• Title/Summary/Keyword: protocols

Search Result 3,980, Processing Time 0.114 seconds

A Comparative Survey on MAC Protocols for Cognitive Radio Ad Hoc Networks (무선인지 애드혹 네트워크를 위한 MAC 프로토콜 비교 분석)

  • Timalsina, Sunil K.;Moh, Sang-Man
    • Smart Media Journal
    • /
    • v.1 no.1
    • /
    • pp.17-26
    • /
    • 2012
  • In cognitive radio networks (CRNs), unlicensed users sense the licensed spectrum bands and opportunistically access them without interfering operations of licensed users. Especially, in ad hoc networks, the MAC layer plays an important role in coordinating unlicensed users access to the spectrum and, thus, a number of MAC protocols have been studied recently. In this paper, we comparatively examine MAC protocols in cognitive radio ad hoc networks (CRAHNs). First, we categorize the protocols on the basis of common control channel (CCC) requirements and further review major implementations for each category. Then, we make a qualitative comparison of the protocols in terms of inherent characteristics and performance.

  • PDF

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

MAC Performance Improvement by Selective Use of DCF and PCF Protocols for IEEE 802.11 Wireless LANs (무선랜에서 망 상태에 따른 DCF와 PCF 프로토콜의 선택적인 사용을 통한 MAC 성능 향상)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.2
    • /
    • pp.89-95
    • /
    • 2011
  • The distributed coordination function (DCF) and point coordination function (PCF) protocols are the basic MAC protocols for legacy IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11e, IEEE 802.11g and IEEE 802.11n wireless LANs. When the DCF protocol is used for the various versions of IEEE 802.11 wireless LANs, the MAC performance seriously degrades due to the collisions among the stations (STAs) as more and more STAs attempt to transmit their data frames. On the other hand, the PCF MAC performance becomes poor when many STAs exist in IEEE 802.11 wireless LANs, however, only small number of STAs actually attempt to transmit their data frames. In this paper, we propose the algorithm for improving the MAC performance by selectively using the DCF and PCF protocols according to the state of IEEE 802.11 wireless LANs. Numerical examples are presented to show the MAC performance improvement by the selective use of the DCF and PCF protocols according to the network state.

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems (협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계)

  • Choi, Myeong-Gil;Lee, Dong-Ho;Hwang, Won-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1271-1278
    • /
    • 2008
  • As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.

Performance Analysis of Ad-Hoc Network Protocols under Vehicular Communication Environments (차량 통신 환경에서 애드혹 네트워크 프로토콜의 성능분석)

  • Shin, Sung-Kwon;Kim, Doo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2234-2239
    • /
    • 2010
  • In this paper, the performance of ad-hoc wireless network protocols is analyzed under the vehicular communication environments. We estimate the throughput and delay of the protocols with packet sizes and various data traffics in expressways and metropolis by using QualNet simulator. It turns out that the performance of DSR protocol is better in expressways and the performance of AODV works well in metropolitan areas. Therefore, it is necessary that the proper protocols should be selected to provide the better performance according to the vehicular communication environments.

Routing in Vehicular Ad Hoc Networks: Issues and Protocols

  • Shrestha, Raj K.;Moh, Sang-Man;Chung, Il-Yong
    • Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.28-40
    • /
    • 2008
  • Vehicular ad hoc networks (VANETs) are a practical application class of wireless ad hoc networks, which consist of moving vehicles equipped with radio communication capabilities that collaborate to form a temporary network. This paper addresses issues and protocols of multihop routing in such emerging networks in the context of safety and infotainment applications. Due to the highly dynamic mobility of vehicles, frequent link breakage and short connection time are inevitable and, thus, the routing is a challenging task and interest for many researchers and industrial community. The frequent and dynamic change of topology makes the topology-based routing unreliable but the position-based routing more effective. The position-based routing consists of the location service which maps a node id to a geo-graphical position and the forwarding scheme which selects the next hop based on geo-graphical information of the node, its neighbors and the destination. The routing techniques are further categorized into geographical forwarding, trajectory forwarding and opportunistic forwarding based on the forwarding scheme. In this paper, we first present the distinguished properties of VANETs and the challenges and intractable issues posed in designing the routing protocols, followed by the comprehensive survey of existing routing protocols. Then, the different routing protocols designed for VANETs are compared in terms of characteristics, performance and application domains.

