• Title/Summary/Keyword: Transfer Protocol

Search Result 755, Processing Time 0.032 seconds

Simulation of Time Delay Communication algorithm In the Shallow Underwater Channel

  • Yoon, Byung-Woo;Eren Yildirim, Mustafa
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.1
    • /
    • pp.44-49
    • /
    • 2011
  • The need of data transmission in oceans and other underwater mediums are increasing day by day, so as the research. The underwater medium is very different from that of air. Propagation of electromagnetic wave in water or underground is very difficult because of the conductivity of the propagation materials. In this case, we usually use acoustic signals as ultrasonic but, they are not easy to transfer long distance with coherent method because of time varying multipaths, Doppler effects and attenuations. So, we use non-coherent methods such as FSK or ASK to communicate between long distances. But, as the propagation speed of acoustic wave is very slow, BW of the channel is narrow. It is very hard to guaranty the enough speed for the transmission of digital image data. In previous studies, we proposed this data communication protocol theoretically. In this paper, an underwater channel is modeled and this protocol is tested in this channel condition. The results show that the protocol is 4-6 times faster than ASK. Some relations and results are shown depending on the data length, channel length, bit rate etc.

Implementation of An Efficient Reader Protocol for Active RFID Readers (능동형 RFID 리더를 위한 효율적인 리더 프로토콜의 구현)

  • Moon, Young-Sik;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.822-829
    • /
    • 2009
  • A reader protocol is an interface between a host and RFID readers. There are several standards for reader protocol such as EPCglobal Low Level Reader Protocol (LLRP) 1.0.1, EPCglobal Reader Protocol (RP) 1.1, and ISO/IEC 15961/15962. Unfortunately, these standards focus on the passive RFID system, and so they are not appropriate for the active RFID system. In this paper, we implemented an efficient reader protocol for the active RFID system, which is based on EPCglobal LLRP 1.0.1, but smoothing/filtering functions of EPCglobal RP 1.1 are added. This protocol is designed to configure air interface parameters for active RFID readers and tags. It can reduce the amount of data transfer between the reader and host by filtering function, and can improve the performance of tag collection by smoothing function. In addition, it can remove inefficiency caused by tag memory data change according to the standards of ISO/IEC 15961/15962. In the real-world environment, we evaluated the performance of our implemented reader protocol using one RFID reader and 45 tags.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Hormone induced recipients for embryo transfer in mice

  • Lee, Yeonmi;Kang, Eunju
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.36 no.4
    • /
    • pp.247-252
    • /
    • 2021
  • Embryo transfer (ET) in the animal is an important procedure to generate genetically engineered animals and conserve genetic resources. For ET experiments in mice, pseudopregnant recipients are usually prepared with proestrus stage of females and vasectomized males. However, this conventional method is inefficient because the size of female colonies should be large to select only the proestrus stage in the estrous cycle and the surgical procedures are required to generate vasectomized males. In this study, we established a simple and efficient protocol to prepare ET recipients using the estrous synchronization with hormone injection and the mating with wild male mice. The delivery rate of ET recipients tended to be increased with estrous synchronization using hormone injection (100%) compared to the conventional method (71%). Further, natural pregnancy of the recipients, induced by mating with a wild male, significantly enhanced the birth rate of ET offspring than the conventional method (33% vs. 13%). Based on the results, we concluded that our new protocol using hormone injection to ET recipients and mating with wild males could be more efficient and simpler compared to the conventional method.

