• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.031 seconds

MAC Protocol considering Data Urgency for EH-WSN (EH-WSN에서 데이터의 긴급성을 고려한 MAC프로토콜)

  • Park, Gwanho;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.304-305
    • /
    • 2019
  • Wireless sensor networks are used in various applications due to the flexibility of network. In particular, the energy harvesting wireless sensor network (EH-WSN) has been introduced to solve the power limitation problem, and the application range of the sensor network is further expanded. In order to transmit the sensed data to the destination node, the MAC protocol considering the power of the nodes has been studied. The power situation and the urgency of the data are important elements of data transmission, and a medium access control protocol that comprehensively considers data urgency and power of nodes is required. In this paper, we propose a medium access control protocol which can select relay nodes according to power situation and urgency of data.

  • PDF

Development of Energy Efficiency Routing Technique for Mobile Ad-hoc Sensor Network (모바일 에드-혹 센서 네트워크를 위한 에너지 효율적 라우팅 기법 개발)

  • Lee, YangMin;Lee, KwangYong;Lee, JaeKee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.547-548
    • /
    • 2009
  • The development of USN(Ubiquitous Sensor Network) technology is creating numerous application areas. Although a network configuration with fixed sensors was the norm in the past, the coexistence of mobile and fixed sensor nodes is a new trend. Fixed sensor networks focused on the energy efficiency of nodes, but the latest studies consider guaranteeing the mobility of nodes and maintaining their connectivity, while remaining energy efficient at the same time. This paper proposes a routing protocol for a mobile ad-hoc sensor network that improves the mobility, connectivity and energy efficiency of nodes while allowing for the management and maintenance of a large number of nodes even in a complex communication environment where mobile and fixed nodes coexist. An algorithm for multi-hop multi-paths, a technique for topology reconfiguration by node movement prediction and vibration sensors, path setting for a large number of nodes, and efficient data transfer technology have been introduced to implement the modified LEAHC-AOMDV protocol. Furthermore, the excellence of this protocol was verified through a comparative experiment with the conventional LEACH protocol.

An Efficient Method of Transaction Process for EAI(Enterprise Application Integration) and Web Service (EAI(Enterprise Application Integration)와 Web Service 환경에서 트랜잭션의 효율적인 처리 방안)

  • Jung, Ji-Ho;Yoon, Chung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.435-442
    • /
    • 2004
  • It is important to integrate an enterprise application for automating of the business process, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can't supply the phase that classify the transaction by transaction weight. In this paper, we propose an efficient method of transaction process for business transactions, which is composed by "Classify Phase" that classify transactions. We called this model "3-Phase Commit Method Applied by Classify Phase, " we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.ion of that problem.

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

A Study of NMEA Protocol Multiplexer Simulation on the based optimizing Queue (최적화된 큐 기반의 NMEA 프로토콜 멀티플렉서 시뮬레이션에 관한 연구)

  • Park Si-Hyoung;Jung Sung-Hun;Kim Chang-Soo;Yim Chang-Mook;Yim Jae-Hong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.11a
    • /
    • pp.15-19
    • /
    • 2004
  • Domestic use, or embody program that transmit NMEA protocol using multi port as software and is using because there is no fee and product that develop NMEA protocol Multiplexer, import mounting for foreign climax present. These method is paid or there is problem that must make out special processing part in each application program. Also, each mountings that display NMEA protocol can cause double resources waste and damage etc. because manufacturing firm and platform are different. Can act separatively as single hardware module of reliable processing method and high efficiency to supplement this in this treatise, and because using design of optimized cue, heighten memory efficiency of module, and proposed NMEA protocol Multiplexer that can keep high trustability of Come on, deviation compass, echo sound, mountings of GPS and so on and real time communication that is main input sensor equipment about embodiment.

  • PDF

Development of the Kangaroo Care Protocol and its Effect on Premature Infants (미숙아를 위한 캥거루케어 프로토콜 개발 및 적용 효과)

  • Lee, Eun Jung;Kim, Eun Sook;Lee, You Na;Park, So Hyun;Lee, Gum Moon;Yi, Young Hee
    • Journal of Korean Clinical Nursing Research
    • /
    • v.20 no.3
    • /
    • pp.313-325
    • /
    • 2014
  • Purpose: This study aimed to develop the protocol of kangaroo care for premature infants and to evaluate its effects including physiologic responses of premature infants, their parents'anxiety, and neonatal nurses'perception regarding the kangaroo care. Methods: Kangaroo care protocol was developed through a literature review and validation of an expert group. The developed kangaroo care protocol was tested with 27 preterm infants, 24 parents, and 60 nurses in one neonatal intensive care unit in S hospital. Data were collected from December 2012 to February 2013 and analyzed by descriptive statistics and t-test using the SPSS/Win statistical program. Results: Physiologic responses including heart rate, respiration rate, oxygen saturation, body temperature among premature infants received the kangaroo care were maintained within normal limit. The anxiety levels of the parents who provided kangaroo care for their infants were significantly decreased as it was compared before and after care (t=3.43, p=.002). There were no significant differences in nurses'perceptions about kangaroo care before and after the application of the protocol. Conclusion: The developed kangaroo care protocol is proved to be effective and can be used safely in nursing practice.

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

Implementation of Communication Protocol between Control Centers using ICCP (ICCP를 사용한 전력센터간의 통신 프로토콜 구현)

  • Jang, Kyung-Soo;Chang, Byung-Wook;Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3910-3922
    • /
    • 2000
  • Current power systems are distributed geographically and operated in the form of Energy Management System(EMS)/ Supervision Control and Data Acquisition(SCADA) with the aid of computers and communications. Recently a variety of utilities have had interests in using inforrration technology to bring the efficiency and low operational costs. There is also a trend to integrdte the production, transmission, distribution and management/control of power into one and unified distributed system. To this end, Electric Power Hesearch Institute(EPRI) announced a new standard communication protocol called Inter-Control Center Protocol(ICCP).ICCP specifies the use of Manufacturing Message Specification(MMS) for services required by rccr in application layer and supports the communications between heterogeneous control centers. This paper presents the characteristics of MMS,ICCP and their relationship. Futherrnore, we implement the basic functional blocks of ICCP using MMS services under TCI/IP environments. Finally, we model a simple power system and apply the rccp protocol to this system in a window-based scheme, and finally show the operation and validation of this protocol.

  • PDF

An Enhanced Xcast Protocol for Mobile Nodes in IP Networks (IP 망에서의 이동 노드를 위한 향상된 Xcast, 프로토콜)

  • Nam Sea-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.85-95
    • /
    • 2005
  • Whereas the traditional multicast schemes based on Mobile IP can support a limited number of very large multicast groups, the Xcast protocol can support a very large number of small multicast groups, In the Xcast, the source node encodes the list of destinations in the Xcast header. Therefore, the maximum packet size in the network limits the number of destinations that a Xcast packet may have. In this paper, an enhanced Xcast protocol is proposed to solve the multicast group size limitation of the existing Xcast protocol in providing multicast service for mobile nodes. Moreover, the SIP (a very flexible control plane protocol) is integrated with the proposed multicast scheme to provide mobility awareness on the application layer. The simulation results verify that the proposed multicast scheme not only increases the packet delivery ratio and the data packet forwarding efficiency but also achieves low latency of packets in the network.

  • PDF

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.