• Title/Summary/Keyword: real-time message protocol

Search Result 105, Processing Time 0.034 seconds

A new timing structure for a realtime communication (실시간 통신을 위한 새로운 Timing 구조)

  • 김경재;신동렬
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.771-774
    • /
    • 1999
  • This paper presents a new timing structure for real time communications and its performance analysis. The cycle time consists of several "one time slot" which may be an interval defined by a synchronous traffic part followed by an asynchronous traffic part. If a station receives a token within a synchronous interval, it transmits its synchronous message if any, otherwise it may transmit an asynchronous message. This scheme is different from usual allocation schemes which divide one cycle into alternating synchronous and asynchronous subslots. This protocol is designed to prevent low priority messages from delaying too much due to lots of high priority messages. We propose the algorithm and show its justification by simulation.

  • PDF

Scheduling and Dynamic Bandwidth allocation Algorithm for Real-Time Service on WDM-PON (WDM-PON에서의 실시간 서비스 품질 보증을 위한 스케줄링 기법 및 동적 대역폭 할당 알고리즘)

  • 조지형;김재관;강민호
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.121-124
    • /
    • 2003
  • Passive optical networks (PONs) will be the pervasive choice in the design of next-generation access networks. One possible solution to implementing Passive optical access network is to rely on wavelength-division multiplexing (WDM). In this paper, we solve the problem of providing real-time service to both hard and soft real-time messages in conjunction with a conventional vest-effort service in WDM. we propose an adaptive scheduling algorithm to schedule and manage the message transmissions in the optical access network. Proposed algorithm is MLF-MQF. Also, we suggest dynamic bandwidth algorithm(DBA) in Loop-back WDM-PON (LPB-PON).our mechanism based on bandwidth reservation protocol.

  • PDF

The Implementation of Real-Time Vital Sign Information Transmission Monitoring System using TMO (TMO를 이용한 실시간 생체정보 전송 모니터링 시스템 구현)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.33-40
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. It is able to apply to remote medical examination and treatment. Through the proper data exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

  • PDF

ICU Real-Time Sign Information Transmission System using TMO in Distributed Network Systems (분산 네트워크 시스템에서 TMO를 이용한 ICU 실시간 생체정보 전송 시스템)

  • Oh, Seung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.230-235
    • /
    • 2009
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of ICU. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

Standard Discovery Protocol for Supporting Interoperability between DDS Middlewares (DDS 미들웨어의 상호운용성 제공을 위한 표준 디스커버리 프로토콜)

  • Ahn, Sung-Woo;Choi, Jong-Woo;Choi, Yoon-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.205-208
    • /
    • 2011
  • In recent years, the user interest has increased for DDS (Data Distribution Service) which is a data centric middleware based on publish-subscribe communication as the demands for real-time data exchange in distributed systems have been growing rapidly. To reflect these needs, many vendors and research groups provide their DDS middleware. However, there has been a problem with interoperability between DDS middlewares because of a lack of common communication rules such as the message exchange and the discovery manner. For this reason, OMG defines RTPS (Real-Time Publish-Subscribe) specification which is the standard network protocol used to exchange data between different implementations of DDS. In this paper, we analyze and design the SDP (Simple Discovery Protocol) of RTPS which enable DDS middleware to provide interoperable discovery mechanism.

  • PDF

Asynchronous Message Delivery among Mobile Sensor Nodes in Stationary Sensor Node based Real-Time Location Systems (고정형 센서 노드 기준 위치인식 시스템에서 이동형 센서 노드 간 비동기 메시지 전송방법)

  • Kim, Woo-Jung;Jeong, Seol-Young;Kim, Tae-Hyon;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.148-158
    • /
    • 2011
  • Stationary nodes and mobile nodes co-exist wireless sensor network(WSN) can provide variety of new services. The stationary sensor node acts not only the gathering the environmental sensing data but also a access point to bidirectional communication with numerous mobile sensor nodes(mobile node), and the mobile sensor nodes are installed inside mobile objects and identify the location in real-time and monitor the internal status of the object. However, only using the legacy WSN protocol, it is impossible to set up the stable network due to the several reasons caused by the free-mobility of the mobile nodes. In this paper, we suggest three methods to increase the hit-ratio of the asynchronous message delivery(AMD) among mobile nodes. We verified the performance of the suggested methods under the stationary-mobile co-existed WSN testbed.

Implementation of an Efficient Slotted CSMA/CA Anti-collision Protocol for Active RFID System (능동형 RFID 시스템을 위한 효율적인 Slotted CSMA/CA 충돌방지 프로토콜의 구현)

  • Joo, Jin-Hoon;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1013-1022
    • /
    • 2012
  • Tag collection is one of the major concerns in radio frequency identification(RFID) system. All tags in RFID reader's transmission range send response message back to the reader in response to collection request message on the given rf channel. When multiple tags respond simultaneously, tag-collision may occur. Tag-collision problem is one of the most important issues in active RFID performance. To mitigate this problem, frame slotted ALOHA(FSA) anti-collision protocol is widely used in active RFID system. Several studies show that the maximum system efficiency of FSA anti-collision protocol is 36.8%. In this paper, we propose an efficient slotted CSMA/CA protocol to improve tag collection performance. We compare our protocol to the FSA anti-collision protocol. For the experiment, an 433MHz active RFID system is implemented, which is composed of an RFID reader and multiple tags. We evaluated the tag collection performance using one RFID reader and 40 tags in the real test bed. The experimental result shows that proposed protocol improves the tag collection time, round and collision probability by 18%, 37.4% and 77.8%, respectively.

Study on Korean Variable Message Format Construction for Battlefield Visualization (전장가시화를 위한 한국형 지상전술데이터링크 구축 연구)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.104-112
    • /
    • 2011
  • During the ground operation of Korean army, the voice message is mainly used for exchanging informations related to the surveillance and reconnaissance, command and control, and precision strike. However, in order to the battlefield visualization among fighting powers participating in the ground force operation, automatic situational awareness and variable message format (VMF) for command and control are required. For securing core technologies necessary for the battlefield visualization, message standard and message handler are established through several applied researches. Besides, the VMF for equipping a weapon system is in development. In this paper, a study on the Korean variable message format (KVMF), where interoperability of integrated battle management system (BMS) is guaranteed due to performing joint, ground, and combined operations so that the situation awareness and strike system can be automated in almost real time, is presented. From the modeling and simulation (M&S) results of the message processor, delay time is varied in accordance with the number of nodes in unit platoon network, message length, and generation interval of routine messages. Therefore, it is shown that the system performance can be optimized by establishing proper network protocol for each situation.

Performance Analysis of Backoff Algorithm in Wireless LANs with Prioritized Messages (무선랜 환경에서 우선순위를 고려한 백오프 알고리듬 성능분석)

  • Jeong Seok-Yun;Heo Seon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1656-1660
    • /
    • 2006
  • Distributed coordination function(DCF) is the primary random access mechanism of IEEE 802.11, which is the basic protocol of wireless LAN based on the CSMA/CA protocol. It enables fast installation with minimal management and maintenance costs and is a very robust protocol for the best effort service in wireless medium. The current DCF, however, is known to be unsuitable for real-time applications such as voice message transmission. In this paper, we focus on the performance issues of IEEE 802.11 which accommodate the prioritized messages. Existing results use the initial window size and backoff window-increasing factor as tools to handle the priority of the messages. Instead, we introduce a novel scheme which chooses the backoff timer with arbitrary probabilities. By this, one can greatly reduce the backoff delay of the lower priority messages without degrading the performance of higher priority.

  • PDF