• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.025 seconds

A CNRP Server/Client System (CNRP 서버/클라이언트 시스템)

  • Yu, Young-Ho;Lee, Jong-Hwan;Lee, Jung-Hwa;Kim, Kyong-Sok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.607-617
    • /
    • 2002
  • IETF has proposed CNRP that is a protocol exchanging CNRP objects between server and client for resolving a common name to URIs of the desired Internet resouces. CNRP enables users to access various services via the integrated interface, to easily get the desired resources, and to reuse the results not as the data but as the information. Whereby these advantages, CNRP will be generally used for the integration of the various Internet services or the applications where the resolution of common name is needed. But, CNRP specification doesn't describes the practical implementation method for server and client. Though a few prototype systems are developed in some researches using CNRP, they are not enough to be generally used for the various Internet applications because they doesn't include all objects specified in CNRP specification or they construct systems with one server. So, this Paper proposes the practical implementation method for CNRP server/client through analyzing and solving the problems occurred when implementing them, and implements all objects specified in CNRP specification. This paper also verifies the feasibility of the proposed method by developing the prototype system of the company name resolution service using the CNRP server/client implemented in this study. The CNRP server/client implemented in this paper are used to develop various CNRP application systems.

Adaptive Power Saving Protocol Based on Traffic Estimation for Wi-Fi Direct Networks (Wi-Fi Direct 망을 위한 부하량 예측 기반의 전력 절감 기법)

  • Yoo, Hongseok;Park, Yang-Woo;Lee, Chae-Soo;Yun, Tae-Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.207-212
    • /
    • 2015
  • Wi-Fi Direct allows battery powered mobile devices to form a wireless ad hoc network. Since one member of the network called Group Owner (GO) takes the role of managing the network, the network lifetime is mainly affected by the energy efficiency of GO. Hence, Wi-Fi Direct defines power saving schemes that allow GO to save the energy by turning off its radio interface during the periods called absence periods. However, the Wi-Fi Direct specification does not specify how to set parameters (denoted by PS parameters) determining the schedule of the absence periods. In this paper, we therefore propose a novel traffic-aware power saving scheme for Wi-Fi Direct networks. In particular, the proposed scheme estimates the application-level traffic load and adaptively tunes the PS parameters according to the estimated value.

Development of Access Point Supporting Multiple Network Interfaces (다중 네트워크 인터페이스를 지원하는 액세스 포인트 개발에 관한 연구)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.109-114
    • /
    • 2004
  • Increasing popularity of WLAN and advancement of WPAN allow user to connect to the Internet easily today. The increasing of number of networking mobile device such as laptop and PDA requires computing devices to share high speed Internet line or work on networks in most cases. This has stimulated the demand of access point that supports multiple network interfaces. This paper describes the process of design, implementation and test of the wired/wireless integrated access point that supports multiple network interfaces such as wired LAN, wireless LAN, Bluetooth, and Broadband network. We designed and developed the hardware system and protocol software to integrate heterogeneous network. The system has shown compatibility with standard specification and good performance through testing with various network devices.

Formal Specification and Verification for S/KEY Against Dictionary Attack (사전공격 방지를 위한 S/KEY의 정형 명세 및 검증)

  • Kim Il-Gon;Choi Jin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1218-1225
    • /
    • 2004
  • S/KEY system was proposed to guard against intruder's password replay attack. But S/KEY system has vulnerability that if an attacker derive passphrase from his dictionary file, he can acquire one-time password required for user authentication. In this paper, we propose a correct S/KEY system mixed with EKE to solve the problem. Also, we specify a new S/KEY system with Casper and CSP, verify its secrecy and authentication requirements using FDR model checking tool.

Throughput Analysis of ASO-TDMA in Multi-hop Maritime Communication Network (다중-홉 선박 통신 네트워크를 위한 애드혹 자율 구성 TDMA 방식의 수율 성능 분석)

  • Cho, Kumin;Yun, Changho;Kang, Chung G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.741-749
    • /
    • 2012
  • Ad Hoc Self-Organizing TDMA (ASO-TDMA) has been proposed as a specification to support the multi-hop data communication service for ships over VHF band. It allows for organizing a multi-hop ad-hoc network in a distributed manner by sharing the radio resources among the ships navigating along the route. In this paper, Markov chain analysis is given to provide the average throughput performance for ASO-TDMA protocol Furthermore, the analytical results are verified with computer simulation, which shows that there exists the optimal transmission rate to maximize the average throughput as the subframe size and the number of ships are varying in each hop region.

