• 제목/요약/키워드: protocol model

검색결과 1,374건 처리시간 0.027초

실내환경 모니터링시스템을 위한 무선 센서네트워크에서의 플러딩 방식의 질의모델 설계 및 구현 (Design and implementation of flooding-based query model in wireless sensor networks for indoor environmental monitoring system)

  • 이승철;정상중;이영동;정완영
    • 센서학회지
    • /
    • 제17권3호
    • /
    • pp.168-177
    • /
    • 2008
  • An indoor environmental monitoring system using IEEE 802.15.4 based wireless sensor network is proposed to monitor the amount of pollutant entering to the room from outside and also the amount of pollutant that is generated in indoor by the building materials itself or human activities. Small-size, low-power wireless sensor node and low power electrochemical sensor board is designed to measure the condition of indoor environment in buildings such as home, offices, commercial premises and schools. In this paper, two query models, the broadcasting query protocol and flooding query protocol, were designed and programmed as a query-based routing protocol in wireless sensor network for an environment monitoring system. The flooding query routing protocol in environment monitoring is very effective as a power saving routing protocol and reliable data transmission between sensor nodes.

무선 근거리 통신망에서의 Stop-and-wait ARQ 방식을 사용하는 충돌회피 프로토콜 성능분석 (performance analysis of the CSMA/CA protocol using stop-and-wait ARQ method in iwreless LANs)

  • 김재현;이정규
    • 한국통신학회논문지
    • /
    • 제21권5호
    • /
    • pp.1208-1220
    • /
    • 1996
  • 본 논문에서는 IEEE 802.11에서 채택한 매체접근제어 프로토콜인 Stop-and-Wait Automatic Repeat reQust(ARQ)방식을 사용하는 Carrier Sence Multiple Access/Collision Avoidance(CSMA/CA) 프로토콜의 성능을 renewal theory를 사용하여 수학적으로 분석하였으며, 컴퓨터 시뮬레이션을 사용하여 분석의 신뢰성을 검증하였다. CSMA/CA 프로토콜의 처리율을 분석하기 위하여 통신망은 유한 가입자로 구성되며, 슬롯화된 채널을 고려하였고, CSMA/CA프로토콜은 1-persistent CSMA와 p-persistent CSMA프로토콜을 혼합한 프로토콜로 모델링하여 CSMA.CA 프로토콜의 처리율 및 패킷지연을 분석하였다. 분석 결과에 의하면, CSMA/CA 방식은 스테이션의 수, Acknowledgement(ACK) 패킷의 길이 및 Distributed coordination function Inter Frame Space(DIFS)의 길이가 커짐에 따라 처리율이 저하되었으며, 패킷 지연이 증가하였다.

  • PDF

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권5호
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

보육교사를 위한 아동 건강관리 프로토콜 개발 및 평가 (Development and Evaluation of a Child Health Care Protocol for Child Day Care Center Teachers)

  • 김신정;양순옥;이승희;이정은;김성희;강경아
    • Child Health Nursing Research
    • /
    • 제17권2호
    • /
    • pp.74-83
    • /
    • 2011
  • Purpose: The purpose of this study was to develop a child health care protocol for teachers in child day care centers. Methods: The ADDIE model with 10 Kid Keys was applied to develop this child health care protocol. All contents were developed through content validity test by 7 professionals and need assessment and evaluation by child day care center teachers. Results: This protocol consisted of 10 keys, as follows: "Health Examination/Growth & Development", "Practice of Health Life", "Management of Communicable Disease", "Negligent Accident", "Coping with Emergency and Transference", "Child Abuse", "Nutrition/Obesity", "Quality Assurance of Staff", "Parent Education", "Guidance & Supervision of Child Day Care Centers". The contents contained goals, objectives, teaching content, suggested activities for children, writing forms related to each subject, and self-evaluation sheet. Conclusion: This protocol can be practical and effective for child health care in child day care centers and it is hoped that it will be utilized in more child day care centers.

Cross-Realm 환경에서 패스워드기반 키교환 프로토콜 (Password-Based Key Exchange Protocols for Cross-Realm)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.139-150
    • /
    • 2009
  • Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two clients attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients trying to establish a secret key are registered with different authentication servers. In fact, the recent protocol by Yeh and Sun seems to be the only password authenticated key exchange protocol in the four-party setting. But, the Yeh-Sun protocol adopts the so called "hybrid model", in which each client needs not only to remember a password shared with the server but also to store and manage the server's public key. In some sense, this hybrid approach obviates the reason for considering password authenticated protocols in the first place; it is difficult for humans to securely manage long cryptographic keys. In this work, we introduce a key agreement protocol and a key distribution protocol, respectively, that requires each client only to remember a password shared with its authentication server.

QoS 적응 기능을 갖는 연동 게이트웨이의 설계 및 구현 (Design and Implementation of Interworking Gateway with QoS Adaptation)

  • 송병훈;최상기;정광수
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제5권5호
    • /
    • pp.619-627
    • /
    • 1999
  • 서로 다른 네트워크 환경을 갖는 도메인 사이에서 멀티미디어 서비스를 제공하기 위해서는 여러 가지 측면에 대한 기능 대응이 이루어져야 한다. 본 논문에서는 ATM 기반의 DAVIC(Digital Audio Visual Council) 서비스와 인터넷 AV 서비스를 연동하기 위하여, 프로토콜 변환 및 QoS(Quality of Service) 적응을 지원하는 연동 게이트웨이를 구현하였다. 구현된 연동 게이트웨이는 ATM 망에서 DSM-CC (Digital Storage Media Command & Control)를 기반으로 서비스되는 스트림을 RTSP(Real-Time STreaming Protocol)로 제어할 수 있으며, RTP(Real-Time Transport Protocol)를 이용하여 스트림을 전달한다. 또한 네트워크 대역폭 변화를 고려한 스트림 전달을 위해 QoS 모니터링과 MPEG 필터링을 이용한 QoS 적응 기능을 제공한다.

