• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.032 seconds

Hierarchical Message Forwarding Scheme for Efficient Data Distribution in P2P Messaging System (P2P 출판-구독 메시징 시스템에서 효율적인 정보 전파를 위한 계층적 메시지 전송 기법)

  • Jung, Jin Sun;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.209-216
    • /
    • 2019
  • Publish-subscribe communication model is popular for various type of distributed applications because of its loosely coupled style connections. Among the various architecture style for publish-subscribe system, peer-to-peer architecture has been used for the mission critical application domain since it provides high scalability and real-timeness. On the other hand, to utilize the bandwidth of given networks, message filtering is frequently used to reduce the number of messages on the system. Even if P2P provides superior scalability, it is hard to apply filtering to the its messaging system because the filtering process should be done on the peer-side in P2P architecture that are usually done on the broker server in conventional pub/sub architecture. In this paper, we propose a hierarchical subscription management structure as well as message forwarding scheme for efficient data dissemination. Our proposed scheme reduces the number of received messages by filter-out un-wanted messages and offloading the message dissemination work to other subscribers to enhance the messaging throughput.

An Implementation and Performance Analysis of IPC Mechanism in M3K : A Multimedia Micro-Kernel (멀티미디어 마이크로 커널 M3K에서 프로세스간 통신 구현 및 성능 분석)

  • Kim, Young-Ho;Ko, Young-Woong;Ah, Jae-Yong;Yoo, Hyuck
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.143-152
    • /
    • 2002
  • As the multimedia application becomes ubiquitous, the size of message used for Inter Process Communication (IPC) grows up to cope with the requirements of multimedia applications. And the rapid development of new hardware platforms makes the portability of operating system more important. But the traditional micro-kernel operating system is Implemented platform dependently for better performance, and especially focused on handling short message. In this paper, we present the design and implementation of IPC mechanism in M3K (MultiMedia Micro-Kernel) to address the above problems. Our IPC mechanism provides enhanced performance and efficiently handles large message without performance degrading.

The effect of media modality and the valence of risk messages on affective risk perception and behavioral intention (미디어 형식과 위험 메시지 구성이 감정적 위험인식과 행위의도에 미치는 영향)

  • Lee, Jae-Shin
    • Korean Journal of Cognitive Science
    • /
    • v.23 no.4
    • /
    • pp.457-485
    • /
    • 2012
  • The current study explores how media modality and message frame interact to form individuals' affective risk perception and behavioral intention. Specifically, participants were exposed to positive and negative messages on irradiated foods in text, audio, and audio/video formats and their affective risk perception and purchase intention were measured. Results indicate that individuals' affective risk perception and purchase intention were influenced by media modality and message frame. The significant interaction effects between the two variables were also observed. The results indicate that the appropriate media modality should be carefully selected based on the message content for effective risk communication.

  • PDF

A New Congestion Control Algorithm for Vehicle to Vehicle Safety Communications (차량 안전 통신을 위한 새로운 혼잡 제어 알고리즘 제안)

  • Yi, Wonjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.125-132
    • /
    • 2017
  • Vehicular safety service reduces traffic accidents and traffic congestion by informing drivers in advance of threats that may occur while driving using vehicle-to-vehicle (V2V) communications in a wireless environment. For vehicle safety services, every vehicle must broadcasts a Basic Safety Message(BSM) periodically. In congested traffic areas, however, network congestion can easily happen, reduce the message delivery ratio, increase end-to-end delay and destabilize vehicular safety service system. In this paper, to solve the network congestion problem in vehicle safety communications, we approximate the relationship between channel busy ratio and the number of vehicles and use it to estimate the total network congestion. We propose a new context-aware transmit power control algorithm which controls the transmission power based on total network congestion. The performance of the proposed algorithm is evaluated using Qualnet, a network simulator. As a result, the estimation of total network congestion is accurately approximated except in specific scenarios, and the packet error rate in vehicle safety communication is reduced through transmit power control.