  • PDF

Message Complexity Analysis of MANET Address Autoconfiguration-Single Node Joining Case (단일 노드 결합시 MANET 자동 네트워킹 프로토콜의 메시지 복잡도 분석)

  • Kim, Sang-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.257-269
    • /
    • 2007
  • This paper proposes a novel method to perform a quantitative analysis of message complexity and applies this method in comparing the message complexity among the mobile ad hoc network (MANET) address autoconfiguration protocols (AAPs). To obtain the upper bound of the message complexity of the protocols, the O-notation of a MANET group of N nodes has been applied. The message complexity of the single node joining case in Strong DAD, Weak DAD with proactive routing protocols (WDP), Weak DAD with on-demand routing protocols (WDO), and MANETconf has been derived as n(mO(N)+O(t)), n(O(N)+O(t)), n(O(N)+2O(t)), and nO((t+1)N)+O(N)+O(2) respectively. In order to verify the bounds, analytical simulations that quantify the message complexity of the address autoconfiguration process based on the different coflict probabilities are conducted.

Integrated Railway Signaling Systems for Laboratory Testing of Next-generation High-speed Train (한국형 고속전철용 신호시스템의 실험실 시험을 위한 통합 신호시스템)

  • Hwang, Jong-Gyu;Lee, Jong-Woo;Park, Yong-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.53 no.1
    • /
    • pp.32-39
    • /
    • 2004
  • Railway signaling systems consist of several vital computerized equipment such as CTC(Centralized Traffic Control), EIS(Electronic Interlocking System), ATC(Automatic Train Control) and so on. Currently, the project for development of railway signaling systems for the next-generation high-speed train is progressed according to the G7 project and railway signaling related several companies and research institute are joined this project consortium. The railway signaling systems, being developed in this project, called as a kTCS(Korean Train Control System), is composed of kTCS-CTC, kTCS-IXL, kTCS-ATC and etc. kTCS signaling systems have to be operated at the laboratory testing level as integrated signaling systems by interface between each railway signaling systems before railway field installation and revenue service. To solve this matter, communication protocols between each signaling equipment are designed and message codes for each defined protocols have defined. And also several equipment has developed for the railway integrated signaling systems for laboratory testing. We has plentifully tested and verified the designed protocols and the characteristics of integrated railway signaling systems with our developed each kTCS signaling equipment and communication protocols. In this paper, the integrated kTCS system including communication protocols is presented.

The Development of Protocols for Equitable Testing and Evaluation in Ocean Energy - A Three-Year Strategy

  • Ingram, David M.;Villate, Jose Luis;Abonnel, Cyrille;Johnstone, Cameron
    • International Journal of Fluid Machinery and Systems
    • /
    • v.1 no.1
    • /
    • pp.33-37
    • /
    • 2008
  • EquiMar (Equitable Testing and Evaluation of Marine Energy Extraction Devices in terms of Performance, Cost and Environmental Impact) is one of the first round of energy projects under the European Commissions 7th Framework Programme (FP7). The three year EquiMar project aims to deliver a suite of protocols for the evaluation of both wave and tidal converters, harmonizing testing and evaluation procedures across the wide range of available devices, accelerating adoption through technology matching and improving the understanding of both environmental and economic impacts associated with the deployment of devices. The EquiMar protocols will cover site selection, initial design, scaling up of designs, the deployment of arrays and environmental impact assessment as well as economic issues. EquiMar will build on existing protocols, e.g. UK DTI Marine Renewables Development Fund (MRDF) protocols for wave and tidal energy, and engage with international standards setting activities, e.g. IEC TC114.

A Comparative Study on the Clamping Protocols of a Biliary External Drainage Tube in Adult Living-donor Liver Transplant Recipients (성인 생체 간이식 수혜자에서 담도 외-배액관 잠그기 훈련 방법 비교)

  • Chung, Jin Ah;Choi, Hye Ran
    • Journal of Korean Critical Care Nursing
    • /
    • v.7 no.1
    • /
    • pp.33-39
    • /
    • 2014
  • Purpose: The propose of this study was to introduce the clamping protocols for a biliary external drainage tube and trace the results of using clamping protocols to prevent some possible biliary complications or enable their early detection in living-donor liver transplantation. Method: This study was a retrospective study to analyze the cases of 97 subjects who had undergone liver transplantation in a hospital in Seoul, Korea. Clamping protocol 1 was applied to 47 patients, and clamping protocol 2 was applied to 50 patients. Results: In the case of protocol 1, the success rate of the clamping protocol was 74.5%, while that of protocol 2 was 84.0%. However, there was no significant difference in the compiled statistics from authentic sources (p = .246). Conclusions: The difference in the success rate between the two protocols was not significant for the clamping protocols of the biliary external drainage tube. However protocol 2 is suggested for the clamping method due to the simplicity of application. Further study with a large sample size is suggested.

  • PDF