• Title/Summary/Keyword: END

Search Result 27,100, Processing Time 0.05 seconds

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

ZigBee End-to-End Security For Ubiquitous Home Network (유비쿼터스 홈 네트워크에서의 ZigBee End-to-End 보안 기술)

  • Park, W.C.;Lee, M.S.;Yoon, M.H.;Kim, S.D.;Yang, S.H.
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.128-136
    • /
    • 2007
  • 무선 기술이 가지는 장점인 설치의 편리성, 기동성으로 인하여, ZigBee를 이용한 홈 네트워크 서비스 활용성에 대한 기술개발이 활발히 진행되고 있다. 이러한 유비쿼터스 홈 서비스의 활용성에도 불구하고 ZigBee 기반 홈 기기나 센서 정보의 도청, 비정상적인 패킷의 유통, 메시지 재사용등의 데이터 위/변조 문제와 네트워크 전체를 마비시킬 수 있는 서비스 거부 공격등에 쉽게 노출되어 있다. 본 논문에서는 이에 대한 효과적인 대응과 관리 처리를 위하여, 유비쿼터스 홈 네트워크에서의 ZigBee 기술을 사용할 시에 발생할 수 있는 보안 문제점을 해결하기 위한 ZigBee 기반 End-to-End 보안 기술을 개발하였다. 본 기술 개발의 특징은 ZigBee Device, 코디네이터/게이트웨이 영역은 ZigBee 표준 스펙을 구현하였으며, 응용어플리케이션/서버 영역은 표준 스펙이 정의 되어 있지 않으나, 이 부분을 유비쿼터스 홈 네트워크 서비스 관점에서 설계 및 구현하였다. ZigBee 디바이스가 가지는 하드웨어 자원의 빈약성을 고려하여 최대한 보안 기능을 리소스가 풍부한 응용어플리케이션/서버의 자원 활용에 촛점을 맞췄다.

  • PDF

A Study on Packet Transmissions using overhearing and Time-Interval in WMSNs (WMSN에서 엿듣기와 시간 지연을 이용한 패킷 전송에 관한 연구)

  • Ha, IlKyu;Byeon, Seokjin;Ahn, ByoungChul
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.464-471
    • /
    • 2013
  • With the advance of wireless sensor networks, WMSN(Wireless Multimedia Sensor Networks) researches to transfers multimedia data have been studied actively. First of all, three basic protocols, End-to-end, Hop-by-hop, and Unreliable transmission method, are compared to transfer multimedia data using simulations. This paper presents an efficient protocol to transfer multimedia data by overhearing messages of nodes and by transmitting next packets during the unused time interval. The proposed method is verified its performance by simulations and experiments. The results shows that the transmission rate of the proposed method 22% higher than that of End-to-end protocol with half of transmission time. Also the performance of the proposed method is compared with that of PIGAB(Packet Interval Gap based on Adaptive Backoff).

Analysis of body size selectivity of by-catch using the cover net method for a shrimp beam trawl

  • Kim, Yonghae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.2
    • /
    • pp.171-178
    • /
    • 2015
  • Selectivity and by-catch are the main features used to define fish catch for fisheries management or to determine fishing gear efficiency. A fish girth distribution analysis was carried out to determine the retention rate of juveniles discarded and to establish common selectivity for a multispecies catch. Total body length, body weight, and girth of juvenile fish retained in the cod-end and cover net separately were collected using an 18-mm mesh cover net during 12 fishing trials with a 41-mm cod-end beam trawl. The by-catch weight ratio in the cod-end was twice that of the by-catch ratio in number. The 50% selectivity of body length and 50% girth of redfin velvet fish were not significantly different between the cod-end and cover net, whereas those of other fish species were significantly different between the cod-end and cover net. The difference in 50% selectivity girth of other fish between the cod-end and cover net was similar between cod-end mesh size and cover net mesh size. Furthermore, the difference in 50% body length selectivity of other fish between the cod-end and cover net was almost double the difference in girth. Girth selectivity in a multispecies catch using towed fishing gear was effectively used to determine fish and net mesh size.

