• Title/Summary/Keyword: protocol Analysis

Search Result 2,541, Processing Time 0.029 seconds

Improving the Performance of Network Management Protocol SNMP (네트워크 관리 프로토콜 SNMP의 성능 향상)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.99-107
    • /
    • 2010
  • SNMP(Simple Network Management Protocol) is most commonly used as a standard protocol for effective network management by supporting the increasing size of the network and the variety of network elements such as router, switch, server and so on. However, SNMP has performance drawbacks of network overhead, processing latency, and the inefficiency in data retrieval. In this paper, we propose two schemes to improve the performance of SNMP; 1) the first scheme to reduce the amount of redundant OID information within a SNMP-GetBulk response message, 2) the second scheme of newly proposed SNMP-GetUpdate message combined with the cache in MNS. Through the analysis with real experiments, we show that our first scheme reduces the network overhead and the second scheme improves the processing latency and the retrieval of SNMP MB tables. And, therefore the scalability of network management can be improved.

Transport Performance Analysis of the SDR-based Interworking Networks Using DEVS Methodology (SDR을 포함하는 다종 네트워크의 전달성능 분석을 위한 DEVS 모델링 및 시뮬레이션 연구)

  • Song, Sang-Bok;Lee, Kyou-Ho;Jang, Won-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.153-158
    • /
    • 2008
  • The technology of Software Defined Radio (SDR) is a possible solution to interwork flexibly between various wireless transport protocols. Ubiquitous network, like u-health service network, includes sensor devices or nodes which do not facilitate all the same transport protocols to access network. As such this may be in such unreachable situations as poverty of all required AP (Access Point)’s, faults or contention in a path of particular protocol communication, etc. This paper presents research results of modeling and simulation to analyze transport performance of multi-protocol ubiquitous network which includes SDR-based interwork nodes and congestion-controlled AP’s. Focusing mainly on dynamics of overall transport performance rather than protocol execution procedures, this paper employs the Zeigler’s DEVS (Discrete Event Systems Specification) methodology and DEVSim++simulation environment to experiment.

  • PDF

Study on the Development of Home Care Nursing Intervention Protocol for Stroke Patients (뇌졸중 환자의 가정간호중재 프로토콜 개발)

  • Yoo Ji-Soo
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.7 no.1
    • /
    • pp.122-136
    • /
    • 2000
  • Stroke patient needs rehabilitation after receiving an acute treatment in a hospital. When stroke patient gets involved in an early discharge program, home care nurse plays a pivotal role to make them to gain a full strength and to come back to his/her prior life before he/she is sick. In spite of the importance of home care nursing intervention protocol for home care nurses to perform home care nursing autonomously, home care nursing intervention protocol for stroke patient is rarely developed. Therefore this study was conducted to develop home care nursing protocol that is applicable for stroke patients in home care nursing area. 41 home care nursing charts for stroke patients registered in home care nursing agencies from December 1st 1994 to August 31st 1999 at Y hospitals in Seoul and Won-Ju city were analyzed. 44 home care nurses who were having over three years' experience on stroke patients were participated in this study as a user validity validation group. The results of this study are as follows. 1. 28 nursing diagnoses were selected on the basis of evaluation of nursing diagnoses of stroke patients presented in a previous literature and case studies on home care nursing. 2. 17 nursing diagnoses were classified through the frequency analysis of home care nursing charts for 41 stroke patients who had received home care nursing. The order of sequence was like these: impaired skin integrity, risk for infection, nutritional deficit, impaired physical mobility, constipation, knowledge deficit, ineffective airway clearance, anxiety in family members, risk for aspiration, self care deficit, altered urinary elimination, ineffective individual coping, social isolation, risk for injury, self-esteem disturbance, impaired verbal communication, fatigue of family caregiver. 3. Based on validation on expert and user validities, 44 nursing interventions which were above ICV=.80 were chosen. 4. Nursing intervention protocols which showed above ICV=.90 were developed and were like these; pressure ulcer care, position change, preventive care for circulatory dysfunction, tube care : catheter, vital sign monitor, constipation/impaction management, artificial airway management, suction of airway secretion, environmental management : safety, and fall prevention.

