• Title/Summary/Keyword: Transfer Protocol

Search Result 754, Processing Time 0.025 seconds

A Study on the Performance Enhancement of the Macro Handover in HMIP According to Protocol Layers

  • Woo, Jong-Jung;Ahn, Chi-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.168-172
    • /
    • 2010
  • The Network-based handover still has problems such as the transmission delays and the packet losses in the case of macro mobility, though technological advances have been made in the wireless and mobile communication. For end-to-end handover, the link bandwidth has been reduced in the wireless network due to its burst errors and congestion control. To overcome such problems, we propose a new scheme of the macro handover according to the protocol layer. The proposed macro handover is implemented on the network layer to partially substitute wired signaling for wireless signaling, to flexibly employ buffers, and on the transport layer to postpone its retransmission time. We have performed extensive simulation using ns-2 and the result shows that our proposed scheme outperforms the other existing schemes in terms of transmission delay, packet loss, and data transfer rate during the handovers.

A New Approach to the Verification of a Message Protocol : Fuzzy Integral (퍼지적분을 이용한 메시지 프로토콜 검증)

  • Shin, Seung-Jung;Park, In-Kue
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1903-1910
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

Performance Analysis of NTT/BT Protocol (NTT/BT 프로토콜의 성능 분석)

  • 이창훈;백상엽;이동주
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.99-123
    • /
    • 1997
  • Performance analysis of NTT/BT protocol is investigated, which is a GFC (Generic Flow Control) ptotocol in ATM (Asynchronous Transfer Mode ) network and is based on cyclic reset mechanism. THe mean cell delay time is proposed as a performance measure of NTT/BT protocol. The mean cell delay time is defined as the duration from the instant the cell arrives at the transmission buffer until the cell is fully transmitted. The process of cell transmission can be described as a single server queueing modle with two dependent services. By utilizing this model, mean cell delay time is obtained and sensitivity of the factors such as window size and reset period is also analysed.

  • PDF

Certificate Revocation Scheme using MOT Protocol over T-DMB Infrastructure

  • Kim, Hyun-Gon;Kim, Min-Soo;Jung, Seok-Won;Seo, Jae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1583-1590
    • /
    • 2011
  • A Certificate Revocation List(CRL) should be distributed quickly to all the vehicles for vehicular communications to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a Multimedia Object Transfer(MOT) protocol based on CRL distribution scheme over T-DMB infrastructure. To complete the proposed scheme, a handoff method, CRL encoding rules based on the MOT protocol, and relative comparison are presented. The scheme can broaden breadth of network coverage and can get real-time delivery with enhanced transmission reliability. Even if road side units are sparsely deployed or, even not deployed, vehicles can obtain recent CRLs from T-DMB infrastructure effectively.

An Efficient Embedding Structure for Heterogeneous Routing Protocols in Wireless Mesh Routers (무선 메쉬 라우터에서 이종 라우팅 프로토콜의 효율적인 탑재구조)

  • Lee, Youngsuk;Kim, Younghan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.209-213
    • /
    • 2007
  • In this paper, we propose more efficient implementation architecture for realizing combination of heterogeneous routing protocols in wireless mesh routes. For realizing heterogeneous routing protocol in wireless mesh router, the following should be considered; which position in OS platform protocols should be implemented, how to define the common API for multiple routing protocols, how to provide architecture for providing high data transfer throughput and for supporting multi platform, and finally how to verify the throughput of protocol by using simulator. For solving those consideration, we propose HRPC(Heterogeneous Routing Protocol Coordinator) and describe the method for testing the protocols.

  • PDF

Realization of Water AMR Network using ZigBee Protocol (ZigBee 무선표준을 이용한 상수도 원격검침 네트워크 구현)

  • Kwon, Jong-Won;Park, Yong-Man;Odgerel, Odgerel;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.168-170
    • /
    • 2006
  • In this paper, authors realize water AMR(Automatic Meter Reading) network using low power ZigBee protocol included routing ability for improving wireless communitation error detection and network range. ZigBee wireless standard is an important standard of the field related Ubiquitous industry and recently has application to Home-Network. It's special features are to spend low power and to include routing ability each terminator. Because of these features, authors realize water AMR system on Embedded system using ZigBee protocol for applying to transfer data between a water meter and RF module equipped with a water meter in each house.

  • PDF

Point-of-care Testing Device Interface in Hospital Information System Standard Connectivity - Using of case ASTM protocol of ABGA application POCT1-A2 - (현장형 임상검사장비와 병원정보시스템의 접속표준 - ASTM protocol을 사용하는 ABGA의 POCT1-A2적용사례 중심으로 -)

  • Kim, Seon-Chil
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.33-37
    • /
    • 2008
  • To keep the online medical records available to anyone without constraint of time and space, introducing EMR (Electronic medical record), which is a clinical support management system. The purpose of this study is to develop interface standard of clinical test device. Integration and sharing of medical information is faced with enormous obstacles because medical organizations and associated companies are separately developing the interface. I hope that multi-function management system with workstation concept is operated to efficiently transmit clinical device result data based on this study. Transfer of precise medical result data available for decision making will improve quality of health care service.

  • PDF

New Approach to Verification in Security Protocol by using Fuzzy Algorithm (퍼지 알고리즘을 이용한 보안 프로토콜 검증)

  • 신승중;박인규
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.343-349
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using Choquet fuzzy integral compapred with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

The Verification in Security Protocol for Security Continuity Management (정보보호의 연속성관리를 위한 보안프로토콜 검증)

  • Shin, Seung-Jung;Song, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.445-448
    • /
    • 2001
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using security continuity management Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

A Survey on Congestion Control for CoAP over UDP

  • Lim, Chansook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.17-26
    • /
    • 2019
  • The Constrained Application Protocol (CoAP) is a specialized web transfer protocol proposed by the IETF for use in IoT environments. CoAP was designed as a lightweight machine-to-machine protocol for resource constrained environments. Due to the strength of low overhead, the number of CoAP devices is expected to rise rapidly. When CoAP runs over UDP for wireless sensor networks, CoAP needs to support congestion control mechanisms. Since the default CoAP defines a minimal mechanism for congestion control, several schemes to improve the mechanism have been proposed. To keep CoAP lightweight, the majority of the schemes have been focused mainly on how to measure RTT accurately and how to set RTO adaptively according to network conditions, but other approaches such as rate-based congestion control were proposed more recently. In this paper, we survey the literature on congestion control for CoAP and discuss the future research directions.