• Title/Summary/Keyword: SEND

Search Result 1,445, Processing Time 0.026 seconds

Adaptive Power Control based Efficient Localization Technique in Mobile Wireless Sensor Networks (모바일 무선 센서 네트워크에서 적응적 파워 조절 기반 효율적인 위치인식 기법)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.737-746
    • /
    • 2009
  • Given the increased interest in ubiquitous computing, wireless sensor network has been researched widely. The localization service which provides the location information of mobile user, is one of important service provided by sensor network. Many methods to obtain the location information of mobile user have been proposed. However, these methods were developed for only one mobile user so that it is hard to extend for multiple mobile users. If multiple mobile users start the localization process concurrently, there could be interference of beacon or ultrasound that each mobile user transmits. In the paper, we propose APL(Adaptive Power Control based Resource Allocation Technique for Efficient Localization Technique), the localization technique for multiple mobile nodes based on adaptive power control in mobile wireless sensor networks. In APL, collision of localization between sensor nodes is prevented by forcing the mobile node to get the permission of localization from anchor nodes. For this, we use RTS(Ready To Send) packet type for localization initiation by mobile node and CTS(Clear To Send) packet type for localization grant by anchor node. NTS(Not To Send) packet type is used to reject localization by anchor node for interference avoidance and STS(Start To Send) for synchronization between 모anchor nodes. At last, the power level of sensor node is controled adaptively to minimize the affected area. The experimental result shows that the number of interference between nodes are increased in proportion to the number of mobile nodes and APL provides efficient localization.

A Clustering based Wireless Internet Proxy Server (클러스터링 기반의 무선 인터넷 프록시 서버)

  • 곽후근;우재용;정윤재;김동승;정규식
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • As different from wired internet, wireless internet has limitations due to the following characteristics; low bandwidth, frequent disconnection, low computing power, small screen in user terminal, and user mobility. Also, wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. Wireless proxy servers are used for the wireless internet because their caching and transcoding functions are helpful to overcome the above limitation. TranSend was proposed as a clustering based wireless proxy server but its scalability is difficult to achieve because there is no systematic way to do it. In this Paper. we proposed a clustering based wireless internet proxy server which can be scalable in a systematic way. We performed experiments using 16 PCs and experimental results show 32.17% performance improvement of the proposed system compared to TranSend system.

Implementation of a Secure Address Auto-Generation Scheme using a Hash Function in the IPv6 Environments (IPv6 환경에서 해쉬 함수를 이용한 안전한 주소 자동 생성 기법 구현)

  • Ju, Seungyoun;Gyeong, Gyehyeon;Ko, Kwang Sun;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1266-1269
    • /
    • 2007
  • IPv6 환경에서는 NDP(Neighbor Discovery Protocol)를 이용한 주소 자동 설정 메커니즘을 지원한다. 그러나, NDP 는 메시지 내 중요 정보가 네트워크 상에 그대로 노출됨으로 인해 각종 공격에 취약하다. 이러한 취약성을 극복하기 위해, CGA(Cryptographically Generated Address)를 사용하여 주소의 소유권 증명이 가능한 SEND(SEcure Neighbor Discovery)가 도입되었다. 그러나 SEND 는 높은 비용 연산으로 인해 모바일 기기 등에 적용하는데 한계점을 가진다. SEND 의 한계점을 보완하고자 해쉬 함수를 이용해 주소 자동 설정에 사용되는 임시 주소를 감추는 기법이 제안되었다. 이 기법은 DAD(Duplicate Address Detection) 과정 중 SEND 수준의 보안을 제공하면서도 빠르게 동작할 수 있는 장점을 갖는다. 본 논문에서는 리눅스 환경에서 제안 기법을 구현해 보고, 주소 생성 시간 측정 및 DAD 과정에서 드러난 서비스 거부 공격에 대한 안전성을 검증한다.

The Modified IPv6 NDP Mechanism for Preventing IP Spoofing (IP 스푸핑 방지를 위한 수정된 IPv6 NDP 메커니즘)

  • Kim Ji-Hong;Nah Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2006
  • IPv6 is a new version of the Internet protocol, designed as the successor to IPv4. Among the changes from IPv4 to IPv6, we focused on the stateless address auto-configuration mechanism. The address auto-configuration mechanism is used by nodes in an IPv6 network to learn the local topology. The current specifications suggest that IPsec AH may be used to secure the mechanism, but there is no security association during address auto-configuration process because it has no initial IP address. As there are so many suity threats, SEND protocol was designed to counter these threats. In this paper we analyzed the security problems in NDP and SEND protocol. So we proposed the Modified NDP mechanism using PKC and AC in order to solve these problems.

