• Title/Summary/Keyword: protocol Analysis

Search Result 2,519, Processing Time 0.032 seconds

Performance Analysis of VoIP Services in Mobile WiMAX Systems with a Hybrid ARQ Scheme

  • So, Jaewoo
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.510-517
    • /
    • 2012
  • This paper analyzes the performance of voice-over-Internet protocol (VoIP) services in terms of the system throughput, the packet delay, and the signaling overhead in a mobile WiMAX system with a hybrid automatic repeat request (HARQ) mechanism. Furthermore, a queueing analytical model is developed with due consideration of adaptive modulation and coding, the signaling overhead, and the retransmissions of erroneous packets. The arrival process is modeled as the sum of the arrival rate at the initial transmission queue and the retransmission queue, respectively. The service rate is calculated by taking the HARQ retransmissions into consideration. This paper also evaluates the performance of VoIP services in a mobile WiMAX system with and without persistent allocation; persistent allocation is a technique used to reduce the signaling overhead for connections with a periodic traffic pattern and a relatively fixed payload. As shown in the simulation results, the HARQ mechanism increases the system throughput as well as the signaling overhead and the packet delay.

ON HIPPOCAMPUS PROTOCOL BY A BRAIN WAVE ANALYSIS IN THE FIELD OF MEMORY FOR A MUSICAL THERAPY

  • Kengo-Shibata;Takashi-Azakami
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1999.06a
    • /
    • pp.95-96
    • /
    • 1999
  • The authors have considered the 1/f fluctuation of vial rhythm with $1/f\beta$ spectrum of $\alpha$ wave in relation to the invigoration for the learning memory by paid their attention to the hippocampus protocol in this paper. At the first clinical experiment, the data of the remembrance test at short period is able to make as the foundation of the repeat memory. It can replace this memory with long period memory through the hippocampus by the superposition of the same memory-nerve circuits.

Study of Cluster Tree Routing Protocols (클러스터 트리 라우팅 프로토콜 연구)

  • Cho, Moo-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.8
    • /
    • pp.138-143
    • /
    • 2005
  • A hierarchical tree structure of clusters has advantages for the network design due to its scalability and simple routing protocol. In this paper, the cluster tree routing protocol is studied for the wireless sensor network. From the numerical analysis results, the data aggregation in the intermediate nodes reduces the number of communication message and saves the energy of sensor nodes, but it may result in increased data traffic latency. And also the selection of cluster head can increase the relaying hops very high.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Jeong-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.187-190
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) by challenge-response protocol between radio and authentication center. This paper analyzes authentication-key generation/delivery/injection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure.

  • PDF

Performance Analysis of Transition Mechanism to IPv6 (IPv6 전이를 위한 메커니즘들에 대한 성능 분석)

  • Kim, Jae-Eun;Nam, Sang-Woo;Lee, Yoon-Ju;Kahng, Hyun-Kuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1427-1430
    • /
    • 2002
  • 현재 사용되고 있는 IPv4(Internet Protocol Version 4)의 주소의 고갈 문제가 대두 되면서 IPv6(Internet Protocol Version 6)[1]가 거론되기 시작하였다. IPv4 네트워크에 IPv6 적용시 IPv4 네트워크와의 상호 동작을 필요로 하고 있기 때문에 이를 위해서 IPv6 호스트와 라우터에서 IPv4를 지원하기 위한 메커니즘들이 연구되고 있다. 하지만 IPv6의 도입의 초기 단계에서 가장 우선적으로 요구되는 사항은 전체적으로 구축되어 있는 IPv4 네트워크와 소규모 IPv6 네트워크와 통신하기 위한 방법을 제공하는 것이다. 이를 위해서 현재까지 제안된 IPv6 전이 메커니즘들에 대한 성능 분석을 통하여 가장 합리적이 모델을 제시함으로써 IPv6 전이에 있어서의 모델을 제시하고자 한다.

