• Title/Summary/Keyword: 전송 프로토콜

Search Result 3,036, Processing Time 0.022 seconds

Enhanced Snoop Protocol for Improving TCP Throughput in Wireless Links (무선 링크에서 TCP 처리율 향상을 위한 Enhanced Snoop 프로토콜)

  • Cho Yong-bum;Won Gi-sup;Cho Sung-joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.396-405
    • /
    • 2005
  • Snoop protocol is one of the efficient schemes to compensate TCP packet loss and enhance TCP throughput in wired-cum-wireless networks. However, Snoop protocol has a problem; it cannot perform local retransmission efficiently under the bursty-error prone wireless link. In this paper, we propose Enhanced Snoop(E-Snoop) protocol to solve this problem of Snoop protocol. With E-Snoop protocol, packet losses can be noticed by receiving new ACK packets as well as by receiving duplicate ACK packets or local retransmission timeout. Therefore, TCP throughput can be enhanced by fast recognition of bursty packet losses and fast local retransmissions. From the simulation results, E-Snoop protocol can improve TCP throughput more efficiently than Snoop protocol and can yield more TCP improvement especially in the channel with high packet loss rates.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Improved Sensor MAC Protocol for Wireless Sensor Network (무선 센서 네트워크를 위한 향상된 센서 MAC 프로토콜)

  • Lee, Ju-a;Kim, Jae-Hyun;Min, Seung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1138-1146
    • /
    • 2006
  • It is very important for the sensor network to save battery capacity. Switching active mode to sleep mode is used for S-MAC protocol and expiring timer before end of the active part is used for T-MAC in order to extend battery life span. We proposed IS-MAC (Improved Sensor MAC) which gives more energy efficiency than S-MAC and T-MAC To improve energy efficiency in sensor network, we used the threshold value in buffer to transmit data packet and proposed the method to reduce the number of control packets which cause extra battery consumption. Based on the analytical results, we found that the proposed IS-MAC protocol shows better performance than conventional MAC protocols.

A TDMA-based Relay Protocol for Voice Communication on a Small Group (소규모 그룹에서의 음성 통신을 위한 TDMA 기반의 릴레이 프로토콜)

  • Hwang, Sangho;Park, Chang-Hyeon;Ahn, Byoungchul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.259-266
    • /
    • 2013
  • Since the wireless communications have a limited transmission, the devices just around a master node can exchange data. Though Bluetooth and Zigbee support ad hoc, they are not appropriate for real-time voice communications. In this paper, we present a TDMA-based relay protocol for several users to communicate simultaneously. The proposed protocol can relay data or voice to other nodes in real-time by the multi-hop transmission method using TDMA. And the proposed protocol improves the network performance by allocating different frequencies to the slaves depending on the routing path scheduled by the routing table. NS-2 simulation shows that the performance of the proposed protocol is good in terms of the transmission delay and pecket loss probability in the real-time voice transmission.

A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System (원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.197-202
    • /
    • 2017
  • The remote healthcare monitoring system enables a doctor to diagnose and monitor patient's health problem from a distance. Previous researches have focused on key establishment method between a patient and a particular doctor to solve personal health information disclosure problem in data transmission process. However, when considering a misdiagnosis of doctor, the result of a diagnosis by a many doctors is more reliable. In previous work, in order to select multiple doctors, patient should generate shared key for each chosen doctor and perform many times encryptions. Therefore, in this paper, we propose a secure data transmission protocol for receiving diagnosis from multiple doctors using identity-based proxy re-encryption scheme. In proposed protocol, a patient don't need key management work for session key. Also, monitoring server performs re-encryption process on behalf of patient. So, we can reduce computational burden of patient in previous work.

An Ad-hoc Routing Protocol for High-speed Multimedia Traffic Based on Path Quality and Bandwidth Estimation in Wireless Ad Hoc Networks (무선 애드혹 네트워크에서 경로 품질 및 잔여 대역폭 예측에 기반한 고속 멀티미디어 데이터 전송의 라우팅 프로토콜)

  • Shohel, Ahmed Md.;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.203-210
    • /
    • 2013
  • Majority of the wireless ad hoc routing protocols are proposed to find feasible routes without considering the network load, end-to-end link quality and bandwidth requirements of the application. Therefore, protocol may not provide sufficient quality of service (QoS) to a high speed traffic such as multimedia. In this paper, we propose a path-quality and bandwidth-estimation based routing protocol (PBBR) for the high quality multimedia stream that can meet the application's bandwidth requirements and find the best reliable route. The novelty of this protocol is to select a reliable path to respond the application's requirements based on available bandwidth at each intermediate node and end-to-end path loss ratio. Obtained results from the simulation demonstrates that our protocol can achieve sufficient performance in terms of throughput and end-to-end delay.

