• Title/Summary/Keyword: message transmission system

Search Result 276, Processing Time 0.033 seconds

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

TPC Algorithm for Fault Diagnosis of CAN-Based Multiple Sensor Network System (CAN 기반 다중센서 네트워크 시스템의 고장진단을 위한 TPC알고리즘)

  • Ha, Hwimyeong;Hwang, Yuseop;Jung, Kyungsuk;Kim, Hyunjun;Lee, Bongjin;Lee, Jangmyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.2
    • /
    • pp.147-152
    • /
    • 2016
  • This paper proposes a new TPC (Transmission Priority Change) algorithm which is used to diagnose failures of a CAN (Controller Area Network) based network system for the oil tank monitoring. The TPC algorithm is aimed to increase the total amount of data transmission and to minimize the latency for an urgent message by changing transmission priority. The urgency of the data transmission has been determined by the conditions of sensors. There are multiple sensors inside of the oil tank, such as temperature, valve, pressure and level sensors. When the sensors operate normally, the sensory data can be collected through the CAN network by the monitoring system. However when there is a dangerous situation or failure situation happened at a sensor, the data need to be handled quickly by the monitoring system, which is implemented by using the TPC algorithm. The effectiveness of the TPC algorithm has been verified by the real experiments. In addition, this paper introduces a method that people can figure out the condition of oil tanks and also can perform the fault diagnosis in real-time by using transmitted packet data. By applying this TPC algorithm to various industries, the convenience and reliability of multiple sensors network system can be improved.

A Priority-based Scheduling Approach for TPEG Applications (TPEG 어플리케이션을 위한 우선순위 기반의 스케줄링 방식)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.204-209
    • /
    • 2008
  • It is the most important in the traffic information system how fast to transmit the traffic conditions on each road, or event such as RTM (Road Traffic Message). In order to operate the event information more efficiently in the TPEG system, it is likely that the effective transmission system shall be needed, and this paper will propose the improved transmission system; Breaking away from the conventional method which is to transmit the traffic information by using simple FIFO method while encoding it into TPEG data, the improved transmission system is to transmit the important information more quickly or to advance the transmission cycle by scheduling according to degree of its importance after deciding which one is the important traffic information by comparing the importance ratings in between diverse information. The traffic information with low importance rating is to be transmitted slowly, and its transmission cycle shall become slow as well. In the computer simulations, it is shown that the proposed approach enables to transmit more quickly a sudden change of traffic conditions and the important traffic data.

An Improved Priority Application for Humanoid Robot in the Controller Area Network(CAN) (CAN내장 휴머노이드 로봇에 대한 진보된 우선순위 적용)

  • Ku Ja-bong;Huh Uk-youl;Kim Jin-geol;Kim Byung-yoon
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.10
    • /
    • pp.714-719
    • /
    • 2004
  • The Controller Area Network (CAN) is being widely used in real-time control applications such as automobiles, aircraft, and automated factories. Unfortunately, CAN, in its current form, is not able to either share out the system bandwidth among the different devices fairly or to grant an upper bound on the transmission times experienced by the nodes connected to the communication medium as it happens, for instance, in the token-based networks. In this paper. we present the message scheduling for CAN, based on the distributed control scheme to integrate actuators and sensors in a humanoid robot. Besides introducing the new algorism, this paper also presents some performance figures obtained using a specially developed software simulator, while the behavior of the new algorism is compared with the traditional CAN systems, in order to see how effective they are.

Study on Wireless Body Area Network System Design Based on Transmission Rate (전송률을 고려한 WBAN 시스템 설계에 관한 연구)

  • Park, Joo-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we proposed WBAN system model to management an application that requires low rate data transfer in IEEE 802.15.4. We have to use different wireless sensor network technology to transfer different date rate and emergency message in medical application service. A suitable system model for WBAN and a WBAN MAC protocol in order to solve these existing system problems are proposed. Firstly, the priority queuing was applied to contention access period, and the system model which could guarantee transmission of a MAC command frame was proposed. Secondly, the MAC frame was newly defined to use the system model which was proposed above. Thirdly, WBAN CSMA/CA back-off algorithm based on data transmission rate was proposed to enhance data throughput and transmission probability of the data frame which does not have priority in the proposed WBAN system. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of WBAN CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.

An Efficient Causal Order Algorithm for Real-Time Environment (실시간 환경을 위한 효율적인 인과순서 알고리즘)

  • Jang Ik-hyeon
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.23-30
    • /
    • 2005
  • Causal order of message delivery algorithm ensures that every transmitted message is delivered in causal order. It should be noted that control information should be transmitted with each message in order to enforce causal order. Hence, it is important to reduce this communication overhead because the impact of the overhead increases proportionally with the number of related processes. In this paper we propose and evaluate effective a ${\Delta}-causal$ order algorithm for multimedia data which have real-time property. To reduce transmission overhead, proposed algorithm eliminates redundant information as early as possible which is not explicitly required for preserving causal order. Average communication overhead of our algorithm is much smaller than other existing algorithms.

CDMA Digital Mobile Communications and Message Security

  • Rhee, Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.3-38
    • /
    • 1996
  • The mobile station shall convolutionally encode the data transmitted on the reverse traffic channel and the access channel prior to interleaving. Code symbols output from the convolutional encoder are repeated before being interleaved except the 9600 bps data rate. All the symbols are then interleaved, 64-ary orthogonal modulation, direct-sequence spreading, quadrature spreading, baseband filtering and QPSK transmission. The sync, paging, and forward traffic channel except the pilot channel in the forward CDMA channel are convolutionally encoded, block interleaved, spread with Walsh function at a fixed chip rate of 1.2288 Mcps to provide orthogonal channelization among all code channels. Following the spreading operation, the I and Q impulses are applied to respective baseband filters. After that, these impulses shall be transmitted by QPSK. Authentication in the CDMA system is the process for confirming the identity of the mobile station by exchanging information between a mobile station and the base station. The authentication scheme is to generate a 18-bit hash code from the 152-bit message length appended with 24-bit or 40-bit padding. Several techniques are proposed for the authentication data computation in this paper. To protect sensitive subscriber information, it shall be required enciphering ceratin fields of selected traffic channel signaling messages. The message encryption can be accomplished in two ways, i.e., external encryption and internal encryption.

Interoperable XML Messaging System for Tactical Data Link (전술데이터링크 상호운용을 위한 XML 기반 메시징 시스템)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2011
  • Tactical Data Links are standardized radio communication data links for military armed forces and used to transmit and receive data. Because they are the core elements of achieving information superiority in a NCW environment, various kinds of TDL are used by the Korean armed forces. Operating various types of TDL is very helpful in getting more information; however, at the same time, it is hard to integrate and make them co-operate with other TDLs or C4ISR systems. In this paper, we propose a XML based messaging system to make various types of TDL interoperable in a NCW environment. For the messaging system between TDL and C4ISR systems, we define XML message processing interfaces and suggest binary XML for serialization to save transmission loads over constrained military communication bandwidth. Our experiment results show that the TDL message can be transformed into generalized XML data that is interoperable with other TDLs and binary XML serialization, and it saves parsing and transmission time.