  • PDF

A Study on the Implementation of Fieldbus-Based Manufacturing Automation Systems (필드버스를 이용한 생산자동화 시스템 구축 기술 연구)

  • Hong, Seung-Ho;Park, Tae-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.3 s.96
    • /
    • pp.91-102
    • /
    • 1999
  • Fieldbus provides real-time data communication among field devices in the manufacturing automation and process control systems. In this study, an experimental model of fieldbus-based manufacturing automation system is developed. Experimental model consists of two robots, two conveyor belts, NC machine, PLC, sensors and operator station. These machines are interconnected into the Profibus network, and exchange their data through the services provided by FMS(Fieldbus Message Specification), which is the application layer protocol of Profibus. The experimental model is used to measure the network-induced delay of variable and file data transmitted through FMS services. Network-induced delays are collected and analyzed on each sublayer of Profibus protocol stack. The results obtained from the experiment of this study can be effectively utilized when fieldbus is implemented on the practical manufacturing automation systems.

  • PDF

Design and Performance Analysis of an Active QoS Allocation Scheme for large File Transfer (대용량 파일 전송을 위한 능동적인 QoS 제공 방안의 설계 및 성능분석)

  • 김국한;이만희;변옥환;유인태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.283-285
    • /
    • 2003
  • 슈퍼컴퓨터 사용자들은 FTP(File Transfer Protocol)을 이용해서 대용량의 파일을 전송한다. 전송되는 데이터들은 승용차나 비행기 설계, 의약품 개발. 기상 예보 그리고 복잡한 수학적 계산 등과 같이 다양한 분야에 걸친 연구관련 데이터로서 고성능 슈퍼컴퓨터에 의한 연산 처리가 요구된다 기존의 FTP 는 네트워크 상태에 따라 전송 지연이나 데이터 손실 등의 문제로 사용자의 불편을 초래하였다. 이에 전송 성능을 효율적으로 높이고 데이터 손실을 최소화를 제공하는 연구가 필요하다. 근래의 TCP (Transmission Control Protocol) 성능 향상 연구에 관한 연구들의 관심은 크게 두 가지이다. 하나는 윈도우 사이즈 조절(auto-tuning)이고, 다른 하나는 Multi-stream 이다. 본 연구에서는 파일 전송 성능 향상을 위한 방법으로 윈도우 사이즈 조절 방법을 사용하였고, 네트워크 상태에 따라 QoS(quality of Service)를 제공한다. 이런 성능 향상 결과로 신뢰성 있는 네트워크를 제공하여 사용자들은 신속하게 데이터를 전송하며 연산처리 결과가 더욱 정확하다고 신뢰할 수 있다. 본 고에서는 대용량 파일을 전송 할 때 성능을 향상시키는 관련 연구를 알아보고 대용량 파일 전송 중 네트워크 상태에 따라 005를 능동적으로 작용하여 테스트하고 성능을 분석하였다.

  • PDF

Development of a Delirium Educational Program for Hospital Nurses

  • KANG, Yun
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.70-78
    • /
    • 2019
  • This paper outlines an intervention protocol used to educate nurses in a project that implemented and evaluated a delirium educational program in one general hospital. It outlines an evaluation of the content of the education and processes used to deliver the intervention through an analysis of reflective notes. The educational protocol was designed for adult learners and grounded in the six assumptions of Knowles' learning theory. Results suggest the educational program positively impacted on participating nurses' knowledge, attitudes and family caregiver involvement in delirium care of hospitalized older adults with and without dementia. This paper also acknowledges the challenges involved in sustaining a practice change through an educational intervention.

Topology Design Optimization for Improving Fail-over Performance in Wired Mesh Network (유선 메시 구조에서의 절체 성능 향상을 위한 네트워크 설계 기법)

  • Hwang, Jongsu;Jang, Eunjeong;Lee, Wonoh;Kim, Jonghyeok;Kim, Heearn
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.4
    • /
    • pp.165-175
    • /
    • 2019
  • Networks use relatively slow heartbeat mechanisms, usually in routing protocols, to detect failures when there is no hardware signaling to help out. The time to detect failures available in the existing protocols is no better than a second, which is far too long for some applications and represents a great deal of lost data at 10 Gigabit rates. We compare the convergence time of routing protocol applying Bidirectional Forwarding Detection (BFD) protocol in wired mesh network topology. This paper suggests the combinations of protocols improving fail-over performance. Through the performance analysis, we contribute to reduce convergence time when system is fail-over.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.