• Title/Summary/Keyword: Protocol Performance

Search Result 3,196, Processing Time 0.029 seconds

Multicast Routing Protocol for Guaranting Host Mobility (호스트 이동성 보장을 위한 멀티캐스트 라우팅 프로토콜)

  • 양승제;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.133-136
    • /
    • 2003
  • In this paper, we propose a multicast routing protocol for the seamless delivery of multicast data to mobile hosts through the optimal route in IP based mobile networks. The proposed multicast routing protocol is a hybrid method employing the merits of the bi-directional tunneling and the remote subscription by considering the mobility of mobile hosts. The proposed protocol satisfies the bound of end-to-end delay and supports the seamless handoff. The simulation results show that the proposed protocol has better performance in the number of multicast tree reconstruction and tunneling length and packet loss time than the previous protocols.

  • PDF

The Application and Effect of the Nursing Protocol of Pediatric Peripheral Intravenous Infusion (아동의 말초정맥주사 간호프로토콜 적용 및 효과)

  • Choi, Heekang;Kang, Mijung;Kang, Hyunju;Kim, Eunhye
    • Perspectives in Nursing Science
    • /
    • v.14 no.2
    • /
    • pp.45-54
    • /
    • 2017
  • Purpose: The aim of this study was to compare the effect of training and implementation of a pediatric peripheral intravenous infusion protocol on the nurses' performance and infusion complication rate. Methods: A quasiexperimental study using a posttest comparison of a one group pretest-time series design was utilized. This method was developed to measure nursing knowledge and performance based on a pediatric peripheral intravenous infusion protocol. To calculate the occurrence rate of complications, the number of complications were divided into the number of intravenous insertions. Results: It was shown that the training developed by the study team in 2015 contributed to nurses' increased knowledge, as well as improved job performance. Furthermore, the implementation of the protocol revealed that the number of peripheral intravenous insertions, an invasive procedure, decreased. Additionally, the nursing workload related to pediatric intravenous infusions was reduced. Conclusion: This protocol may contribute to the improved scientific quality and efficiency of nursing management of peripheral intravenous infusions.

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

Development and Application of Timeout Protocol on OR (수술실 타임아웃 프로토콜 개발 및 적용)

  • Park, Jeong-Sook;Kim, Eun-Hee;Lee, Hye-Ran
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.2
    • /
    • pp.353-363
    • /
    • 2008
  • Purpose: This study was conducted to develop a timeout protocol as the process of patients verification in the operating room, and to evaluate its effects. Methods: The timeout protocol was developed based on the experience of practices and the universal protocol of JCAHO 2004. The subjects of this study were 192 surgical members working in the operating room at an university hospital in Daegu, Korea. Results: The timeout protocol was developed in six steps; participants verification, encouragement of compliance, verification of right 3 PSP, agreement of surgical team members, verification of the parties to a patient, patient agreement. The data which have been resulted from the experimental group show significantly higher than those of control group as follows; cognition(t = -6.580, p = .000), contents of performance; progress of anesthesiologist as leader(${\chi}^2$ = 29.029, p = .000), verification of right patient, right site and right procedure(${\chi}^2$ = 40.663, p = .000), participation of surgical team(${\chi}^2$ = 68.412, p = .000), and the number of cases of performance(${\chi}^2$ = 242.900, p = .000). Conclusion: It suggests that medical accidents caused by failures in a preoperative verification process can be prevented if a timeout is conducted active involvement and effective communication among surgical team members for a final verification of the correct patient, procedure, and site.

  • PDF

Design of Shared Memory-based Inter-ORB Protocol for Communication Systems (통신시스템을 위한 공유메모리 기반 ORB 연동 프로토콜의 설계)

  • Jang, Ik-Hyeon;Cho, Young-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.59-70
    • /
    • 2006
  • Since communication systems software is very large and complex, it requires component based architecture for software reusability, hardware transparency, high performance, and easy software reconstruction in different applications. In order to meet these requirements, we analyze performance and inter-process communication techniques of existing CORBA IIOP, and designed a shared memory-based CORBA inter-ORB protocol that would best fit for communication systems software. The designed protocol supports the same interface and can minimize the message transfer overhead in the same host environment. The test results of our protocol compared with other protocols show that the performance is increased by about 15%-200%. We are thus assumed that our protocol can be used in developing CORBA-based component software architecture for communication systems.

