• Title/Summary/Keyword: multicast handoff

Search Result 44, Processing Time 0.019 seconds

The Design and Evaluation of Mobile Multicasting Protocol in 3-Tiered Mobile Computing Environment (3-계층 이동 컴퓨팅 환경에서 이동 멀티캐스팅 프로토콜의 설계 및 평가)

  • 김재수;박규석
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.120-129
    • /
    • 1998
  • The mobile computing is a new network environment that support s wireless network connection seamless while the portable computer is moving. This environment involves the problem of re-establishing of new network connection. The mobile computing should provide multicasting service, because multicasting is widely-used application service which delivers messages to the members of the groups. In this paper, we proposed 3-tiered mobile multicasting protocol that transfers multicast packets efficiently and reliablely. Also, we analyzed the performance of 3-tiered mobile multicasting protocol comparing with other mechanism. Our protocol is superior to other mechanism in the aspects of the handoff costs and packet delivery costs.

  • PDF

The Design of Seamless Handoff Algorithm based on Multicast Group Mechanism for Micro Mobility (Micro Mobility 지원을 위한 멀티캐스트 그룹 메커니즘 Seamless 핸드오프 알고리즘 설계)

  • Shin, Dong-Jin;Choi, Sang-Ho;Lim, Sun-Bae;Oh, Jae-Yoon;Song, Byung-Kwon;Jeong, Tae-Eui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.523-526
    • /
    • 2001
  • 3GPP2 방식에서는 Macro Mobility 지원을 위하여 MIP를 이용하며 PDSN은 FA의 기능을 수행한다. 이때 하나의 PDSN에서 다른 PDSN으로 MS가 이동할 경우 지원되는 이동성을 Macro Mobility라 하며, POSN 관리 영역 내의 하나의 RN에서 다른 RN으로 이동시에 지원되는 이동성을 Micro Mobility라 한다. 본 논문은 Micro Mobility를 지원하기 위한 멀티캐스트 그룹 메커니즘 기반의 Seamless 핸드오프 알고리즘을 제안하고 있다. 제안된 알고리즘은 MS의 이동방향과 속도를 계산하여, 예상 이동경로에 인접한 RN들을 멀티캐스트 그룹으로 구성하고, 그룹 조인 시점을 최대한 늦춤으로서 망의 효율성을 높인다. 또한, 기존의 멀티캐스트 연결 방법이 가지고 있는 버퍼 오버헤드에 대한 문제점을 해결하기 위해, PDSN은 예상 핸드오프 시간 이후의 데이터만을 전송하며, RN 또한 예상 핸드오프 시간 이후의 데이터만을 버퍼링 한다. 제안된 알고리즘의 Dead Lock Free, Liveness 및 Reliability를 검증하기 위해 State Transition Diagram을 작성하고, 페트리 네트를 이용하였다.

  • PDF

A Study on Information Exchange Scheme for Reliability in the Wireless Multicasting (무선 멀티캐스팅에서 신뢰성을 위한 정보 교환 기법에 관한 연구)

  • Im, Ji-Yeong;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.247-256
    • /
    • 2002
  • In a wireless multicasting when a mobile host moves to the new bate station being in the same multicast group it needs to exchange information about data delivery between base stations to receive data from the new base station at once. However it is inefficient to use the existence schemes because it takes too much time to exchange information and many overheads. The next, a mobile host moving to the base station not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same data to the same neighboring base stations. In this paper we proposed called Information Exchange Scheme (IES). In IES in the same multicast grope the base stations exchange information locally so it takes the minimum time and overheads to use IES. Also in IES the neighboring base stations delay to delete data for continuous moving of other MHs. We also present how our scheme is efficient by producing cost ad simulating.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.