  • PDF

The Optimization of Human Sperm Decondensation Procedure for Fluorescence in Situ Hybridization (Fluorescence in Situ Hybridization 시행을 위한 인간정자 탈응축법의 적정화)

  • Pang, Myung-Geol
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.24 no.3
    • /
    • pp.369-375
    • /
    • 1997
  • Studies were conducted to determine the efficiency of decondensation protocols. Sperm obtained from seven normal donors was immediately washed after liquefaction and then decondensed using the method of West et al. (1989) and my original protocol. My optimized protocol entailed mixing 1 ml aliquots of semen with 4 ml phosphate buffered saline (PBS). Following centrifugation, pellets were resuspended in 1 ml PBS containing 6 mM EDTA. After centrifugation, pellets were resuspended in 1 ml PBS containing 2 mM dithiothreitol at $37^{\circ}C$ for 45 min. Following mixing with 2 ml PBS and centrifugation, pellets were resuspended by vortexing. While vortexing, 5 ml of fixative were gently added. Slide preparation was accomplished using the smear method and it was stored at $4^{\circ}C$. When comparing these protocols, the degree of sperm decondensation and head swelling was monitored by measuring nuclear length, area, perimeter, and degree of roundness using FISH analysis software. Apparent copy number for chromosome 1 and, separately, for the sex chromosomes was determined by FISH using satellite DNA probes for loci DIZ1, DXZ1 and DYZ3. Sperm treated by my decondensation protocol showed significant increases (p<0.05) in length, area, perimeter, and degree of roundness. There was a significant decrease (p<0.05) in the frequency of nuclei displaying no signal but no change in the frequency of nuclei with two signals in samples decondensed by my protocol. My data suggested that decondensation using my original protocol may lower the frequency of cells with spurious "nullisomy" due to hybridization failure without inducing spurious "disomy" resulting from increased distances between split signals.

  • PDF

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

Mean Transfer Time for SCTP and TCP in Single-homed Environment considering Packet Loss (싱글홈드 환경에서 패킷 손실을 고려한 SCTP와 TCP의 평균 전송 시간)

  • Kim, Ju-Hyun;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.233-248
    • /
    • 2008
  • Stream Control Transmission Protocol(SCTP) is a new transport protocol that is known to provide improved performance than Transmission Control Protocol(TCP) in multi-homing environment that is having two and more IP addresses. But currently single-homed computer is used primarily that is having one IP address. To identify whether mean transfer time for SCTP is faster that for TCP in single-homed environment considering packet loss, we make up real testbed regulating the bandwidth, delay time and packet loss rate on router and observe the transfer time. We write server and client applications to measure SCTP and TCP mean transfer time by C language. Analysis of these experimental results from the testbed implementation shows that mean transfer time of SCTP is not better than performance of TCP in single homed environment exceptional case. Main reasons of performance are that SCTP compared to TCP stops transmitting data by timeout and data transmission is often delayed when SACK congestion happens. The result of study shows that elaborate performance tuning is required in developing a new SCTP module or using a implemented SCTP module.

Design Healthcare Mobility Agent Module in Sensor Network (센서 네트워크에서 헬스케어 이동성 에이전트 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.544-553
    • /
    • 2008
  • The general sensor network uses bundle method to collect fixed information from sensor node. However, this method is difficult to actively cope with major sensing objects in healthcare environment including status and position change of person and change of surrounding environment. In order to support the healthcare environment, certain information should be provided in accordance with the change of status of person and surrounding circumstance and also must cope with the change of network type by movement of person. This paper analyzes LEACH protocol which guarantees effectiveness of network as it constitutes clusters between Agilla model that is a representative multi agent middle ware and surrounding nodes. Based on the result of this analysis, it suggests LEACH_Mobile protocol which guarantees node mobility that is the weakest point of LEACH protocol. Moreover, it designs mobility agent middleware which supports dynamic function change of node and mobility agent module which supports dynamic function change of mobile node as components of LEACH_Mobile routing module. In addition, it is definitely increase performance which in mobile node of transfer data rate through LEACH_Mobile protocol of simulation result.

  • PDF

A study on Inference Network Based on the Resilient Ontology-based Dynamic Multicast Routing Protocol (상황인식 기반의 RODMRP 추론망 연구)

  • Kim, Sun-Guk;Chi, Sam-Hyun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1214-1221
    • /
    • 2007
  • Ad-hoc network is soft wireless communication network that is consisted of mobile node and clusters without helping of infrastructure. We propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. Proposed structure is consisted of context awareness parameters as like distance between each nodes. The proposed architecture performs two types of routing discovery. One is Flooding Discovery Routing(FDR) for comparing analysis step and Local Discovery Routing(LDR) to compose path of node forecast(preservation) step from node's state value. The inference network structure of proposed RODMRP(Resilient Ontology-based Dynamic Multicast Routing Protocol) adopts a tree structure to enhance an efficient packet in various environment between mobile node. We will have developed an algorithm that will desist multi-hierarchy Layered networks to simulate a desired system.

A Secure Yoking-Proof Protocol Providing Offline Verification (오프라인 검증을 지원하는 안전한 요킹증명 프로토콜)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.