  • PDF

Approximate Analysis of MAC Protocol with Multiple Self-tokens in a Slotted Ring

  • Sakuta, Makoto;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.249-257
    • /
    • 2003
  • Ring networks are very commonly exploited among local area and metropolitan area networks (LAN/MAN), whereas cells or small fixed-size packets are widely used in synchronized ring networks. In this paper, we present an analytical method for evaluating the delay-throughput performance of a MAC protocol with multiple self-tokens in a slotted ring network under uniform traffic. In our analysis, we introduce the stationary probability, which indicates the number of packets in a node. Also, it is assumed that each node has a sufficiently large amount of self-tokens, and a slotted ring has the symmetry. The analytical results with respect to delay-throughput performance have similar values to computer simulated ones. Furthermore, in order to achieve fair access under non-uniform traffic, we propose an adaptive MAC protocol, where the number of self-tokens in a node dynamically varies, based on the number of packets transmitted within a specified period. In the proposed protocol, when the number of packets transmitted by a node within a specified period is larger than a specified threshold, the node decreases the number of self-tokens in a per-node distributed method. That results in creating free slots in the ring, thus all nodes can obtain an equal opportunity to transmit into the ring. Performance results obtained by computer simulation show that our proposed protocol can maintain throughput fairness under non-uniform traffic.

A Dynamic ID Allocation Protocol for High-Performance RFID Tag (고기능 RFID 태그를 위한 동적 ID 할당 프로토콜)

  • Park Jin-Sung;Choi Myung-Ryul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

A MAC Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크를 위한 매체접근제어 프로토콜)

  • Jang, Kil-Woong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.337-344
    • /
    • 2008
  • Underwater acoustic sensor networks exhibit characteristics such as high propagation delay and low data rates, which are different from those of terrestrial wireless networks. Therefore, the conventional protocols used in wireless networks can be restrictive and inefficient when applied to underwater acoustic sensor networks. In this paper, we propose a medium access control protocol (MAC) to enhance the energy efficiency and throughput in underwater acoustic sensor networks. The proposed protocol employs a slot-based competition mechanism that reserves a time slot to send a data packet in advance. In the proposed protocol, collision between nodes can occur due to competition to obtain a slot. However, the proposed protocol minimizes the collisions between nodes because the nodes store the reservation information of the neighboring nodes, this reduces unnecessary energy consumption and increases throughput. We perform a simulation to evaluate the performance of the proposed protocol with regard to the energy consumption, the number of collision, channel utilization, throughput and transmission delay. We compare the proposed protocol with the conventional protocol, and the performance results show that the proposed protocol outperforms the conventional protocol.

Implementation of LAN-based TCP/IP Protocol Analyzer using the object-oriented programming (객체지향형 언어를 사용한 LAN 기반의 TCP/IP 프로토콜 분석기 구현)

  • 이시현;강정진;장학신;조병순;최규민;정중수
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.86-92
    • /
    • 2000
  • In this paper, we develop protocol analyzer that can analyze and monitor LAN(Local Area Network)-based TCP/IP protocol using the OOP(object-oriented programming) in Windows98/NT environment. TCP/IP(Transmission Control Protocol/Internet Protocol) protocol analyzer is consist of interface hardware, protocol analysis software and GUI(Graphic User Interface). It is designed for the real-time analysis using the real-time object. In results of Performance test, TCP/IP Protocol analyzer is showed that it can analyze and monitor without frame error in LAN-based. Also, developed protocol analyser operates better than conventional protocol analyzer in performance. It can be used in maintenance fields of communication and network.

  • PDF

Performance Improvement of Efficient Routing Protocol Based on Small End-to-End Sequence Numbers (작은 종단연결 순차번호를 이용한 효율적인 라우팅 프로토콜의 성능향상)

  • Kim, Jang-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1565-1570
    • /
    • 2014
  • In networking communication, nodes and base station send data to each nodes and destination nodes. In this perspective, it is very important to determine the direction in which data sent to each nodes or destination nodes. Ad-hoc routing protocol is a standard routing protocol that determines how the packets sent to destination. Ad-hoc routing protocol includes protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). In our efficient proposed protocol based on small end-to-end sequence numbers, route direction can be changed properly with the assistance of helper nodes. In this paper, we focus on the simulation analysis of proposed protocol and comparison with other routing protocol models such as AODV and DSR. We simulated using Network Simulator (NS-2) by parameters such as simulation time, number of nodes and packet size based on our metrics (packet delivery fraction, routing load, data throughput). Our proposed protocol based on small end-to-end sequence numbers shows better performance and superior to other two protocols.