• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.028 seconds

An Energy-efficient Data Dissemination Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이타 전달 프로토콜)

  • Yi, Seung-Hee;Lee, Sung-Ryoul;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • Data dissemination using either flooding or legacy ad-hoc routing protocol is not realistic approach in the wireless sensor networks, which are composed of sensor nodes with very weak computing power, small memory and limited battery. In this paper, we propose the ELF(Energy-efficient Localized Flooding) protocol. The ELF is energy-efficient data dissemination protocol for wireless sensor networks. In the ELF protocol, there are two data delivery phases between fixed source and mobile sink node. The first phase, before the tracking zone, sensing data are forwarded by unicasting. After that, within the tracking zone, sensing data are delivered by localized flooding. Namely, the ELF Properly combines advantages from both unicasting and flooding. According to evaluation results by simulation, the proposed ELF protocol maintains very high data delivery ratio with using a little energy. Also, the property of average delay is better than others. From our research results, the ELF is very effective data dissemination protocol for wireless sensor networks.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

A Platform for Remote Collaborative Experiment (원격 공동 실험을 위한 플랫폼)

  • Kim, Sang-Wook;Jin, Min;Sonn, Jong-Kyung;Kim, Woo-Nyon;Kim, Jeong-Mi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.206-215
    • /
    • 2000
  • This paper is concerned with the development of PCS(Platform for Collaborative System), which is a platform for development of remote collaborative experiment systems. Platform does not aim at the development of special-domain applications. This system implies the common development environments which can develop all-domain applications. PCS consists of collaborative experimental objects such as communication, session, user, application, media, message object and management objects that have management functions. Management objects are made up of collaborative experimental objects and operations which manipulate control information and data. It also supports application sharing for making single user interface of experimental applications to multi-user interface. Application sharing also supports instruments control on the remote site. PCS platform supports total environments for remote collaborative experiment and can be used as infrastructure to all kinds of collaboratory systems.

  • PDF

Mobile Oriented Future Internet (MOFI): OpenFlow-based Implementation and Testbed Experimentation over KOREN (모바일 중심 미래 인터넷: OpenFlow 기반 구현 및 KOREN 테스트베드 실험)

  • Kim, Ji-In;Jung, Heeyoung;Koh, Seok-Joo
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.167-176
    • /
    • 2014
  • In this paper, we discuss the implementation and experimentations of a new future Internet architecture for mobile-oriented environments, named Mobile Oriented Future Internet (MOFI). The MOFI architecture is featured by the host identifier and local locator for identifier-locator separation, Query-First Data Delivery (QFDD), and Distributed Mapping System (DMS) for identifier-locator mapping control. In the existing study on MOFI, we examined the intra-domain mobility control, the implementation of MOFI over Linux platform, and the performance analysis over the small-scale testbed. In this paper, we describe how to implement the MOFI architecture for inter-domain mobility control by using the OpenFlow and Click Modular Router platform. From the experimentations over the KOREN testbed, we can see that the MOFI scheme can give better performance than the existing Proxy Mobile IP scheme.

Design and Implementation of SIP-based Multi-party Conference System Including Presence Service (Presence 서비스를 포함한 SIP 기반의 다자간 컨퍼런스 시스템의 설계 및 구현)

  • Jung Young-Myun;Ko Se-Lyung;Jang Choon-Seo;Jo Hyun-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.257-266
    • /
    • 2005
  • As developing of the internet and computer technology, more interests are gathered to the conference service which provides capability of multi-party real-time visual conference. In this paper, we have designed and implemented a SIP-based visual conference system which includes Presence service. The elements of this conference system are user system, which has conference UA(User Agent) capability, presence seuer and conference server. For the presence service, we have adapted publication method which uses SIP PUBLISH message, and with this service various status informations of users are easily acquired. Also invitations and involvements to the conference are easily made through this service. For the conference server which controls establishment and management of multi-party connections, we have included conference event package. This package provides dynamically changing conference informations and users informations through SIP subscription and notification functions.