Spatio-temporal Query Processing Systems for Ubiquitous Environments

  • Kim, Jeong Joon;Kang, Jeong Jin;Rothwell, Edward J.;Lee, Ki Young
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.1-4
    • /
    • 2013
  • With the recent development of the ubiquitous computing technology, there are increasing interest and research in technologies such as sensors and RFID related to information recognition and location positioning in various ubiquitous fields. Especially, RTLS (Real-Time Locating Services) dealing with spatio-temporal data is emerging as a promising technology. For these reasons, the ISO/IEC published RTLS standard specification for compatibility and interoperability in RTLS. Therefore, in this paper, we designed and implemented Spatio-temporal Query Processing Systems for efficiently managing and searching the incoming Spatio-temporal data stream of moving objects. Spatio-temporal Query Processing Systems's spatio-temporal middleware maintains interoperability among heterogeneous devices and guarantees data integrity in query processing through real time processing of unceasing spatio-temporal data streams and two way synchronization of spatio-temporal DBMSs. Web Server uses the SOAP(Simple Object Access Protocol) message between client and server for interoperability and translates client's SOAP message into CQL(Continuous Query Language) of the spatio-temporal middleware.

SELFCON: An Architecture for Self-Configuration of Networks

  • Boutaba, Raouf;Omari, Salima;Singh Virk, Ajay Pal
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.317-323
    • /
    • 2001
  • Traditional configuration management involves complex labor-intensive processes performed by experts. The configuration tasks such as installing or reconfiguring a system, provisioning network services and allocating resources typically involve a large number of activities involving multiple network elements. The network elements may be associated with proprietary configuration management instrumentation and may also be spread across heterogeneous network domains thereby increasing the complexity of configuration management. This paper introduces an architecture for the self-configuration of networks (SELFCON). The proposed architecture involves a directory server, which is uses to maintain configuration information. The configuration information stared in the directory server is modeled using the standard DEN specification thereby allowing effective exchange of network, system and configuration management data among heterogeneous management domains. SELFCON associates configuration intelligence with the components of the network, rather than limit it to a centralized management station. The network elements are notified about related changes in configuration policies, based upon which, they perform self-configuration. SELFCON is able to provide automation of configuration management and also an effective unifying framework for enterprise management.

  • PDF

An Adaptive Method for Determining the Size of Aggregate Reservation in RSVP (RSVP에서 묶음 자원 예약의 3기 결정을 위한 적응적 방법)

  • 박태근;김치하
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.435-443
    • /
    • 2004
  • Although RSVP is a strong signaling protocol in providing QoS support, it is not scalable. Thus, the IETF introduced the concept of aggregation into RSVP However, the specification for the aggregation of RSVP does not specify how to compute the size of aggregate reservation for a path, but only describes how the resources are reserved and released with a given size. This paper proposes the method of properly determining the size of aggregate reservation on the path condition, when aggregate reservation is performed through RSVP for guaranteeing QoS of multimedia traffic. Simulation results show that the proposed method improves efficiency of the aggregation of RSVP.

Implementation of network architecture for a humanoid robot (휴머노이드 로봇의 네트워크 구조 구현)

  • Sung, Yu-Kyoung;Kong, Jung-Shik;Lee, Bo-Hee;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2397-2399
    • /
    • 2004
  • This paper deals with the messages scheduling of a CAN (Controller Area Network), based on the distributed control scheme to integrate actuators and sensors in a humanoid robot. In order to supply the distributed processing for a humanoid robot, each control unit should have the efficient control method, fast calculation and valid data exchange. The preliminary study has concluded that the performance of CAN is better and easier to implement than other network such as FIP (Factory Instrumentation Protocol), VAN (Vehicle Area Network), etc. Since humanoid robot has to treat the significant control signals from many actuators and sensors, the communication time limitation could be critical according to the transmission speed and data length of CAN specification. In this paper, the CAN message scheduling in humanoid robot was suggested under the presence of Jitter in the message group, the existence of high load of messages over the network and the presence of transmission errors. In addition, the response time under the worst case is compared with the simulation by using the simulation algorithm. As a result, the suggested messages scheduling can guarantee our CAN limitation, and utilized to generate the walking patterns for the humanoid.

  • PDF

Occupancy Control Scheme for Reordering Buffer at 3GPP ARQ (3GPP ARQ를 위한 재정렬 버퍼의 점유량 조절 방식)

  • Shin, Woo-Cheol;Park, Jin-Kyung;Ha, Jun;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.65-68
    • /
    • 2003
  • 3GPP's RLC protocol specification adopted an error control scheme based on selective repeat ARQ. In 3GPP ARQ, distinctive windows are provide at transmitting and receiving stations so that those stations are prohibited to send or receive data PDU's out of window. An increase in window size enhances delay performance. Such an increase, however, raises the occupancy at reordering buffer, which results in a long reordering time. Aiming at suppressing the occupancy at reordering buffer, we propose a occupancy control scheme in this paper. In this scheme, a threshold is created in the receiving station's window and a data PDU out of the threshold (but within the window) is treated according to go back N ARQ. By the employment of the occupancy control scheme, the occupancy at the reordering buffer is apparently reduced, while the delay performance may be degraded due to the properties of go back N ARQ. We, thus, investigate the peak occupancy and mean delay performance by a simulation method. From numerical examples, we observe a trade-off in both performance measures and conclude that the peak occupancy is effectively reduced by setting a proper threshold under a constraint on mean delay performance.

  • PDF