• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.028 seconds

Implementation and Performance Evaluation of the Wireless Transaction Protocol Using UML/SDL (UML과 SDL을 이용한 무선 트랜잭션 프로토콜의 구현과 성능 평가)

  • 정호원;임경식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1064-1073
    • /
    • 2002
  • In this paper, we design and implement the Wireless Transaction Protocol (WTP) proposed by the Wireless Application Protocol (WAP) forum using a protocol development tool, SDL Development Tool (SDT). And we conduct a comparative performance evaluation of the WTP implementation with other three implementations that are based on different implementation models respectively: the server model, the coroutine model, and the activity-thread model. To implement WTP, we first use Unified Modeling Language (UML) for analyzing the protocol requirement and defining the protocol engine architecture. Next, we use Software Development Language (SDL) to design the protocol engine in details and then generate the WTP implementation automatically with the aid of SDT The code size of the WTP implementation generated by SDT is 62% larger than the other three implementations. However, its throughput and system response time for transaction processing is almost equal to the other three implementations when the number of concurrent clients is less than 3,000. If more than 5,000 concurrent clients tries, the transaction success rate abruptly decreases to 10% and system response time increases to 1,500㎳, due to the increased protocol processing time. But, it comes from the fact that the load overwhelms the capacity of the PC resource used in this experimentation.

A Design of Transducer Interface Protocol for Context-aware Middleware (상황인식 미들웨어를 위한 트랜스듀서 인터페이스 프로토콜 설계)

  • Jang, Dong-Wook;Sohn, Surg-Won;Han, Kwang-Rok;Sun, Bok-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.45-55
    • /
    • 2011
  • Context awareness technologies are based on efficient sharing of environment information of ubiquitous sensors in everyday life, and users require this awareness technologies to get quality of services. However, the application has been restricted due to its varieties of sensors and many different methods of communications. Therefore, IEEE 1451 standard has been published to interface between sensors and network layer. But it does not connect to a middleware because IEEE 1451 is for transducer standards. This paper presents a transducer and application interface protocol which connect to the context-aware middleware by defining a protocol to obtain context information using XML. We have implemented a bridge health monitoring system and railroad monitoring system in which different sensors and users' application are used to prove the efficacy of proposed interface protocols.

A Design and Implementation of Indoor IoT Resource Control Service using Web-based IETF CoAP Protocol (웹 기반의 IETF CoAP 프로토콜을 이용한 실내 IoT 자원 제어 서비스 설계 및 구현)

  • Jin, Wenquan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.77-82
    • /
    • 2016
  • Recently, an IoT(Internet of Things) application communication protocol is standardizing for connectivity between every things on Internet. In this paper, we design and implement an indoor resource control service using IETF (Internet Engineering Task Force) CoAP (Constrained Application Protocol) based on Web. We present an indoor resource control architecture based on Web included functionalities of proxy and RD (Resource Directory) in a web server. Developed indoor resource control service supports to register low-powered and small-scale IoT nodes to web server using CoAP. This service allows users to control the indoor resources through a web browser using Web proxy with functionality of HTTP-CoAP converting.

Adaptive Application of CPP Algorithm to Test Suite Generation for Protocol Conformance Testing (프로토콜 적합성 시험항목 생성시 CPP 알고리즘의 적응적 적용 방안)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.597-604
    • /
    • 2019
  • In this paper, we propose an improved method on an adaptive application of the CPP(Chinese Postman Problem) algorithm to the protocol test suite generation for conformance testing. Also, we present an example application of this CPP algorithm to B-ISDN Q.2931 call/connection control procedure for the purpose of showing how it can be adapted to generate a test suite for conformance testing of a communication protocol. The proposed method has an advantage of an optimization technique which finds a minimum cost of test suite from a standardized specification, so this optimization technique of the CPP algorithm can be practically applied to a real environment for testing a conformity of a protocol implementation.