부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜 (An authenticated key distribution protocol for the CDMA mobile communication network)

  • Hak S. Jeon;Dong K. Kim
    • 정보보호학회논문지
    • /
    • 제7권2호
    • /
    • pp.43-54
    • /
    • 1997
  • 본 논문에서는 부호 분할 다중 접속(Code Division Multiple Access) 이동 통신망을 위한 안전하고 최소의 인증 및 키 분배 프로토콜을 제안한다. 가입자의 인증과 가입자 트래픽의 안전성을 유지하기 위해 CDMA 이동 통신망의 보안 프로토콜은 개발되었다. 기존 프로토콜은 이동 통신망의 무선 구간에 대한 통신 보안을 고려하였고, 유선 구간의 통신 보안은 고려하지 않는다. 본 논문에서는 무선 구간의 통신뿐만 아니라 유선 구간의 통신 보안을 보장할 수 있는 인증 및 키 분배 프로토콜을 제안한다. 제안된 프로토콜은 사용자 식별 번호의 기밀성을 유지하면서, 기존 프로토콜과 비교하여 최소의 정보 흐름을 유지한다.

감마나이프 C모델에 대한 IAEA TRS-398 프로토콜의 적용 (Application of IAEA TRS-398 Protocol to Gamma Knife Model C)

  • 정현태
    • 한국의학물리학회지:의학물리
    • /
    • 제18권4호
    • /
    • pp.194-201
    • /
    • 2007
  • 감마나이프는 한 번에 수 Gy의 선량을 조사하는 일반 방사선 치료에 비하여 훨씬 많은 수십 Gy의 고선량을 한 번에 조사하기 때문에 조사되는 방사선량의 절대값 측정이 매우 중요하다. 그러나, 감마나이프의 물흡수선량 절대 측정값을 검증하는 연구는 많지 않다. 더욱이, 물팬텀 사용을 규정한 국제원자력기구(International Atomic Energy Agency: IAEA) TRS-398 프로토콜을 적용하여 물흡수선량을 측정한 연구는 보고되고 있지 않다. 본 연구에서는 IAEA TRS- 398 프로토콜을 이용하여 감마나이프 C모델의 물흡수선량을 측정하는 실험을 하였다. 본 실험에서는 IAEA TRS-398에 규정한 바를 최대한 따르면서 물팬텀을 제작하여 감마나이프 C모델의 물흡수선량을 측정하고, 감마나이프 제작사에서 제공하는 플라스틱 팬텀에서 측정한 값과 비교하였다. 이온함으로는 Capintec 사의 PR-05P mini-chamber 두 개를 사용하였고, 전리계로는 PTW사의 UNIDOS를 사용하였다. 측정 결과 물팬텀에서 측정한 감마나이프 모델C의 물흡수선량은 제작사의 플라스틱팬텀에서 측정한 값에 비하여 1.38% 크게 나타났다- 따라서, 현재 국내 감마나이프센터에서 사용하고 있는 제작사에서 제공하고 물흡수선량 측정 프로토콜에는 물팬텀 대신 플라스틱팬텀을 사용하는 데 따른 기온적인 문제점이 있는 것으로 판단된다. 결론적으로 IAEA TRS-398프로토콜을 직접적으로 감마나이프 물흡수선량 측정에 적용하는 것은 기준조건을 만족시킬 수 없기 때문에 불가능한 것으로 판단되며, 새로운 프로토콜을 작성하거나, 물팬텀과 기존의 플라스틱 팬텀으로 측정한 값 사이의 변환계수를 제공하는 것이 현실적인 대안이 될 것이다.

  • PDF

가중유출수질지표를 이용한 활성오니공정모델의 민감도 분석과 매개변수 보정 (Sensitivity Analysis and Parameter Estimation of Activated Sludge Model Using Weighted Effluent Quality Index)

  • 이원영;김민한;김영황;이인범;유창규
    • 제어로봇시스템학회논문지
    • /
    • 제14권11호
    • /
    • pp.1174-1179
    • /
    • 2008
  • Many modeling and calibration methods have been developed to analyze and design the biological wastewater treatment process. For the systematic use of activated sludge model (ASM) in a real treatment process, a most important step in this usage is a calibration which can find a key parameter set of ASM, which depends on the microorganism communities and the process conditions of the plants. In this paper, a standardized calibration protocol of the ASM model is developed. First, a weighted effluent quality index(WEQI) is suggested far a calibration protocol. Second, the most sensitive parameter set is determined by a sensitive analysis based on WEQI and then a parameter optimization method are used for a systematic calibration of key parameters. The proposed method is applied to a calibration problems of the single carbon removal process. The results of the sensitivity analysis and parameter estimation based on a WEQI shows a quite reasonable parameter set and precisely estimated parameters, which can improve the quality and the efficiency of the modeling and the prediction of ASM model. Moreover, it can be used for a calibration scheme of other biological processes, such as sequence batch reactor, anaerobic digestion process with a dedicated methodology.

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF