• Title/Summary/Keyword: Application protocol

Search Result 1,507, Processing Time 0.026 seconds

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

Refining and Validating a Two-stage and Web-based Cancer Risk Assessment Tool for Village Doctors in China

  • Shen, Xing-Rong;Chai, Jing;Feng, Rui;Liu, Tong-Zhu;Tong, Gui-Xian;Cheng, Jing;Li, Kai-Chun;Xie, Shao-Yu;Shi, Yong;Wang, De-Bin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10683-10690
    • /
    • 2015
  • The big gap between efficacy of population level prevention and expectations due to heterogeneity and complexity of cancer etiologic factors calls for selective yet personalized interventions based on effective risk assessment. This paper documents our research protocol aimed at refining and validating a two-stage and web-based cancer risk assessment tool, from a tentative one in use by an ongoing project, capable of identifying individuals at elevated risk for one or more types of the 80% leading cancers in rural China with adequate sensitivity and specificity and featuring low cost, easy application and cultural and technical sensitivity for farmers and village doctors. The protocol adopted a modified population-based case control design using 72, 000 non-patients as controls, 2, 200 cancer patients as cases, and another 600 patients as cases for external validation. Factors taken into account comprised 8 domains including diet and nutrition, risk behaviors, family history, precancerous diseases, related medical procedures, exposure to environment hazards, mood and feelings, physical activities and anthropologic and biologic factors. Modeling stresses explored various methodologies like empirical analysis, logistic regression, neuro-network analysis, decision theory and both internal and external validation using concordance statistics, predictive values, etc..

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Forward Migration of an Active Rule Mobile Agent using the Meta_data (메타데이터를 이용한 능동규칙 이동에이전트의 정 방향 이주)

  • Lee, Yon-Sik;Lee, Jun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1567-1574
    • /
    • 2012
  • Since a migration method of the mobile agent is a factor that affects the overall performance of the entire distributed system, it is necessary to find efficient migration methods of the mobile agent within the sensor network and to collect and store data related to various components(server, sink and sensor node) of the sensor network, thereby providing consistent naming services. Accordingly, this paper presents design and implementation of MetaTable that is divided into MetaData where information on the sensor data server is stored and SubMetaData where various types of information on sink nodes and data on sensor nodes connected with the sink nodes is stored. Moreover, the paper also presented the implementation of forward migration of an active rule mobile agent applying the naming method based on RMI that used the meta_table and proposed the possibility of constructing efficient sensor network application environment. In this paper, for registration, release and retrieval methods suitable for new sensor network environment, we designed and implemented the naming agent by applying J2EE model based on RMI-IIOP(Internet Inter-ORB Protocol) technique.

Open Services Environment capabilities for NGN Application (NGN 응용을 위한 개방형 서비스 환경 기능)

  • Lee, Won-Suk;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.685-688
    • /
    • 2008
  • A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users in this paper. we describe the trend of standardization activity related with open services environment capabilities which had been finally approved at September 2008 in ITU-T. ITU-T SG13 is responsible for studies relating to the architecture, evolution and convergence of next generation networks including frameworks and functional architectures, signalling requirements for NGN.

  • PDF

Java Card-based User Authentication and Personalized IPTV Services in 3G Mobile Environment (개인 맞춤형 IPTV 서비스를 위한 자바카드 기반의 사용자 인증 메커니즘)

  • Park, Youn-Kyoung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.528-543
    • /
    • 2008
  • Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV's main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user's private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.