  • PDF

Implementation of Ubiquitous Port Operation System Using RTLS (RTLS를 활용한 유비쿼터스 항만운영시스템 구축 방안)

  • Park, Doo-Jin;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.128-135
    • /
    • 2006
  • RTLS(Real Time Location System) is the system to provide information and real-time location of tagged objects by using RTLS tag. In this paper, in order to enhance the performance of the port operation system, and efficient operation method of yard is suggested by applying RFID(Radio Frequency Identification)-based RTLS that provides real-time accurate positions of containers. In the group-based loading sequence system, the containers in the same group should have the similar characteristics such as POD(Port of Destination), size, weight, etc. In order to run this system, we propose the scheme using the parameters to the unspecified N bytes of RFID tag specified in ISO 18000-7. According to simulation result, the group-based system reduces the re-handling ratio of TC(Transfer Crane) in yard. It will reduce the whole lead-time in the process of port pogistics.

  • PDF

A Study on the Impacts of SNS Usage on the Relationship and Effectiveness of Local Administration PR: Local Government vs. Residents Perspectives (자치행정PR을 위한 자치행정조직의 SNS 활용이 지역주민과의 관계 및 커뮤니케이션 증진과 행정의 관리 효과에 미치는 영향 : 자치행정조직과 지역주민간의 견해차 비교를 중심으로)

  • Seo, Hyun-Sik;Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.137-158
    • /
    • 2011
  • The study aims to determine whether SNS Usage has significantly influence on local administration PR. With the advance in information and communication technologies, many administrative organizations began to work in public relation to their residents via SNS. Nowadays SNS is transforming practical standpoints from forming public opinion through communication message to forming relationship with their residents. Therefore the needs to identify the relationship of the administrative organizations and their residents are demanded with the needs to investigate impact levels of SNS use on the relationships. While there are many researches to simply identify the features of SNS and to introduce local administration, the research investigating the sequential impacts of SNS use on local adminstration PR does not exist. The study targeted a borough office and its residents and compare those two groups. Findings illustrate that the SNS usage of administrative organizations suffer from the shortage of resident's feedback. Finally the study recommends the various issue developments to strike chord with their residents to utilize SNS use in local governmental organizations.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Transforming XML DTD to SQL Schema based on JDBC (XML DTD의 JDBC 기반 SQL 스키마로의 변환)

  • 이상태;주경수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.29-40
    • /
    • 2002
  • The information exchange on the using of XML such as B2B electronic is common. So the efficient method to store XML message in database is needed. Because the ORDBMS is extended to ORDBMS for supporting multimedia application such as Oracle8i, 9i, Informix and SQL2000 server, SQL2, the standard RDB is extended to SQL3 for ORDB, And the XML application based on java such as J2EE is extended. Therefor it is necessary for the efficient connection methods based on JDBC between XML application and database system. In this paper, the methodology a transformation XML DTD to SQL3 schema is proposed. For the transformation, first the methods of transformation XML DTD to object model in UML class diagram are proposed. And then the methods of mapping transferred object models to SQL3 schema are proposed. This approach for transform::1lion XML. DTD to SQL3 schema such as Oracle8i, 9i, Informix and SQL2000 server based on java is proposed in this paper, can be used in database design to build XML applications based on ORDB.

  • PDF

An Efficient Flooding Scheme using Clusters in Mobile Ad-Hoc Networks (애드 혹 네트워크에서 클러스터를 이용한 효율적인 플러딩 방안)

  • Wang Gi-cheol;Kim Tae-yeon;Cho Gi-hwan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.696-704
    • /
    • 2005
  • Flooding is usually utilized to find a multi hop route toward the destination which is not within transmission range in Ad Hoc networks. However, existing flooding schemes deteriorate the network performance because of periodic message exchanges, frequent occurrence of collisions, and redundant packet transmission. To resolve this, a flooding scheme using on demand cluster formation is proposed in this paper. The scheme employs ongoing Packets for constructing a cluster architecture as the existing on demand clustering scheme. Unlike to the existing on demand clustering scheme, the scheme makes use of unicast packet transmission to reduce the number of collisions and to find the flooding candidates easily. As a result, the proposed scheme yields fewer flooding nodes than other schemes. Simulation results proved that the proposed scheme reduces the number of transmissions and collisions than those of two other schemes.