• Title/Summary/Keyword: Sending Message

Search Result 162, Processing Time 0.028 seconds

Handover Control Scheme Initiated by the Mobile Terminal in Wireless ATM LAN System (무선 ATM LAN 시스템에서 이동 단말에 의한 핸드오버 제어 기법)

  • Park, Nam-Hun;Kim, Yeong-Seon;Choe, Jun-Gyun;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1236-1245
    • /
    • 2000
  • This paper propose a novel scheme, called Mobiel Terminal Initiated Scheme(MTIS), in which mobile terminal initiates the backward handover by sending handover request message with the list of target radio ports. In this scheme, the old ATM switch suporting end-user mobility, denoted by EMAS\ulcorner, checks whether each EMAS\ulcorner, managing the target radio port, has its available resources. If it has, the EMAS\ulcorner performs the path rerouting between CrossOver Switch (COS) and itself after deciding the most suitable target radio port. Therefore, the MT initiates the handover after deciding the most suitable target radio port through the beacon signal of Wireless Access Point (WAP). The EMAS\ulcorner have only to check the resource availability of the target radio port. It is no need to waste time to decide the suitable target radio port. Also, once receiving the request of the resource availability, the EMAS\ulcorner can reduce the rerouting delay time due to perform the path rerouting to the COS. In comparison with that of the ATM-Forum procedure, our proposed MTIS handover delay time reduced 14~21%, and end-to-end transfer delay time reduced 2~9%, as a result of the simulation.

  • PDF

Performance Improvement of DCF through Transmission Control (전송제어를 통한 DCF의 성능 향상)

  • Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1811-1813
    • /
    • 2016
  • DCF (Distributed Coordination Function) resolves the channel contention problem in a distributed manner by forcing nodes to randomly choose a waiting time in a contention window. However, since the size of a contention is limited, the collision probability increases with the number of sending nodes. To resolve the problem, in this paper, we propose a transmission control method based on the minority game (MG). Each node can determine autonomously whether to send or not without message exchanges with other nodes to maximize its profit. Through simulation studies, we verify that the proposed method can improves the performance of DCF in terms of collision probability in a congestion situation.

Agent based real-time fault diagnosis simulation (에이젼트기반 실시간 고장진단 시뮬레이션기법)

  • 배용환;이석희;배태용;이형국
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1994.10a
    • /
    • pp.670-675
    • /
    • 1994
  • Yhis paper describes a fault diagnosis simulation of the Real-Time Multiple Fault Dignosis System (RTMFDS) for forcasting faults in a system and deciding current machine state from signal information. Comparing with other diagnosis system for single fault,the system developed deals with multiple fault diagnosis,comprising two main parts. One is a remotesignal generating and transimission terminal and the other is a host system for fault diagnosis. Signal generator generate the random fault signal and the image information, and send this information to host. Host consists of various modules and agents such as Signal Processing Module(SPM) for sinal preprocessing, Performence Monotoring Module(PMM) for subsystem performance monitoring, Trigger Module(TM) for multi-triggering subsystem fault diagnosis, Subsystem Fault Diagnosis Agent(SFDA) for receiving trigger signal, formulating subsystem fault D\ulcornerB and initiating diagnosis, Fault Diagnosis Module(FDM) for simulating component fault with Hierarchical Artificial Neural Network (HANN), numerical models and Hofield network,Result Agent(RA) for receiving simulation result and sending to Treatment solver and Graphic Agent(GA). Each agent represents a separate process in UNIX operating system, information exchange and cooperation between agents was doen by IPC(Inter Process Communication : message queue, semaphore, signal, pipe). Numerical models are used to deseribe structure, function and behavior of total system, subsystems and their components. Hierarchical data structure for diagnosing the fault system is implemented by HANN. Signal generation and transmittion was performed on PC. As a host, SUN workstation with X-Windows(Motif)is used for graphic representation.

  • PDF

Remote Message Sending Framework to other Android Devices based on Android (안드로이드 기반의 장치 간 원격메시지 전송을 위한 프레임워크)