Reliable and Efficient Multicast Protocol for Mobile IP (이동 IP 망에서 효율적인 경로설정과 신뢰성 있는 전송방법을 갖는 멀티캐스트 프로토콜)

  • 조형상;신석재;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.349-359
    • /
    • 2004
  • To provide multicasting service, several multicast protocols for mobile hosts have been proposed. But they include glitches such as a non-optimal delivery route, data loss when hosts move another network, therefore they have some insecure problems about multicast data transmission. In this paper, we consider these problems and propose a new reliable and efficient multicast routing protocol for Mobile If networks. The proposed protocol provides reliable multicast transmission by compensating data loss from the previous agent when a mobile host moves another network. Also it provides additional function that is directly to connect a multicast tree according to the status of agents. It provides more efficient and optimal multicast path. The performance of the proposed protocol is proved by simulation of various conditions.

Design of A-GBSR Protocol Using Beacon Message in 802.11p WAVE (802.11p WAVE에서 비콘메시지를 이용한 A-GBSR 프로토콜 설계)

  • Jeong, Seon-Mi;Kim, Hyun-Ju;Kim, Chang-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1554-1560
    • /
    • 2015
  • 802.11p WAVE is the next-generation wireless communication that can make Ad-hoc network communication possible for Vehicle-to-Vehicle. GBSR protocol, one of the 802.11p WAVE protocols, mainly focuses on improvements in networks that have a tendency to disconnect. However, it does not consider the transmission time and velocity of a packet thus, there is a disadvantage of there being a delay in the transmission velocity, in urgent situations like car accidents, emergency patients transportation and crimes. In this paper, we proposed A-GBSR protocol for transmission of a packet to mobile node which has a high speed through the improved beacon message and Adaptive Neighbor list Management that are considering of the GBSR protocol transmission velocity.

Comparison of WiFi Protocols for Safety Communication Between Hydrogen Refueling Station and Fuel Cell Electric Vehicle (수소충전소와 수소전기차간의 안전통신을 위한 WiFi 프로토콜 비교)

  • Ha-Jin Hwang;Dong-Geon So;Do-Ho Cha;Hye-Jin Chae;Seo-Hee Jung;Sung-Ho Hwang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.81-87
    • /
    • 2023
  • SAE J2601 and SAE J2799, the communication protocols between a hydrogen refueling station and a fuel cell electric vehicle, only cover hydrogen charging. In this paper, we measure the hydrogen detection, current, and voltage of a fuel cell electric vehicle and transmit the sensor data to the hydrogen refueling station by changing the WiFi protocol. A small-scale laboratory model was built using Raspberry Pi for sensing, controlling, and transmitting sensor data of a fuel cell electric vehicle. The sensor data was stored in the database of the hydrogen refueling station, and a dashboard was configured using Grafana to analyze the stored data. When hydrogen is detected, the dispenser valve of the hydrogen refueling station is locked. Then, we measured the average transmission delay according to the WiFi protocol. The results showed that IEEE 802.11a is the most suitable WiFi protocol for transmitting sensor data between the hydrogen refueling station and the fuel cell electric vehicle.

cdma2000 1xEV-DO의 시큐리티 고찰

  • 신상욱;류희수;정교일
    • Review of KIISC
    • /
    • v.12 no.6
    • /
    • pp.81-92
    • /
    • 2002
  • cdma2000 1xEV(Evolution)-DO(Data Only)는 기존의 IS-2000 무선 프로토콜과 달리 패킷 데이터 서비스를 위한 전용 프로토콜로, 최대 2.4Mbps의 전송 속도를 제공한다. cdma2000 1xEV-DO는 이전의 프로토콜과 단리 무선 인터페이스 계층 구조에 따로 분리된 시큐리티 계층(security layer)을 가지며, 이 시큐리티 계층에서 패킷 데이터 서비스를 위한 인증과 암호화 서비스를 제공한다. 본 고에서는 패깃 데이터 서비스를 위한 전용 프로토콜인 chma2000 1xEV-DO의 시큐리티 계층의 4가지 프로토콜인 키 교환 프로토콜, 인증 프로토콜, 암호화 프로토롤, 시큐리티 프로토콜을 분석한다.