• Title/Summary/Keyword: Request for Proposal

Search Result 79, Processing Time 0.02 seconds

An Efficient PFMIPv6 and WLAN Interworking Scheme for Fast Handover (고속 핸드오버를 위한 PFMIPv6와 무선랜의 효율적인 연동 방안)

  • Park, Min-Ji;Min, Sang-Won;Kim, Bok-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.174-180
    • /
    • 2012
  • As the number of a smart phone user over the world surprisingly grows and a wireless Internet market expands, service requirement of a mobile terminal is increasing. However, because there is no consideration of mobility in the early standard step, it is difficult to expect to improve the service performance in handover procedure. This paper proposes a PFMIPv6 handover scheme by using probe request message and authentication message and by using buffering scheme in IEEE 802.11. In addition, we simulated this proposal scheme and verified that the proposed handover scheme is improved in terms of handover delay, and average FTP throughput during the handover period.

An Approach for Multi-User Multimedia Requests Service to Overlay Multicast Trees (다중 사용자의 멀티미디어 요구 서비스를 위한 오버레이 멀티캐스트 트리의 구성과 복구 방안)

  • Kang, Mi-Young;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1058-1065
    • /
    • 2008
  • In the Internet, as computer resource is developed, multimedia data request being increase more and more. It is effective way that process both high capacity-data and real-time data. Overlay Multicast is an effective method for efficient utilization of system resources and network bandwidth without using hardware customization. Overlay Multicast is an effective method for multimedia data service to multi-users. Multicast tree reconstruction is required when a non-leaf host leaves or fails. In this paper, relay-frame interval is selected as revealed network-state with jitter. In our proposal, multi-user service control algorithm gives a delay effect in multimedia request time. The simulation results show that our proposal takes shorter period of time than the other algorithms to reconstruct a similar tree and that it is a more effective way to deal with a lot of nodes that have lost their multi-user nodes.

A Handover Algorithm by Buffering at the Home Agent (홈 에이전트의 버퍼링에 의한 핸드오버 알고리즘)

  • Heo, Seong-Jin;Kim, Jeong-Sam;Lee, Yon-Yeol;Han, Ki-Jun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.25-33
    • /
    • 1999
  • This paper proposes a handover algorithm for the mobile host in order to reduce the number of unnecessary retransmissions during handover. In our proposal, the home agent buffers user data after receiving the registration request message form the foreign agent and then transmits them again after a predefined time. We also analyze the packet disordering probability between two user data under an assumption that the home agent generates all user data. One of two user data is the one which has been generated just before the home agent receives the registration request message and the other is generated just after that. Simulation results show that our proposal provides efficient handover for a mobile host by reducing the packet disordering probalility.

  • PDF

A Datagram Delivery Strategy for Reducing Retransmission Overheads During Handover (핸드오버시 재전송 부담 감소를 위한 데이터그램 전송 정책)

  • Heo, Seong-Jin;Kim, Jeong-Sam;Jeong, Jae-Yeol;Kang, Sang-Yong;Han, Ki-Jun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.1
    • /
    • pp.20-28
    • /
    • 1999
  • In this paper, we propose a new datagram delivery strategy at the home agent to improve the end-to-end performance by reducing retransmission overheads during handover. Changed routing might be able to cause packet disordering and this in turn could cause unnecessary retransmission at the fixed host and finally results in performance degradation. In our proposal, the home agent begins to buffer received datagrams instead of transmitting them after receiving a registration request message from the foreign agent and then transmits them again after for a certain time. Simulation results show that our proposal may successfully solve this problem at little cost.

  • PDF

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

Improvement Factors of Promoter Selection Evaluation Criteria for Build-Transfer-Lease Private Participation in Infrastructure Projects (BTL사업의 사업시행자 평가기준 개선 요인 분석)

  • Shin, Hyun-In;Park, Tae-Keun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.310-316
    • /
    • 2006
  • Since 'Act on Private Participation in Infrastructure' were changed in January 2005, BTL(Build-Transfer-Lease) projects of Private Participation in Infrastructure was introduced in the domestic construction market for the purpose of providing public facilities with the public. Selecting the most qualified Promoter should be considered discreetly in BTL projects because BTL projects is for projects with approximately thirty year project life cycle, plan, construction, operating, maintenance and obviously the success of the project totally depends on the capability and role of Promoter. However, score for cost is likely to influence selecting Promoter to take the project. Accordingly, low bid contract with too much competition could decrease the quality of the construction plan and operating plan. Thus, this study did preliminary research and documents on problems of evaluation criteria for selecting Promoter in BTL projects, and proposed improvement factors by doing questionnaire over specialists of each field.

  • PDF

A Study on Technology Evaluation Process Model for the Enterprise Selection (업체선정을 위한 기술평가 프로세스 모델에 관한 연구)

  • Son Yong-Soo;Ko Hoon;Shin Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.769-776
    • /
    • 2006
  • It is important for evaluation execution about technology development. And it is necessary to settle together with technology development activity to evaluation execution. Purpose of this paper is to decide request for proposal and suitable to proposed enterprise contents about technology part in performance. Therefore let estimate the data about it. So suitable enterprise is selected through applying evaluation data to TEPM(Technology Evaluation Process Model).

A Case Study on System Assurance for Platform Screen Door in Urban Transit (도시철도 승강장 스크린도어의 시스템보증 사례 연구)

  • Lee, Hwan-Deok;Jung, Won
    • Journal of Applied Reliability
    • /
    • v.13 no.4
    • /
    • pp.287-298
    • /
    • 2013
  • This paper presents a case study of PSD(Platform Screen Door) system assurance based on EN50126 life-cycle stage. By applying this system assurance, the accidents related to urban light transit railway especially that caused casualties could be reduced tremendously. This case study contributes significantly to the reliability, availability, maintainability and safety of the PSD system. Request For Proposal (RFP) of a rail road operator in which required by RAMS is prepared in which to ensure all system assurance activity and safety assessment are compulsory. The step-by-step activities and related deliverables are used which include functional analysis, FMECA, hazard identification analysis, system hazard analysis, maintainability analysis, FRACAS, and finally verification and validation of the system.

Proposal for the Design of the Oriental Medical Doctor's Gown (한의사 가운 디자인 제안)

  • 서옥경
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.11
    • /
    • pp.113-121
    • /
    • 2003
  • Recently the status of oriental medicine in Korea has been more increased as the alternative medicine which overcome the limitations of western medicine. With the increased status, the development of the oriental medical doctor's gown which is distinguished from that of western medical doctor has been brought up among the oriental medical doctors' group since the middle of 1990. We carried out the former study to know the development's direction of the present oriental medical doctor's gown by the survey the requisites for the oriental medical doctor's gown which they want(OK Suh, 2002). We aim to propose the developed design of the oriental medical doctor's gown which meet their request and has honored tradition according to the data of the former survey. As the result of the production designing of the oriental medical doctor's gown considering tradition, practicality, appreciation of the beautiful etc., in our study, we could lead to distribute 800 gowns through the Association of Korean Oriental Medicine supporting by the brand of Amorepacific's Sulhasoo.