Implementation of an Image Board Remote Control System using PDA based on Embedded Linux in Wireless Internet (무선 인터넷 망에서 임베디드 리눅스 기반 PDA를 이용한 영상보드 원격 제어 시스템 구현)

  • Kim, Sung-Yong;Lee, Sang-Min
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.155-171
    • /
    • 2008
  • This thesis proposed a method that connecting step motor to image send board which can acquire image to move and remote controlling via streaming image board of PDA(personal digital assistant) based on embedded Linux which is using wireless network There are three embedded Linux system to embody movable image send board. First, though the wireless network a signal of PDA is transmitted to the board which has embedded Linux and a system which is controlled by the expansion I/O port of the board. Second, it's a system streaming realtime image at a PDA which has embedded Linux. The last is a system which controls a process of image board using TCP/IP communication and image send board at PC. These are the system which can use industrial settings and homes. It can also make use of an embodiment method about travelling image robot.

The study of preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient

  • Kim, Hyun-Ji;Kang, Jung-Ae;Lee, Sang-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.57-63
    • /
    • 2016
  • The purpose of the study is to investigate the preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient. Results show that women mostly prefer to use dynamic and imaged emoticon than men. However, the preference of using text messages increases when both men and women express uncomfortable emotion. Especially, when users send family messages, they tend to prefer for text message. And when users send close friends messages, the preference for dynamic and imaged emoticon is high. When users send distant friends messages, the similar tendency is shown regardless of emotion. These results can provide the information to use emoticon in the filed of education and take advantage in digital education and mobile education.

Multi-level Content Transmission Mechanism for Intelligent Quality of Service in Social Networking Services (소셜 네트워크 서비스에서 지능형 QoS 지원을 위한 다중 레벨 이미지 콘텐츠 전송 메카니즘)

  • Lim, Mingyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.8
    • /
    • pp.1407-1417
    • /
    • 2016
  • In this paper, we propose a multi-level content transmission mechanism for intelligent quality of service (QoS) in social networking services (SNSs). Because existing SNSs and related work send image content to a client with a single fixed mechanism, they cannot consistently support content accessibility according to different conditions of QoS factors such as network congestion and throughput. In the proposed image transmission mechanism, our communication middleware (CM) provides an SNS developer with three transmission modes so that an SNS server or client can dynamically change the quality of images if required. In each transmission mode, an SNS server can send images to a requesting client with original high quality, thumbnail quality, or send only text information. With varying qualities of downloaded images, an SNS developed on top of CM can provide users with consistent QoS for access to SNS content.

Effect of Brand Personality on the Intention to Send a Job Application

  • Farid, Khemissi;Taha, Chebbi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.147-154
    • /
    • 2022
  • Actually, brand personality is more and more important in marketing field. Considering the employee as consumer this paper will study the effect of employee brand personality on the intention to send a job application. In this research we tried to make the difference by following the qualitative methodology. we did ten interviews with IT engineering student in terminal classes and after thematique analysis tow thems emerged in relation with the brand personality factors which are sincerity and excitement. people are attracted by firms inspiring confidence and sincerity an exciting environment this is an important finding for firms who want to attract talented people. however, it important for enterprises in the IT filed to focus all their communication actions on the sincerity and excitement

A bidirectional full duplex medium access control protocol for underwater acoustic networks (수중 음향 네트워크를 위한 양방향 전이중 매체 접속 제어 프로토콜)

  • Kang, Sung Min;Hwang, Ho Young;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.211-217
    • /
    • 2017
  • In this paper, we propose a bidirectional full duplex MAC (Medium Access Control) protocol for underwater acoustic networks. An underwater sensor node can set a back-off timer according to the priority of transmission. When the back-off timer expires, the underwater sensor node acquires a transmission opportunity. If a source node wants to send data to a destination node, it broadcasts RTS (Request-To-Send) including ID of the destination node to neighbor nodes. The destination node receiving RTS sends CTS (Clear-To-Send) to the source node to inform the bidirectional full duplex communication. After the source node receives CTS, the source node and the destination node can send the data to each other. In the underwater environment, the existing MAC protocol may take a lot of time for successful transmission of data due to long underwater propagation delay. On the other hand, the proposed bidirectional full duplex MAC protocol improves the throughput by shortening the time for successful transmission of data. In this paper, we analyze the throughput of the proposed bidirectional full duplex MAC protocol. In addition, we show that the proposed bidirectional full duplex MAC protocol has better performance in the presence of the long underwater propagation delay compared with existing MAC protocols for underwater environments.

OFDMA-Based Reliable Multicast MAC Protocol for Wireless Ad-Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo
    • ETRI Journal
    • /
    • v.31 no.1
    • /
    • pp.83-85
    • /
    • 2009
  • Compared with unicast, multicast over wireless ad-hoc networks do not support reliability due to their inability to exchange request-to-send/clear-to-send (RTS/CTS) and ACK packets with multiple recipients. Although several media access control (MAC) layer protocols have been proposed to provide reliable multicast, these introduce additional overhead, which degrades system performance. A novel MAC protocol for reliable wireless multicast is proposed in this paper. By adapting orthogonal frequency division multiple access characteristics in CTS and ACK packets, the protocol achieves reliability over wireless multicast with minimized overhead.

  • PDF