• Title/Summary/Keyword: mobile protocol

Search Result 1,962, Processing Time 0.026 seconds

Mobile IP Multicast Protocol Losing Local Broadcast (로컬 브로드캐스트를 이용한 이동 IP 멀티캐스트 프로토콜)

  • 차용주;김화종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.208-217
    • /
    • 2001
  • In mobile Internet environment, providing multicast requires much more complex mechanism comparing with the unicast Mobile IP routing protocol. This is because multicast datagrams are sent to a group address that do not belong to a specific network. The IETF Mobile IP suggested two approaches for mobile multicasting, namely remote subscription and hi-directional tunneling. In remote subscription, a mobile node may join a group via a local multicast router on the visited subnet. Therefore remote subscription may cause much datagram loss while reconstructing the delivery tee. In bi-directional tunneling, a mobile node may join a group via a hi-directional tunnel to its home agent. Bi-directional tunneling may suffer from inefficient routing. In this paper, we proposed a new mobile multicasting protocol, Mobile If Multicast using Local Broadcast(MIMLB) which can receive multicast datagrams as fast as possible and optimize routing path for multicast delivery. The MIMLB protocol uses hi-directional tunneling to receive multicast datagrams. And the MIMLB protocol can resolve datagram duplicated problem and optimize routing path by using local broadcast. Simulation results show that MIMLB reduces delivery path length and optimizes multicast routing path when a mobile nod? moves into a foreign network.

  • PDF

The Study on the OLSR(Optimized Link State Routing Protocol) Implementation in the Mobile Ad-hoc Network (모바일 에드혹 네트워크의 OLSR(Optimized Link State Routing Protocol) 구현에 관한 연구)

  • Cho, Tae-Kyung;Lee, Jea-Hee
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.4
    • /
    • pp.257-261
    • /
    • 2011
  • In this paper, we research the OLSR(Optimized Link State Routing Protocol) of the mobile ad-hoc network protocols, and design the system implementation based on the Embedded Linux for the Ubiquitous Space construction. We prove the performance of proposed system in the various experiment environments through several scenarios which is about transmitting the image data on the mobile ad-hoc network environment.

On Improving DSR routing protocol

  • Ha, Eun-Yong;Piao, Dong-Huan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1609-1612
    • /
    • 2004
  • Ad hoc network is a kind of new wireless network paradigm for mobile hosts. Ad Hoc wireless networks consist of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. Mobile hosts rely on each other to keep the network connected. Each host is not only mobile hosts but also router. So how to design a routing protocol is the most important problem. Dynamic source routing is a kind of routing protocol. In this paper we suggest a new automatic route shortening method and an energy-aware routing mechanism based on DSR.

  • PDF

Authentication and Key Agreement using Delegating Authority for a Secure Mobile Payment Protocol (안전한 모바일 결제 프로토콜을 위한 위임기관을 사용한 인증과 키 동의)

  • Sung, Soon-Hwa
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • Mobile payment system has many problems in real mobile payment networks because of the characteristics of mobile device and the security of mobile payment process. Specially, the previous suggested mobile payment protocol can not verify a trust of issuing bank. Therefore, this paper has analyzed the efficiency of a mobile payment with a delegating authority for an issuing bank to trust issuing bank. As a result, the mobile payment protocol with a delegating authority for a payment verification of an issuing bank has improved the time complexities for key computation and communication resilience.

The Design of an Election Protocol based on Mobile Ad-hoc Network Environment

  • Park, Sung-Hoon;Kim, Yeong-Mok;Yoo, Su-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper, we propose an election protocol based on mobile ad-hoc network. In distributed systems, a group of computer should continue to do cooperation in order to finish some jobs. In such a system, an election protocol is especially practical and important elements to provide processes in a group with a consistent common knowledge about the membership of the group. Whenever a membership change occurs, processes should agree on which of them should do to accomplish an unfinished job or begins a new job. The problem of electing a leader is very same with the agreeing common predicate in a distributed system such as the consensus problem. Based on the termination detection protocol that is traditional one in asynchronous distributed systems, we present the new election protocol in distributed systems that are based on MANET, i.e. mobile ad hoc network.

A State Management MAC Protocol for Vehicle to Vehicle Communication Using Directional Antenna (차량 간 통신 환경에 적합한 방향성 안테나를 이용한 상태관리 MAC Protocol)

  • Park, Sang-Wook;Jung, Sung-Dae;Jung, Jong-In;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.526-535
    • /
    • 2008
  • Recently, several MAC protocols using the directional antennas have been proposed for wireless mobile ad hoc networks. In the theory, it can improve spatial reuse and communication throughput in the Mobile Ad-hoc networks. But, or However even though direction transmissions using the Directional MAC protocol(D-MAC) are expected to provide significant improvements, they causes other problems such as deafness problem and fairness problem. In this paper, we analyze the D-MAC protocol in Mobile Ad-hoc network for Vehicle to vehicle(V2V) communication. Through the results of the analysis, We the fundamental problem of D-MAC protocol and finally we suggest new D-MAC protocol for V2V networks.

Medium Access Control Protocol for Interconnection Network of Mobile System (이동통신 시스템의 상호연결망을 위한 접근제어 프로토콜)

    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.2
    • /
    • pp.95-108
    • /
    • 1999
  • The CDMA mobile system consists of several subsystems and each subsystem has many processing elements that handle voice messages and control messages for performing CDMA call processing functions through CDMA Interconnection Network(CIN). For assuring a high throughput and a short delay in the CIN, an efficient medium access control protocol should be provided. In this paper, we propose a new access control protocol of CIN for providing real time communications in CDMA mobile system. Also, we evaluate the delay performance of the proposed access control protocol and compare it with that of the existing access control protocol. Through a set of numerical examples, we show that our proposed protocol provides a better delay performance than the existing protocol.

  • PDF

Tone Dual-Channel MAC Protocol with Directional Antennas for Mobile Ad Hoc Networks

  • Jwa, Jeong-Woo
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.98-101
    • /
    • 2012
  • The directional medium access control (MAC) protocol improves the throughput of mobile ad hoc networks but has a deafness problem and requires location information for neighboring nodes. In the dual-channel directional MAC protocol [12], the use of omnidirectional packets does not require the exact location of destination node. In this letter, we propose a tone dual-channel MAC protocol with directional antennas to improve the throughput of mobile ad hoc networks. In the proposed MAC protocol, we use a directional CTS and an out-of-band directional DATA tone with a new blocking algorithm to improve the spatial reuse. We confirm the throughput performance of the proposed MAC protocol by computer simulations using the Qualnet simulator.

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.