• Title/Summary/Keyword: Transfer Protocol

Search Result 757, Processing Time 0.023 seconds

A Research on the Performance Analysis of SPDY Protocol in Mobile Networks (모바일 환경에서 SPDY 프로토콜의 성능분석에 관한 연구)

  • Kim, Hee-Jung;Yi, Gyu-Sun;Lee, Sung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.43-55
    • /
    • 2014
  • SPDY is the new protocol proposed by Google to complement problems of HTTP(Hypertext Transfer Protocol)/1.1 and to improve web speed. In this paper, we evaluated the performance of SPDY protocol in a variety environment. By this evaluation, we examined the characteristics of the SPDY protocol and compared the differences between the existing protocol and SPDY protocol. And we took a closer look at the Flow Control of SPDY. Through this, we analyzed the problem of SPDY. It improved performance at 3G network environment, but failed to improve performance at high speed WLAN and mobility environments. We also verified that Flow Control does not work well. And finally we proposed directions for improvement of this protocol.

Relaying Protocols and Delay Analysis for Buffer-aided Wireless Powered Cooperative Communication Networks

  • Zhan, Jun;Tang, Xiaohu;Chen, Qingchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3542-3566
    • /
    • 2018
  • In this paper, we investigate a buffer-aided wireless powered cooperative communication network (WPCCN), in which the source and relay harvest the energy from a dedicated power beacon via wireless energy transfer, then the source transmits the data to the destination through the relay. Both the source and relay are equipped with an energy buffer to store the harvested energy in the energy transfer stage. In addition, the relay is equipped with a data buffer and can temporarily store the received information. Considering the buffer-aided WPCCN, we propose two buffer-aided relaying protocols, which named as the buffer-aided harvest-then-transmit (HtT) protocol and the buffer-aided joint mode selection and power allocation (JMSPA) protocol, respectively. For the buffer-aided HtT protocol, the time-averaged achievable rate is obtained in closed form. For the buffer-aided JMSPA protocol, the optimal adaptive mode selection scheme and power allocation scheme, which jointly maximize the time-averaged throughput of system, are obtained by employing the Lyapunov optimization theory. Furthermore, we drive the theoretical bounds on the time-averaged achievable rate and time-averaged delay, then present the throughput-delay tradeoff achieved by the joint JMSPA protocol. Simulation results validate the throughput performance gain of the proposed buffer-aided relaying protocols and verify the theoretical analysis.

Area Aware-DSDV Routing Protocol on Ad hoc Networking (Ad Hoc 망에서 AA-DSDV 라우팅 프로토콜)

  • Cho, Se-Hyun;Park, Hea-Sook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.590-593
    • /
    • 2011
  • Time goes on, Ad Hoc network is hot issues. So far, there are a lot of protocols have been proposed for Ad Hoc routing protocol to support the mobility. This paper presents an enhanced DSDV(Destination-Sequenced Distance Vector) routing protocol which nominates one node to take care of a specific area. Simply Area-Aware(AA) DSDV routing protocol has one nominee to take care of some area. It has two jobs. One is to take care of its neighbour and another is to transfer the routing table to its other node as it works. It is called as Area Nominee(AN). The new scheme extends the routing table to include the nominee in the area. The general node is the same as the previous DSDV routing protocol. In the other hands, the node which is nominated has two routing protocols. One is for Regional Routing(RR) table which is the same routing table in DSDV. Another is Global Routing(GR) table which is about the area round its area which it cares nearby. GR table is the table for the designated node like the nominee. Each area has one nominee to transfer between ANs. It has only nominee's information about every area. This concept decreases the topology size and makes the information of topology more accurate.

A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations

  • Kang, Ju-Sung;Hong, Do-Won
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.21-25
    • /
    • 2007
  • We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equations: the linear systems of equations problem and the linear least-square problem. The protocols proposed in this paper achieve acceptable security in the sense of Du-Zhan's paradigm and t-wise collusion-resistance, and their communication complexity is O(tm), where t is a security parameter and m is the total number of participants. The complexity of our protocol is significantly better than the previous result O($m^2/{\mu}$) of [4], in which the oblivious transfer protocol is used as an important building block.