Shedding Light on the Use of AS Relationships for Path Inference

  • Deng, Wenping;Muhlbauer, Wolfgang;Yang, Yuexiang;Zhu, Peidong;Lu, Xicheng;Plattner, Bernhard
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.336-345
    • /
    • 2012
  • Autonomous system (AS) business relationships and their inference have been widely studied by network researchers in the past. An important application of inferred AS relationships can be the prediction of AS paths between a source and destination AS within a model. However, besides knowing the topology and inferred AS relationships, AS path prediction within a model needs to be understood in order for us to know how we can derive border gateway protocol (BGP) policies from AS relationships. In this paper, we shed light onto the predictive capabilities of AS relationships by investigating whether they can be translated into BGP policies such that inferred AS paths are consistent with real AS paths, e.g., paths observed from BGP routing tables. Our findings indicate that enforcing constraints such as the well-known valley-free property and the widely assumed preference of customer routes always results in a very low consistency for AS path inference. In addition, this is true irrespective of whether customer, peer, or provider routes are preferred. Apparently, applying such constraints eliminates many "correct" paths that are observed in BGP routing tables and that are propagated in a simple shortest path model where AS relationships are ignored. According to our findings, deriving BGP routing policies for predicting with high accuracy AS paths in a model directly from AS relationships is still difficult.

A Communication Platform for Mobile Group Peer-to-Peer Services (모바일 그룹 P2P 응용 서비스를 위한 통신 플랫폼)

  • Song, Ji-Hwan;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.389-400
    • /
    • 2008
  • As the wireless network technologies and the capability of the mobile terminals are evolving, advanced peer to peer applications for mobile users are attracting interests. In this paper, we propose the mobile P2P communication platform(MPCP) which provides transparency to the wireless network technologies and solutions to the limited resources of the mobile terminals. MPCP classifies the connection into two levels: a virtual channel and a session. A virtual channel is the network layer connection between the terminals whereas a session is the application layer connection. MPCP classifies the sessions into four types and applies different scheduling priority and data processing policies such as segmentation and reassembly. It selects proper wireless network technologies depending on the distance between the communication endpoints. To acquire dynamically changed access address, we harness the Session Initiation Protocol. We implemented MPCP on embedded Linux simulator and utilized the implementation in mobile P2P service development. For the quantitative analysis, we compared the performance of MPCP with that of ftp. Regardless of the number of simultaneous sessions, MPCP maintains the relative performance.

UDT Parallel Transfer Technologies Adaptive to Network Status In High Speed Network (고속네트워크에서 네트워크 혼잡상태에 적응적인 UDT 병렬전송 기법)

  • Park, Jong Seon;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.2 no.4
    • /
    • pp.51-59
    • /
    • 2013
  • With increasing transmission speed of backbone networks, it is getting to provide enough available bandwidth. However, the bandwidth is not effectively utilized in volumetric data transfer. This mainly comes from the transmission protocol, TCP, which is used for most applications. TCP is inherently difficult to adapt the available bandwidth because of it's own characteristic of transfer mechanism. UDT is a prominent application level data transfer protocol which is targeting high speed network. In this paper, we propose UDT parallel transfer technologies which is adaptive to network status and then evaluate their performance in two points of view. Firstly, we measure data transfer rate of UDT with rate congestion control methods, and compare them with basic UDT. Secondly, we apply parallel transfer technologies adapted to network status, and measure their performance. Experimental results showed that UDT rate congestion control method outperforms UDT with 106% improvement in RTT 100ms section set with jitter 30ms. In addition, performance of parallel transfer with rate congestion control method showed 107% improvement than that of parallel transfer in RTT 400ms section set with jitter 20ms.

  • PDF

Implementation of Next Generation DSL Networks (차세대 DSL망의 구현 방안)

  • Park Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.236-243
    • /
    • 2005
  • Most of the existing legacy DSL networks, about 80 million lines world-widely, adopted ‘ATM(Asynchronous Transfer Mode) over DSL’protocol architecture for the effective interworking with the ATM-based regional backbone networks and for the effective support of native ATM-based multimedia application services. Recently, however, the regional backbone networks are moving towards Metro Ethernet networks, instead of the ATM networks, and most of the current multimedia applications are If-based, not native ATM-based. These environmental changes push the architecture of DSL networks to be accordingly changed, and the‘Ethernet over DSL’protocol architecture, instead of existing‘ATM over DSL’, is tried to be applied to the implementation of next generation DSL networks such as VDSL(Very high-rate DSL) . In this paper, we propose two different implementation models for next generation DSL networks in Metro Ethernet backbone environments, respectively EA(Ethernet-to-ATM) implementation model and RE(Ethernet-to-Ethernet) implementation model. And, a comparative analysis focused on the performance and the backward compatability with the legacy DSL networks will be presented.