  • Baek, Kwang-Il;Park, Sang-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.76-78
    • /
    • 2011
  • 안드로이드 모바일 애플리케이션을 개발할 때 안드로이드 지원 서비스인 인텐트는 로컬 장치 내에서 애플리케이션간 메시지를 전송하고 받을 수 있다. 그러나 서로 다른 장치간의 인텐트를 이용한 메시지 전송은 지원되지 않고 있다. 만약 서로 다른 장치간에 인텐트가 지원이 된다면 끊김 없는 서비스가 가능해진다. 끊김없는 서비스란 사용자가 스마트폰으로 워드나 인터넷검색 등을 하고 있다가 자신이 가진 다른 장치인 TabletPC로 스마트폰에 있던 정보 그대로 이어서 사용하고 싶을 때 끊김 없이 이어서 할 수가 있는 것이다. 본 논문에서는 다른 장치간의 원격 메시지 전송을 위하여 RISP 애플리케이션을 제안한다. RISP 애플리케이션은 구글의 C2DM 서비스를 이용하여 다른 장치간의 원격 메시지 전송을 서비스하는 애플리케이션이다. 개발자가 애플리케이션을 개발할때 RemoteIntent 코드를 작성하면 RISP 애플리케이션은 이 RemoteIntent를 구글의 C2DM을 통해 다른 장치로 메시지를 전송하여 그 장치내의 RISP 애플리케이션이 RemoteIntent를 분석하여 해당 애플리케이션에 인텐트를 넘겨준다. 이렇게 해서 인텐트는 서로 다른 장치간에 인텐트를 넘길 수 있는 것이다. 본 논문에서는 안드로이드 모바일 플랫폼을 대상으로 하여 RISP애플리케이션을 제안한다. 제안하는 RISP는 장치에 애플리케이션으로 설치되며 장치의 안드로이드 버전2.2 이상에서만 구동된다.

A Migration Technique for Autonomous Mobile Agents in Dynamic Environments (동적 환경에 적합한 자율 이동 에이전트의 이주 기법)

  • Bok, Kyoung-Soo;Yeo, Myung-Ho;Yoo, Jae-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1084-1098
    • /
    • 2005
  • In this paper, we propose a migration technique for autonomous mobile agents suitable to dynamic environments. The proposed migration technique dynamically creates the itinerary of agents that considers states of networks and systems. In the migration of the agent, it first sends prefetching message to the next system. The system receives necessary data for migration in advance. Through this, we reduce the amount of the sending data and save the time for creating the instance of the agent. And it improves the execution efficiency by using the checkpoint-based recovery method that does not execute the agent again and recovers the process states even though the errors take place. To show superiority of the proposed technique, we compare the proposed method with the existing methods through various simulations.

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

Wireless Networked System for Transmission Path Self-Calibration of Laser Equipment (레이저 장비의 전송 경로 자가 교정을 위한 무선 네트워크 시스템)

  • Lee, Junyoung;Yoo, Seong-eun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.2
    • /
    • pp.79-85
    • /
    • 2020
  • IIoT stands for Industrial Internet of Things used in manufacturing, healthcare, and transportation in networked smart factories. Recently, IIoT's environment requires an automated control system through intelligent cognition to improve efficiency. In particular, IIoT can be applied to automatic calibration of production equipment for improved management in industrial environments. Such automation systems require a wireless network for transmitting industrial data. Self-calibration systems in laser transmission paths using wireless networks can save resources and improve production quality by real-time monitoring and remote control of laser transmission path. In this paper, we propose a wireless networked system for self-calibration of laser equipment that requires a laser transmission path, and we show the results of the prototype evaluation. The self-calibration system of laser equipment measures the coordinates of the laser points with sensors and sends them to the host using the proposed application protocol. We propose a wireless network service for the wired motor controller to align the laser coordinates. Using this wireless network, the host controls the motor by sending a control command of the motor controller in an HTTP message based on the received coordinate values. Finally, we build a prototype system of the proposed design to verify the detection performance and analyze the network performance.

Reagent management system with sensors and RFID (센서와 RFID를 활용한 시약 관리시스템)

  • Kang, Hee-Beom;Jung, Han-Gil;Cung, Chee-Oh;Park, Sang-No;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.651-653
    • /
    • 2015
  • Common Embedded boards like the Arduino, Raspberry Pi, BeagleBone Black, leverages smart home systems, machine tools and various products in our day to day life. Managing and dealing frequent large scale incidents involving recent reagents and hazardous materials can be dangerous and difficult to detect in advance like in an event of an accidents or fires. In this paper I have done research by utilizing an Embedded (BeagleBone Black) boards sensors and RFID management system to detect a hazardous situation like fire in real time and avoiding it by sending out an alert message to the admin user to minimizing the risk. This system provides immediate information to the administrator of any hazardous situation and prevents any accidents from occurring.

  • PDF

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

An Ultra-Lightweight RFID Authentication Protocol Using Index (인덱스를 사용한 초경량 RFID 인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Yun, Tae-Jin;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.24-33
    • /
    • 2012
  • Recently, the ultra-lightweight authentication RFID protocol that can actually implement on the RFID Tag is one among authentication protocols getting a concern, but recently many problems were clarified of the feature becase of the protocol which doesn't use the security algorithm. In this paper, we analyzed the problem of the ultra-lightweight authentication protocols and propose the design of ultra-lightweight RFID authentic ation protocols improving the index processing techniques. Because of improving the index processing technique in the method sending the Server authentication message to the authenticated tag, the proposed protocol is strong against the active attack which Li presents. Besides, the proposed protocol has the buffer storage of the keys and index and is strong against the asynchronous attack.