Neighbor-Based Probabilistic Rebroadcast Routing Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

  • Harum, Norharyati;Hamid, Erman;Bahaman, Nazrulazhar;Ariff, Nor Azman Mat;Mas'ud, Mohd Zaki
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.1-8
    • /
    • 2021
  • In Mobile Ad-Hoc Network (MANET) Application, routing protocol is essential to ensure successful data transmission to all nodes. Ad-hoc On-demand Distance Vector (AODV) Protocol is a reactive routing protocol that is mostly used in MANET applications. However, the protocol causes Route Request (RREQ) message flooding issue due to the broadcasting method at the route request stage to find a path to a particular destination, where the RREQ will be rebroadcast if no Request Response (RREP) message is received. A scalable neighbor-based routing (SNBR) protocol was then proposed to overcome the issue. In the SNBR protocol, the RREQ message is only rebroadcast if the number of neighbor nodes less than a certain fix number, known as drop factor. However, since a network always have a dynamic characteristic with a dynamic number of neighbor nodes, the fix drop factor in SNBR protocol could not provide an optimal flooding problem solution in a low dense network environment, where the RREQ message is continuously rebroadcast RREQ message until reach the fix drop factor. To overcome this problem, a new broadcasting method as Dynamic SNBR (DSNBR) is proposed, where the drop factor is determined based on current number of neighbor nodes. This method rebroadcast the extra RREQ messages based on the determined dynamic drop factor. The performance of the proposed DSNBR is evaluated using NS2 and compared with the performance of the existing protocol; AODV and SNBR. Simulation results show that the new routing protocol reduces the routing request overhead, energy consumption, MAC Collision and enhances end-to-end delay, network coverage ratio as a result of reducing the extra route request messages.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Accounting Model for Mobile RFID Service (모바일 RFID 서비스를 위한 과금 모델)

  • Lee, Ho-Seon;Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.76-79
    • /
    • 2007
  • RFID is issued as a core technology for Ubiquitous environment recently. Especially, Mobile RFID which is converged with RFID and wireless internet, provides new services to users, increased added-value to service providers. For commercial service of Mobile RFID, it needs an accounting service. The Diameter Base Protocol, mostly used for authentication, authorization, and accounting service, supports only deferred accounting service. For more variable accounting policy, Diameter Credit-Control Application which is capable of prepayment accounting, also should be considered. In this paper, a new accounting model with Diameter Credit-Control Application for Mobile RFID service is proposed.

  • PDF

Nursing Protocols of Cold Application in Different Medical Institutions in Korea (전국 의료기관의 냉 요법 실무지침 및 임상간호사의 냉 요법 실무 현황)

  • Shin, Yong Soon
    • Journal of Korean Clinical Nursing Research
    • /
    • v.21 no.3
    • /
    • pp.355-365
    • /
    • 2015
  • Purpose: The purpose of this study was to evaluate nursing protocols for superficial cryotherapy in different medical institutions. Methods: The study was conducted with a cross-sectional descriptive design. The medical institutions including general hospitals, hospitals, and geriatric hospitals were randomly selected. A total of 435 nurses from 126 institutions completed a questionnaire. Data were collected from December 2014 to June 2015. Results: Forty-two institutions (39.5%) had nursing protocol for cryotherapy. The nurses reported that durations of cold application were 2 minutes to 5 hours. Frequently used cold therapy devices in order of frequency were frozen gel packs, ice packs, and frozen IV fluid bags. There were variances in the duration of cold application according to the types of institution ($x^2=7.78$, p=.020) and nursing units ($x^2=26.42$, p<.001). In addition, intervals of cold application were different according to the nursing units (x=12.23, p=.032). There were differences in cold application instruments by regional groups (x=70.38, p<.001). Most of the nurses (95.6%) responded that national nursing protocol for superficial cryotherapy were needed. Conclusion: There were difficulties in providing consistent nursing interventions because of the practical differences and absence of evidence-based guidelines for cryotherapy. The researchers recommend that basic studies with various instruments be conducted and proper nursing protocols be developed for cryotherapy.

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.