A Study on the Implementation of ISDN LAPD Protocol for the Ultrasonic Image Trasfer (초음파 영상 전달을 위한 ISDN(Integrated Service Digital-Network)의 LAPD(Link Access Procedure on the D-Channel) 프로토콜 구현에 관한 연구)

  • 정용길;한민수
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.315-320
    • /
    • 1993
  • This paper deals with a subject for implementation of L+ayer 1 and Layer 2(LAPD) of ISDN user-network interface on the basis of CCITT recommandation I.411, I.412, I.441 (Q.921), I.450(Q.930) and I.451 (Q.931) for ultrasonic image transfer. For the implementa tion of LAPD protocol of ISDN in this study. PC-CARD based hardware(TA :Terminal Adopt) is proposed and operating system (PC-XINU) supporting the Multiprocessing is transplanted to it. As the Service Access Point(SAP) is accessed by using the port of XINU and Layers which consist of transmitting and receiving part are independantly processed for each other in this proposed system. It can be easy and flexible to implement LAPD protocol for the message transfer.

  • PDF

Adaptation of Secure Algorithm of Short Messaging Services(SMS) on CDMA Network (CDMA에서 단문 메시지 서비스(SMS)의 보안 적용 알고리즘)

  • Kim Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.30-37
    • /
    • 2006
  • At the present, Short Messaging Transfer Protocol Standard described under TIA/EIA/IS-637-A does not cover the measures for security at all. Sequentially, in case of necessity, it seems to be a better idea that security functions are made up for current short messaging transfer protocol. This paper proposes security mechanisms including algorithms and protocols for Short Messaging Services(SMS) which present not only high levels of confidentiality and integrity but also appropriate level of authentication.

  • PDF

VLSI Design of Processor IP for TCP/IP Protocol Stack (TCP/IP프로토콜 스택 프로세서 IP의 VLSI설계)

  • 최병윤;박성일;하창수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.927-930
    • /
    • 2003
  • In this paper, a design of processor IP for TCP/IP protocol stack is described. The processor consists of input and output buffer memory with dual bank structure, 32-bit RISC microprocessor core, DMA unit with on-the-fly checksum capability. To handle the various modes of TCP/IP protocol, hardware and software co-design approach is used rather than the conventional state machine based design. To eliminate delay time due to the data transfer and checksum operation, DAM module which can execute the checksum operation on-the-fly along with data transfer operation is adopted. By programming the on-chip code ROM of RISC processor differently. the designed stack processor can support the packet format conversion operations required in the various TCP/IP protocols.

  • PDF

An Efficient Routing Algorithm for extreme networking environments (극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.

A Secure Mobile Agent Transfer Protocol in Mobile Agents Based E-Commerce System (이동 에이전트 기반 저자사걸 시스템에서의 안전한 이동 에이전트 전송 프로토콜)

  • Han, Seung-Wan;Im, Hyeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1657-1665
    • /
    • 2000
  • Mobile agents based e-commerce system has many advantage than traditional e-commerce-information gathering on goods, price settlement and payment, delivery of the goods purchased, and so on. However, due to the security vulnerability that stems from mobile agent's mobility, mobile agents based e-commerce system has additional security problems. Therefore, in order to do e-commerce securely in th system, first of al the security issues on mobile agents must be addressed. It this paper, we propose a mobile agent transfer protocol that provides confidentiality and integrity of mobile agent in transit and mutual authentication for communicating hosts. We further show the security of the protocol against many possible attacks. Also, we suggest the location management mechanism of mobile agents based on the trust center. This mechanism is capable of finding their locations transparently and detecting mobile agent clones.

  • PDF

A Study of Gas Leakage Monitoring System on a Long Distance Using the Hypertext Transfer Protocol (HTTP를 이용한 원거리 가스누출 감시 시스템에 관한 연구)

  • 이광희;안형일;김응식
    • Fire Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.35-44
    • /
    • 1997
  • In this paper, I present an architecture and techniques to monitor and identify the hazards of plants anywhere in the whole country using the HTTP(Hypertext Transfer Protocol) based on RFC1945 and PLC(Programmable Logic Controller) protocol. I constructed the upward network and downward network for intercommunication between the PLC and computer around the internet. I also constructed WWW(World-Wide Web) server in the personal computer The result of this research constructed monitoring system to monitor and identify the hazards through WWW browser on the internet.

  • PDF