Embryo transfer of dorper breed to Mongolian sheep

  • Chuluunbayar Uuganbayar;Tsolmonbaatar Boldsaikhan;Byambasaikhan Danzan-Osor;Ho-Jun Lee;Sang-Hwan Kim;Enkhbolor Barsuren
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.37 no.4
    • /
    • pp.226-230
    • /
    • 2022
  • The sheep can be reproduced by natural mating as well as applied reproductive biotechnology, embryo transfer (ET). However, this method in sheep is influenced by several factors such as season, photoperiod, latitude, temperature, nutrition, and breed. In addition, there is still less research on assisted reproductive technologies in small ruminants, compared to other livestock species such as cattle and pigs. Because there has been a need for an optimization and a continuous improvement of ET techniques in small ruminants. the main objective of this study was to evaluate the conception rate obtained after ET in Mongolian sheep (Dorper breed). After embryo recover, code 1 and 2 embryos (morula or blastocyst stage) for ET in the present study were 63% (63/100) and 24% (24/100), respectively. Then Each single embryo was transferred to a synchronized recipient who prepared by estrous synchronization protocol with fluorogestone acetate-cloprostenol sodium. The results demonstrated that an average conception rate and lambing rate was 35.6% (31/87) and 33.3% (29/87), respectively. Further study is still necessary, but these results indicated that single embryo of Mongolian sheep with the present protocol was enough to conducting ET when the genetically superior sheep were necessary to be expanded.

Design and Implementation of QoS Management Platform for Effective Multimedia Data Transfer (멀티미디어 데이터의 효율적인 전송을 위한 QoS 관리 플랫폼의 설계 및 구현)

  • 남경철;김성환;최기호
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.323-326
    • /
    • 2000
  • 시간에 의존적인 대용량의 멀티미디어 데이터를 다양한 네트웍 환경에 맞도록 전송하는 방법이 다양하게 연구되고 있다. 또한 멀티미디어 데이터를 실시간으로 전송하기 위한 프로토콜로 RTP(Real-time Transport Protocol)을 적용하여 하고 있으며, 다양한 상태의 네트웍을 통한 전송에 대한 피드백(feedback) 정보인 RTCP(Real-time Transport Control Protocol) 정보를 이용하여 QoS(Quality of Service)를 관리하는 메커니즘이 연구되고 있다. 본 논문에서는 RTP/RTCP 기반의 실시간 멀티미디어 데이터 전송을 위하여 멀티캐스팅(multicasting) 환경 하에서 각기 다른 대역 폭에 대한 동적인 QoS 관리 플랫폼을 제안한다.

  • PDF

Efficient routing in multicast mesh by using forwarding nodes and weighted cost function

  • Vyas, Kapila;Khuteta, Ajay;Chaturvedi, Amit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.5928-5947
    • /
    • 2019
  • Multicast Mesh based Mobile Ad-hoc NETworks (MANETs) provide efficient data transmission in energy restraint areas without a fixed infrastructure. In this paper, the authors present an improved version of protocol SLIMMER developed by them earlier, and name it SLIMMER-SN. Most mesh-based protocols suffer from redundancy; however, the proposed protocol controls redundancy through the concept of forwarding nodes. The proposed protocol uses remaining energy of a node to decide its energy efficiency. For measuring stability, a new metric called Stability of Node (SN) has been introduced which depends on transmission range, node density and node velocity. For data transfer, a weighted cost function selects the most energy efficient nodes / most stable nodes or a weighted combination of both. This makes the node selection criteria more dynamic. The protocol works in two steps: (1) calculating SN and (2) using SN value in the weighted cost function for selection of nodes. The study compared the proposed protocol, with other mesh-based protocols PUMA and SLIMMER, based on packet delivery ratio (PDR), throughput, end-to-end delay and average energy consumption under different simulation conditions. Results clearly demonstrate that SLIMMER-SN outperformed both PUMA and SLIMMER.

A New Routing Protocol for Cost-Effective Communication between Mobile Hosts (이동 호드트들간의 경제성있는 통신을 위한 새로운 루팅 프로토콜)

  • Cha, Yeong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.406-416
    • /
    • 1995
  • This paper is concerned with a routing protocol for cost-effective communications between mobile hosts on computer networks in which mobile hosts can move freely their physical positions. The proposed routing protocol consists of two protocols : one is called location registration protocol performing registration of the location information as the mobile host does move; the other one is called message transfer protocol which actually delivers a message to the destination mobile host. The detailed protocol's operational behavior and major characteristics are presented. And it is shown that our protocols are superior to previous ones, in terms of the communication cost(i.e, number of messages) required for routing a message, and are functionally improved ones.

  • PDF

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.