly spreading and developing e-commerce, while creating diverse on-line transaction methods such as a negotiation, a reverse auction, and a bid. Among these transaction methods, the transactions by means of a negotiation are being made for goods that have no posted price. In particular, the transactions by means of a negotiation are expected to be widely used in the B2B. In order to determine their transportation costs, shippers usually make negotiations with many transporters and logistics companies. And before long, these negotiations are expected to be made on an on-line automated negotiation system. Because of this, this study has tried to develop an automated negotiation methodology that is absolutely necessary for an on-line automated negotiation. This study has estimated and selected the evaluation functions for multi-lateral negotiators' proposals, thus developing an automated negotiation methodology. As a result of this study, a new direction for an automated negotiation has been suggested. Also we expect that this study will be widely used in the automated negotiation of diverse fields.

A Study On Management Protocol For Distributed Systems Management (분산시스템관리를 위한 관리 프로토콜에 관한연구)

  • 박승섭
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.289-302
    • /
    • 1999
  • As the size and complexity of network increase Distributed System Management (DSM) will be significant issue within information network in order to increase the high reliability and to improve the flexibility of network management. The OSI management model has several problems. The key problems are that it does not fully address the problem of how to develop communication protocol in support of DSM and how to classify the management connection criteria. In this paper to solve first problem described above this paper propose the connectionless CMIP to accomplish for effectively managing the distributed management managing systems to handle the dynamic informations. To work out second problem we introduce the connection criteria in the hierarchy of management system and finally evaluate the efficiency of a suggested protocol during cooperative negotiation among the managing system.

  • PDF

A Study of Characteristics and Structure of Negotiation Message using Electronic Commerce Market Classification (전자상거래 시장 유형에 따른 거래협상 문서의 특성 및 구조에 관한 연구)

  • Hong, June-S.
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.79-97
    • /
    • 2005
  • With the proliferation of EC, many customers have been participating into online auction or group-buying market over searching internet shopping-malls to purchase goods. To support the customer's convenient transaction, lots of agent systems are developed to facilitate the customer's product brokering, merchant brokering, and negotiation of transaction. However, many of these systems have focused upon supporting transaction at only one type of marketplace. Since these marketplaces have different transaction settlement mechanism, it is necessary to develop the system that utilizes the customer's transaction including the selection of the type of marketplace to buy. Then we classify the kinds of B2C electronic marketplace according to the protocol by which the market operated. The structure of negotiation message is developed using XML schema and RDFS under the characteristics and message example of each marketplace in this research.

Analyzing the Negotiation Process for the Adoption of Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing Arising from their Utilization using the Conflict Management Process (갈등 관리 프로세스에 의한 ABS협상의 갈등 사례 분석)

  • Min, Seo-Jeong;Lee, Gwan-Gyu;Kim, Joon-Soon
    • Journal of Environmental Policy
    • /
    • v.10 no.2
    • /
    • pp.3-19
    • /
    • 2011
  • Nagoya Protocol designed to establish criteria about material trade of biological genetic resources(ABS) was adopted in the 10th conference of the Parties to the Convention on Biological Diversity. In the course of the negotiation for adoption of the protocol, there was conflict between developed and developing countries, resource-rich and poor countries, and multinational corporations and environmentalists. This study investigates conflict process, subjects, issues and major factors in the negotiation case, and analyzes the negotiation by using the Conflict Management Process. To develope conflict management strategies for various conflict cases, we examine previous studies and analyze the intersectional conflict factors of this case and general cases, such as Fundamental side, Resource-allocation side, and Communication/Information-sharing side. These analyses of conflict prevention/resolution of the ABS negotiation show the importance of building mutual trust among stakeholders, enhancing mediator training, and constructing appropriate legislative/policy systems for successful conflict management.

  • PDF

Light Medium Access Control (MAC) Protocol for Wireless Universal Serial Bus (WUSB)

  • Kim, Jun-Whan;Huh, Jea-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.199-201
    • /
    • 2005
  • USB has arguably become the most successful PC peripheral interconnect ever defined. As appearing UWB, wireless USB (WUSB) emerges very popular technology. However, the distributed Medium Access Control (MAC) does not harmonize with the topology of WUSB. In this paper, we address a novel MAC protocol for conformity with WUSB. The protocol is to handle negotiation on Distributed Reservation Protocol (DRP) including the channel time slot of WUSB.

  • PDF

AN AUSTRALIAN PERSPECTIVE OF THE SUITABILITY OF THE SCL PROTOCOL'S PROVISIONS FOR DEALING WITH FLOAT FOR ADOPTION AND USE BY THE AUSTRALIAN CONSTRUCTION INDUSTRY

  • Peter Ward
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.340-349
    • /
    • 2011
  • During the negotiation and resolution of delay and disruption disputes on construction projects, the use and misappropriation of float, and the question of float ownership, are considered to be a major concern to those involved. Most practitioners and authors are of the opinion that it is an issue that should be clearly defined and addressed within the provisions of the contract. However, the terms "float" or "ownership of float" are rarely mentioned (if at all) in most of the standard forms of Australian construction contracts, giving little guidance to those involved as to how this issue should be addressed. In October 2002 the United Kingdoms Society of Construction Law (SCL) published a Delay and Disruption Protocol (the Protocol) that contains a suggested approach to the issue. The aim of this research was to obtain an Australian opinion of the suitability of the SCL's Delay and Disruption Protocols suggested approach to the issue of float and ownership of float for use by the Australian construction industry. Qualitative interviews were carried out with Australian construction industry experts experienced in the administration, negotiation, and resolution of delay and disruption disputes to obtain their opinions of the suitability of the SCL's proposed approach. Results indicate general confusion and uncertainty as to how the issue of float and float ownership should be addressed in general, with the SCL's approach adding further to that confusion.

  • PDF

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment (인프라 클라우딩(Infra Clouding) 환경에서 자가조직 저장매체의 보안을 위한 3자간 협상 프로토콜 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1303-1310
    • /
    • 2011
  • This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.

Automatic Configuration Method for the IKE Protocol based on X.509

  • Zhao, Zhen;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.917-920
    • /
    • 2008
  • The Internet Key Exchange (IKE) protocol is most widely used as a security key exchange protocol on the Internet. Security policies used by the IKE protocol must be configured in advance, however the complex options and manual settings cause inconvenience. This paper proposes an automatic configuration method for the IKE protocol based on X.509 certificate. Security policies are embedded in the certificate, read, and added into the IKE configuration file by a negotiation assistant module in order to achieve automatic IKE configuration. Our proposed method reduces the complexity of configuration process and improves the adaptability of the IKE protocol.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.