A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet (무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜)

  • 임수철;강상승;이병래;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.645-653
    • /
    • 2002
  • The WPP payment protocol uses the WAP protocol to enable credit card payment on the wireless internet. Since the security of the WAP protocol is based on the WTLS security protocol, there exists an end-to-end security weakness for the WPP payment protocol. This paper is suggesting a payment protocol, which is making use of the Public-Key Cryptosystem and the Mobile Gateway, so assuring end-to-end security independently of specific protocols. As the on-line certification authority is participating on the authentication process of the payment protocol, the suggested payment protocol enables wireless devices to get services from service providers on other domains.

Shaking Motion Characteristics of a Cod-end Caused by an Attached Circular Canvas during Tank Experiments and Sea Trials

  • Kim, Yonghae
    • Fisheries and Aquatic Sciences
    • /
    • v.16 no.3
    • /
    • pp.211-220
    • /
    • 2013
  • A shaking motion could be used to improve fish escapement from a cod-end net by creating a sieving effect over the swept volume or by disturbing the optomotor response of the fish. In this study, a perpendicular shaking motion was generated in a towed cod-end net by a circular canvas attached to the end of the codend, which formed a biased cap-like shape. This concept was tested by using a model in a flow tank and by towing a prototype cod-end during sea trials. For the model tests, the amplitude of the shaking motion was $0.6{\pm}0.1$ times the rear diameter of the cod-end, and the period of the shaking motion was $2.6{\pm}0.1$ s at a flow velocity of 0.6 or 0.8 m/s. In the sea trials, the amplitude was $0.5{\pm}0.2$ times the rear diameter of the cod-end, and the period of the shaking motion was $7{\pm}4$ s at towing speeds of 1.2 or 1.7 m/s. Thus, the shaking amplitude during the sea trials was equal to or less than that observed in the tank tests, and the shaking period was twice as long. The shaking motion described by the amplitude and period could be an effective means to stimulate fish escapement from cod-end during fishing operations considering the response of the fish.

A Scale-Effect of O-Cell Pile Load Test with Variable End Plate (가변선단재하판을 이용한 양방향말뚝재하시험의 치수 효과)

  • Joo, Yong-Sun;Kim, Nak-Kyung;Kim, Ung-Jin;Park, Jong-Sik
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.884-890
    • /
    • 2009
  • The bi-directional pile load test with variable end plate overcomes the shortcoming of the Osterberg cell test. It is possible that the ultimate bearing capacity of the bi-direction can be known by using the loading of the end plate and two step procedures. The first step is to confirming end bearing capacity with variable end plate and the second step is similar to the conventional O-cell test. In the study, To calculate ultimate capacity of bi-directional load test using model with the pile with variable end plate O-cell, operated with end plate of 3 type on sand layer according to the relative density, loose, medium and dense conditions.

  • PDF

A Study of Virtual Private Network On based Environment IP Security Simulations Quality of Service Guarantee (IPSec 기반 환경하에서 QoS 보장 가상 사설망 구현 방안 연구)

  • Kim, Jeong-Hun;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.150-153
    • /
    • 2001
  • Today Internet is only Best-Effort service. During the past few years, new types of internet applications which require performance beyond the best-effort service that is provided by the current internet have emerged. These applications required QoS(Quality of Services) guarantee and Security between end-to-end. In this paper simulations Differentiated Services that IETF(Internet Engineering Task Forte) has proposed one of QoS(Quality of Services) guarantee VPN(Virtual private Network) using QoS(Quality of Services) guarantee and IP Security between end-to-end.

  • PDF

Modelling and performance analysis for the end-to-end path tracing managment in ATM network (ATM망의 단대단 통신로 추적관리의 모델링 및 성능분석)

  • 박명환;안중영;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.9
    • /
    • pp.2385-2401
    • /
    • 1996
  • In this paper, a management model and a path trace algorithm are proposed for the end-to-end path tracing management in ATM network. Proposedmodel is based on the TINA(Telecommunication Information Networking Architecture) and computational object(CO) of ODP(Open Distributed Processing).We related computational object for the path trace to another computational object which covers the ATM routing and established operational procedure according to this relationship. This procedure identifies the end-to-end by way of tracing the ATM connections then collect identification information on the that path. End-to-end trace is performed on the network management level. Broadcasting-with-synchronized-control and GTM(Global Ticket Method) are proposed as path trace algorithm considering the real time properties and data ingetrity. Computer simulations are also performed to evaluate the performance of the proposed algorithm and its resuls are shown in this paper.

  • PDF

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.