Development of Efficient Risk Analysis and Productivity Improvement System in Interface Communication Environment (인터페이스 통신 기반 개발 환경에서의 효율적인 위험도 분석 및 생산성 향상 시스템 개발)

  • Song, TaeIll;Hong, ChoongSeon;Kim, KyeongSu;Choi, HongSuk;Jeong, WonSik;Won, JongSeop
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.632-645
    • /
    • 2016
  • The enterprise environment, various interface systems are utilized for business processes and for exchange of messages. In the interface communication environment, as business complexity increases, the interface system is connected with numerous systems. With increasing number of linked systems, there is a proportional increase in the workforce, leading to a rise in numerous risks (inconsistency of information, non-compliance with standards, etc.). To solve the problem, we propose a system for managing and centralizing information of the message based interface system. The proposed system enables information integration management, message information distribution, standard code generation, risk management and risk evasion. Using the proposed system, the in development environment user can prevent inconsistent information, analyze risk, avoid risk, distribute information automatically and create a standard code. Ultimately, there is an increase in user productivity and it is possible to evade the risks involved.

A V2V Transmission Scheme for Safety Message Dissemination in Platooning (군집주행 차량의 안전 메시지 전달을 위한 V2V 전송 기법)

  • Ahn, Woojin;Hong, Hanseul;Kim, Ronny Yongho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.548-553
    • /
    • 2019
  • Along with advanced vehicle to vehicle (V2V) communication technologies, platooning is regarded as one of the most promising form of autonomous driving solutions in order to increase road capacity. In this paper, we propose a novel V2V transmission scheme for safety message dissemination in platooning. The proposed scheme enhances the efficiency of channel access and multi-vehicle orthogonal frequency division multiple access (OFDMA) transmission by taking advantage of triggered uplink access technique and null data packet feedback report protocol introduced in the sixth generation WLAN standard, IEEE 802.11ax. The simulation results prove that the proposed scheme outperforms the conventional IEEE 802.11 transmission scheme throughout all measured vehicle density range.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Dsign of Virtual Manufacturing Device for MMS Operations in MAP Network (MAP네트웨크에서 MMS운영을 위한 가상 제조 기기의 설계)

  • Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.397-405
    • /
    • 1995
  • In order to operate the automatic devices of manufacturing process more efficiently and to solve the needs of the resource sharing,network technology is applied to the unit control devices located in common manufacturing zone and operated by connecting them.In this paper,functional standard of the network operation layer is set as MAP standard application layer of MMS(manufacturing message standard)for the cell or group,which is suggested by CIM (computer integrated manufacturing) standardization as common manufacturing zone.MMS is composed of abstract message which is not consider specific devices.Then,specific message standard must be defined to operate MMS.It is designed as VMD (virtual manufacturing device)objects which are abstract objects to perform group management based on the companion standard.Also they are operated in the group management model system.Group management operation takes multicast communication method which is the communication from single source to the multiple sinks, and the group management system and unit control devices are performed as VMD and real device mapping.

  • PDF

Secure Steganography Based on Triple-A Algorithm and Hangul-jamo (Triple-A 알고리즘과 한글자모를 기반한 안전한 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.507-513
    • /
    • 2018
  • Steganography is a technique that uses hidden messages to prevent anyone apart from knowing the existence of a secret message, except the sender and trusted recipients. This paper applies 24 bit color image as cover medium. And a 24-bit color image has three components corresponding to red, green and blue. This paper proposes an image steganography method that uses Triple-A algorithm to hide the secret (Hangul) message by arbitrarily selecting the number of LSB bits and the color channel to be used. This paper divides the secret character into the chosung, jungsung and jongsung, and applies crossover, encryption and arbitrary insertion positions to enhance robustness and confidentiality. Experimental results of the proposed method show that insertion capacity and correlation are excellent and acceptable image quality level. Also, considering the image quality, it was confirmed that the size of LSB should be less than 2.