• Title/Summary/Keyword: networking services

Search Result 686, Processing Time 0.027 seconds

New Design Approach for Improving the Performance of Collaborative Applications using Active Networks (액티브 네트워크 구조상에서 공동작업 응용을 위한 성능 향상 기법)

  • 이종화;고석주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2283-2291
    • /
    • 1999
  • Most of collaborative applications use the Server-Client paradigm where all requests of clients will be delivered first to server and that server distributes again the requests to the rest of clients. This server-oriented operation and data transmission mechanism always presents end-to-end communications between the server and clients that can notably decrease the overall performance of applications. In this paper, we propose a new design approach to inhibit the inefficiency of applications using active networking concepts. We propose the ASM service that offers an application-specific in-network multicast functions, the AMTC service and its tree algorithm that builds anon-core based shared tree for multicast. These proposed services locate in active nodes performing its services as part of the overall system to improve the performance of collaborative applications.

  • PDF

Object Oriented Cooperation Model based on AHAM CHA (AHAM CHA 기반 객체지향 협업 모델)

  • 김용호;이종환;유동희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.499-508
    • /
    • 2004
  • The Smart Home or intelligent home network control system has the need for home devices to cooperate for the purpose of providing the automated services to residents. The cooperation of home devices can be defined as the service for residents that it controls simultaneously two or more home devices with the same purpose about user's control request of specific home device. A object of home device cooperation are the function object of home device, it is well defined in each device model in AHAM(Association of Home Appliance Manufactures) nth(Connected Home Appliances). AMAM CHA is to promote new appliance services and features enabled through networking by describing generic appliance models, objects, and high-level messages, but does not consider the description and process of cooperation between objects of each device model. This paper defines the cooperation relationship that could be discovered in among home devices, and proposes the cooperation model that AHAM objects could process the cooperation relationship.

QoS-guaranteed Multimedia Streaming for Mulltiple Interfaces (다중 인터페이스 환경에서 서비스 품질을 지원하는 멀티미디어 스트리밍 기법 연구)

  • Cho, Ki-Deok;Park, Yong-Woon;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.191-197
    • /
    • 2009
  • One of popular applications in the Internet is the multimedia streaming services such as IPTV or You Tube in which supporting quality of service (QoS) is an important issue. One of widely adopted rate control scheme is TCP-friendly rate control (TFRC) which shows comparable performance with TCP in term of throughput and lower variation of throughput over time. On the other hand, devices with multiple interfaces are emerging in the market. However, it has not proposed to exploit multiple interfaces simultaneously for multimedia streaming services with TFRC. In this paper, we propose a multimedia streaming algorithm with TFRC which exploits multiple interfaces to guarantee the quality of service. We show that the proposed scheme shows better performance than those with a single interface in terms of throughput and communication costs.

Efficient Network Selection and Vertical Handover Algorithms for Common Radio Resource Management of Heterogeneous Wireless Networks (이기종 무선망의 통합 자원관리를 위한 효율적인 네트워크 선택과 버티컬 핸드오버 알고리즘)

  • Lee, Kyung-Won;Shin, Choong-Yong;Cho, Jin-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.163-172
    • /
    • 2009
  • Various terminals equipped with multiple interfaces may receive services from wireless networks when they pass through the overlaid heterogeneous networks, and thus the vertical handovers across the wireless networks increases, which will become a big problem in the network resource management. This problem can be efficiently solved by common radio resource management (CRRM). In this paper, we propose two operation algorithms based on network selection jointly with vertical handover as the key CRRM strategies. When a new user tries to get services, the CRRM can choose the best target network according to the proposed Integrated Network Selection Algorithm. When the network cannot satisfy the request from the new users, the proposed Integrated Vertical Handover Algorithm moves existing users to neighborhood networks to accommodate new users. The performance of the proposed algorithms has been validated through extensive simulations.

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

MAC Protocol based on Resource Status-Sensing Scheme for Integrated Voice/Data Services (음성/데이타 통합 서비스를 위한 자원 상태 감지 기법 기반 MAC프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.141-155
    • /
    • 2002
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.

Bandwidth Efficient Key Management for Secure Multicast in Clustered Wireless Networks (클러스터화된 무선 네트워크에서 전송량을 고려한 효율적인 멀티캐스트 키 관리 기법)

  • Shin, Seung-Jae;Hur, Jun-Beom;Lee, Han-Jin;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.437-455
    • /
    • 2009
  • In the near future, various multicast based services will be provided over clustered wireless networks. To provide multicast services in secure manner, multicast messages are encrypted by using group key which is shared by group members. Therefore, various group key management schemes have been introduced until now. Among them, tree based approach is one of the most representative paradigms in group key management. Traditional tree based approaches effectively reduce rekeying message transmissions of the key distribution center. However, they do not consider the network bandwidth used for transmitting the rekeying messages. In this paper, we firstly present formulas that describe bandwidth consumption of tree based group key management scheme. Based on our formulations, we propose a bandwidth efficient key tree management scheme for clustered wireless networks where membership changes occur frequently. Simulation results show that our scheme effectively reduces the bandwidth consumption used for rekeying compared to existing key tree schemes.

The Research of Interworking System for Closed Plant Factories (식물공장을 위한 인터워킹 서비스 시스템에 대한 연구)

  • Lee, Myeongbae;Baek, Miran;Park, Jangwoo;Cho, Yongyun;Shin, Changsun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.91-97
    • /
    • 2018
  • The plant factory represents one of the future agricultural systems into which ubiquitous information technology (U-IT) is incorporated, including sensor networking, and helps minimize the influence of external experimental factors that constrain the use of existing greenhouse cultivation techniques. A plant factory's automated cultivation system does not merely provide convenience for crop cultivation, but also expandability as a platform that helps build a knowledge database based on its acquired information and develop education and other application services using the database. For the expansion of plant factory services, this study designed a plant factory interworking service (PFIS) which allows plant factories to share crop growth-related information efficiently among them and performed a test on the service and its implementation.

Real-time wireless Audio/video Transmission Technique for Handheld Devices (휴대용 단말기를 위한 실시간 무선 영상 음성 전송 기술)

  • Yoon, Kyung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.111-117
    • /
    • 2009
  • Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.