• Title/Summary/Keyword: Transfer Protocol

Search Result 759, Processing Time 0.025 seconds

An Efficient MAC Protocol for Supporting Multimedia Services in APON (APON에서 멀티미디어 전송을 위한 효율적인 MAC 프로토콜)

  • 은지숙;이호숙;윤현정;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.132-141
    • /
    • 2000
  • In this paper, we proposed the MAC protocol of APON supporting multi-class traffic such as CBBUVBR, ABR, UBR, to guarantee the required QoS of each service. For this, we analyze the performance of variousrequest mechanisms and employee the different request mechanism for each traffic classes. Upstream anddownstream frame structures to minimize transmission overhead are proposed based on our request mechanism.The proposed MAC protocol applies the different priority to permit distribution process. CBBWBR traffic, withthe stringent requirements on CDV or delay, is allocated prior to any other class. ABR traffic, which hasnon-strict CDV or delay criteria, uses flexibly the available bandwidth but ensures a minimum cell rate (MCR).UBR traffic is allocated with lowest priority for the remaining capacity. The performance of proposed protocol isevaluated in terms of transfer delay and 1-point CDV with various offered load. The result of simulation showsthat the proposed protocol guarantees the required QoS of the corresponding category, while making use of theavailable resources in both an efficient and dynamical way.

  • PDF

Design and Implementation of IoT Middleware Using Data Refinement Scheme based on IETF CoAP (IETF CoAP 기반의 데이터 정제 기법을 이용한 IoT 미들웨어 설계 및 구현)

  • Wang, Jian;SaKong, June;Kwak, Ho-Young;Kim, DoHyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.123-128
    • /
    • 2015
  • Recently, a communication protocol for connectivity between various sensors and actuators is issue the key technology in IoT(Internet of Things). IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol) protocol supports the communication between things like sensors and actuator nodes in a limited environment. Smart-phone will work for the data processing of the sensors and the management of IoT nodes at the next generation communication environment. In this paper, we design the connection for smart-phone and IoT node based using IETF CoAP protocol, and implement the middleware with the proposed data refinement on smart-phone. The middleware detects and eliminates a error data and duplicated data using the proposed data refinement. The proposed data refinement scheme supports to transfer a reliability information in the constrained environment.

Design Healthcare Mobility Agent Module in Sensor Network (센서 네트워크에서 헬스케어 이동성 에이전트 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.544-553
    • /
    • 2008
  • The general sensor network uses bundle method to collect fixed information from sensor node. However, this method is difficult to actively cope with major sensing objects in healthcare environment including status and position change of person and change of surrounding environment. In order to support the healthcare environment, certain information should be provided in accordance with the change of status of person and surrounding circumstance and also must cope with the change of network type by movement of person. This paper analyzes LEACH protocol which guarantees effectiveness of network as it constitutes clusters between Agilla model that is a representative multi agent middle ware and surrounding nodes. Based on the result of this analysis, it suggests LEACH_Mobile protocol which guarantees node mobility that is the weakest point of LEACH protocol. Moreover, it designs mobility agent middleware which supports dynamic function change of node and mobility agent module which supports dynamic function change of mobile node as components of LEACH_Mobile routing module. In addition, it is definitely increase performance which in mobile node of transfer data rate through LEACH_Mobile protocol of simulation result.

  • PDF

A Wireless Sensor Network Architecture and Security Protocol for Monitoring the State of Bridge (교량감시를 위한 무선 센서 네트워크 구조 및 보안 프로토콜)

  • Lim Hwa-Jung;Jeon Jin-Soon;Lee Heon-Guil
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.465-476
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. In order to alleviate the inherent vulnerability in security of the wireless sensor nodes with the hardware constraints, the lightweight security protocol is needed and a variety of research is ongoing. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring man-made objects such as bridges. This paper, furthermore, explores a two-layer authentication, key distribution scheme which distributes the key and location of a sensor node in advance, and an effective security routing protocol which can take advantage of the Sleep and Awake state. This also results in the increased data transfer rate by increasing the number of alternative routing paths and the reduced energy consumption rate.

  • PDF

Performance Evaluation according to MAP Inter-arrival Time for DOCSIS 3.0 based Cable Network (DOCSIS3.0 기반 케이블망에서 MAP 주기에 따른 성능평가)

  • Roh, Sun-Sik;Song, Jae-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1069-1076
    • /
    • 2007
  • DOCSIS 3.0 protocol are proposed to support high-speed cable network DOCSIS 3.0 MAC protocol regulates CM and CMTS channel transfer times through MAP message. So MAP Inter-arrival time is primary factor of network performance. However, standards does not include the details of MAP Inter-arrival Time affecting the performance of MAC protocols for DOCSIS 3.0. In this paper, we evaluated the performance of DOCSIS 3.0 protocol follow in MAP Inter-arrival Time. Based on the evaluation results, we propose the optimal MAP Inter-arrival Time. We found that the protocol shows best performance when the MAP Inter-arrival Time is 0.05sec. The research results can apply to performance element which important for the construction of DOCSIS 3.0 base cable networks.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

A study on the design of a VODB using different kinds of protocol (이종 프로토콜을 이용한 VODB 설계 관한 연구)

  • 박세승;노영주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1343-1355
    • /
    • 1997
  • Full motion video data is the most effective data type that transmits information in multimedia enviornment. VOD service is system that uses network to transmit full motion video data interactively. Therefore VOD service system must satisfy the following requirements. First, it should transmit high quality full motion video. Second, it should be able to control a large quantity of full motion video. Third, a user should be able to retrieve the full motion vide effectively. However the existing VOD service system is established based n file system that not only does it have disadvantages in managment such as transaction control but also it is not suitable for distributed multimedia environment. The goal of this research is to build a VOD service system that provides high-quality full motion video assuming information retrieval. In order to mainly search video data's bibliographical information and to manage related information, VOD service system and DBMS system are to be closely related. Also, to transmit high quality full motion video data, we use MTP$^{TM}$(Media Transfer Protocol) developed by StarLight. MTP$^{TM}$ guarantees high bandwidth that is necessary to tansmit high quality full motion video data effectively. In other hand TCP/IP which is used for information search does not guarentee high bandwidth as that in MTP$^{TM}$. Therfore VOD service system that seraches information managed by DBMS and transmits requried full motion video data should control different kinds of protocol simultaneously. This paper describes the configuration of VODB system that has solved these problems, implementation and efficiency of data applied system.stem.

  • PDF

Concealing Communication Source and Destination in Wireless Sensor Networks(Part I) : Protocol Design (무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제1부) : 프로토콜 설계)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.219-226
    • /
    • 2013
  • Against the global eavesdropping in wireless sensor networks, tremendous amount of dummy packets for faking are likely to be continuously generated in order to keep the location privacy of the communication source and destination. In our approach only certain disk-shaped zones of encompassing sources and destination are allowed to issue dummy packets during the data transfer so that the amount of generated packets is reduced while the location privacy of the source and destination remains secret. To this end we design a routing protocol and propose a detailed formal specification of it, and verify major characteristics.