• Title/Summary/Keyword: Message control

Search Result 802, Processing Time 0.022 seconds

An Implementation of Large Scale JMS(Java Message System) for Transmission Time Minimization (JMS 메시지 송수신 시간의 최소화를 위한 대용량 메시지 송수신 플랫폼 구현)

  • Cho, Poong-Youn;Park, Jae-Won;Choi, Jae-Hyun;Lee, Nam-Yong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • Recently, message based data transmission plays an important role in modem computing systems. Especially JMS(Java Message Service) is one of the most popular messaging platform. However, because of its characteristics for maintaining reliability, if we want to use it for transmission of large scale messages in a distributed Internet environment by using a WAN connection which may not be robust enough, we need to employ a different method to minimize total transmission time of messages. We found the fact that the total time of message transmission heavily depends on size of a message. In order to achieve the ideal size of a message, we develope a novel mechanism and a system which finds the ideal size of a message and automatical1y control JMS applications for minimizing transmission time. Finally, we test the proposed mechanism and system using real-data in order to prove advantages and compared with the naive mechanism. As a conclusion, we showed that our proposed mechanism and system provide an effective way to reduce transmission time of large scale messages in distributed environment.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Design Algorithm & Datagram Analysis of UDP using Queuing (Queuing을 이용한 UDP 설계 알고리즘과 데이터그램 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.231-233
    • /
    • 2004
  • Queuing is waiting lines which play routing service when packet entered. Queuing is decide how and whom is going to provide priority service. This is kind of first in first out(FIFO) or weighted fair queuing(WFQ) method. In this study, UDP design using WFQ way to serve to provide service evenly and rapidly in network. Also in actuality internet, datagram analyzed by packet captured. Queuing services through the requesting port number, input, output, output queuing creation & delete, message request by internet control message protocol(ICMP). Queuing designed in control block module, input queues, input/output module composition. In conclusion, I have confirm queuing result of WFQ method by the datagram information analyzed.

  • PDF

Research of Short Preamble MAC Protocol for Energy Efficient in Wireless Sensor Network (무선 센서 네트워크에서의 에너지 효율을 위한 짧은 프리앰블을 가지는 MAC프로토콜에 대한 연구)

  • Na, Kyeng-Heum;Lee, Sang-Bin;Ko, Doo-Hyun;An, Sun-Shin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.1
    • /
    • pp.204-209
    • /
    • 2010
  • Idle listening is very critical source of energy dissipation in wireless sensor networks. To reduce idle listening, we propose preamble sampling MAC that is named EESP-MAC. The main idea of EESP-MAC is to add control information into the short preamble frame. So the stream of short preambles is used not only for preamble sampling but also for avoiding overhearing, decreasing control packet overhead and reducing the listening of the redundant message, caused by message-flooding.

Differentiated message handling and performance evaluation for the NGN call control services (NGN 서비스의 호 처리 차별화 방안 및 성능분석)

  • 정문조;황찬식
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.145-154
    • /
    • 2003
  • In this paper we propose service schemes for the control message of voice and data connections served by a Softswitch in NGN (next generation networks). After that we propose a method of evaluating the performance of a Softswitch that provides a limited delay to voice connections. Via numerical experiments, we verify the implication of the proposition in the design of a Softswitch, which simultaneously incorporates voice and data services in the NGN framework.

Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software (동적 구문처리기 소프트웨어 적용을 통한 대화력전 수행체계 연동의 유연성 향상 방안)

  • Hong, Won-Eui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.

Implementation of Real-Time Communication in CAN for Humanoid Robot (CAN 기반 휴머노이드 로봇에서의 실시간 데이터 통신의 구현)

  • Kwon, Sun-Ku;Huh, Uk-Youl;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.246-248
    • /
    • 2005
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. However, CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO (Inha Semyung Humanoid RObot).

  • PDF

Cell Phone Addiction in Highschool Students and Its Predictors (고등학생의 휴대전화 중독과 예측 요인)

  • Koo, Hyun-Young
    • Child Health Nursing Research
    • /
    • v.16 no.3
    • /
    • pp.203-210
    • /
    • 2010
  • Purpose: This study was done to identify cell phone addiction in high school students and variables predicting this addiction. Methods: The participants were 469 adolescents from four high schools. Data were collected through self-report questionnaires, and analyzed using the SPSS program. Results: Of the high school students, 88.4% reported being average users, 7.5%, heavy users, and 4.1%, cell phone addicted. Cell phone addiction was significantly correlated with immediate self-control, self-efficacy, depression, and peer support. Predictors of cell phone addiction were the following: receiving text message on weekends, immediate self-control, main use (text message), minute per call on weekdays, listening to music, gender (female), monthly call charges, depression, person called (friends), and self-efficacy. These factors explained 39% of variance in cell phone addiction. Conclusion: The above findings indicate that cell phone addiction in high school students was influenced by gender, cell phone use, and psychological factors. Therefore the approach to effective cell phone addiction management for high school students is to consider these variables when developing programs for these students.

Design of B-ISDN Protocol embedded Internet-Phone PBX System (B-ISDN 프로토콜 내장의 인터넷 폰 교환시스템 설계)

  • Choi Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.821-831
    • /
    • 2006
  • In this paper we researched on the development methods and design of the B-ISDN protocol embedded Internet-Phone PBX System for the previous telephone exchange and communication. We designed the structure of the user terminal md exchange server of the Internet-Phone PBX System, defined message and data structure for call control, and designed call control message flows between sender and receiver terminal for user's communication.