• Title/Summary/Keyword: 프로토콜 분석기

Search Result 267, Processing Time 0.028 seconds

Location Management for Wireless ATM (무선 ATM을 위한 위치관리 기법)

  • Kim, Y.J.;Lee, W.Y.;Kim, J.K.;Cho, Y.Z.
    • Electronics and Telecommunications Trends
    • /
    • v.13 no.2 s.50
    • /
    • pp.10-28
    • /
    • 1998
  • 무선 ATM에서는 위치관리 기법으로는 PNNI 라우팅 프로토콜의 확장과 기존의 셀룰러 전화망의 위치 등록기 개념에 근거한 방식들이 제안되고 있는데 크게 Mobile PNNI 방식과 Location Register(LR) 방식으로 나누어진다. Mobile PNNI 방식은 기존의 PNNI 라우팅 프로토콜을 기반으로 하여 단말기의 이동성을 제공할 수 있도록 수정 확장한 위치 관리 기법이다. Mobile PNNI 방식에서는 단말기가 이동할 경우에 영역 변수(scope parameter) S에 의해 제한된 범위 내에서 교환국 간에 reachability information이 갱신되며, 이러한 정보를 이용하는 PNNI 라우팅 프로토콜을 기반으로 하여 위치 추적과 호 설정이 동시에 수행된다. LR 방식은 Mobile PNNI 방식과는 달리 발신호가 발생하게 되면, 계층적인 구조의 위치 등록기들의 추적을 통해 상대편 이동 단말기가 접속된 교환국의 위치 정보를 알아낸 다음, 호 설정 과정을 수행하게 된다. 본 연구에서는 무선 ATM에서의 여러 가지 위치관리 요구사항을 살펴보고, 위에서 언급한 두 가지 방식에 대하여 자세히 소개하고, 이들을 비교 분석한다.

A Development of User Protocol Converter with Modbus and NMEA0183 (Modbus와 NMEA0183간의 사용자 프로토콜 컨버터 개발)

  • Eum, Sang-hee;Hong, Sung-ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.90-92
    • /
    • 2015
  • This study aim is to effectively reduce the time that was required for the analysis on an existing communication protocol with the industrial monitoring equipment. We analyzed the collected data with the Modbus protocol and NMEA0183, which is widely used in industrial monitoring. and User will be easy converting to data for use on each devices. The main board of the protocol converter was used AVR128, and RS232C and Ethernet was configured to enable communication.

  • PDF

A Study on Implementation of a VXIbus System Using Shared Memory Protocol (공유메모리 프로토콜을 이용한 VXIbus 시스템 구현에 관한 연구)

  • 노승환;강민호;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1332-1347
    • /
    • 1993
  • Existing instruments are composed independently according to their function and user constructed instrumentation system with those instruments. But in the late 1980s VXI bus enables to construct instrumentation system with various modular type instruments. For an VXI bus system with the word serial protocol, an increase of data size can degrade the system performance. In this paper shared memory protocol is proposed to overcome performance degradation. The shared memory protocol is analyzed using the GSPN and compared with that of the word serial protocol. It is shown that the shared memory protocol has a better performance than the word serial protocol. The VXI bus message based-system with the proposed shared memory protocol is constructed and experimented with signal generating device and FFT analyzing device. Up to 80 KHz input signal the result of FFT analysis is accurate and that result is agree with that of conventional FFT analyzer. In signal generating experiment from 100 KHz to 1.1 GHz sine wave is generated.

  • PDF

Improvement of a New Remote User Authentication Scheme Using Smart Card with Check Digits (스마트카드를 이용한 원격사용자 및 리더기 상호인증 프로토콜)

  • Kim Se-Il;Choi Eun-Young;Lee Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.538-542
    • /
    • 2006
  • 본 논문에서는 Awasthi-Lal 이 제안한 프로토콜[1]에 대하여 살펴보고 그들이 제안한 새로운 원격사용자인증 프로토콜의 취약점에 대하여 분석한 다음, 이 취약점을 보완하기위해 신용카드 복제로 부터 안전한 스마트카드를 이용한 원격사용자 및 리더기 상호인증 프로토콜을 제안한다.

  • PDF

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.

The research of 5.2 protocol performance and structure (V5.2 프로토콜의 성능 및 구조분석)

  • 이성우;이병란;이종영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.226-230
    • /
    • 2003
  • In this thesis I analyzed that V5.2 protocol function is effective to fulfill all of the services that are provided at the existing local exchange. I analyzed this in five methods that refer to ETSI inside patronage. I experimented turnaround time by Start-up method and verified V5.2 protocol function when Start-up. Also I confirmed stability of system by the reconstruction-ability experiment related E1 switch over. I verified V5.2 protocol function through PSTN call process that uses a special service test and local call simulator. As a result of experiment, I confirmed the best method when simultaneous Start-up. V5.2 protocol function was excellent and It becomes switch over at 1/1000 seconds when E1 is out of service. V5.2 protocol function was effective to fulfill all of the special services that are provided at local exchange and its long call process ability was superior to KT standard with 4 fails in 20000 calls. Through the experiment, it was proved that V5.2 interface will become a significant element of communication network when after LE side expanse of v5 interface ID with TDX-100 exchanger and the AN occurrences OOS by message transmission limit and call disconnect when E1 switch over are improved.

  • PDF

Design and Implementation of the Internetworking Architecture between IPv4 and IPv6 in IMS based Mobile networks (IMS기반 이동패킷망에서의 IPv4/IPv6 연동구조 설계 및 구현)

  • You, Seugn-Kwan;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.168-174
    • /
    • 2006
  • In this paper, we propose an architecture for communication between the IPv4-based UA and the IPv6-based UA in IMS based Mobile Networks, and design and implement the IMS protocol Translator for verification of the architecture. For the design of the internetworking between the IPv4 and the IPv6, we analyze the transition mechanisms and investigate the protocol translator. The IMS protocol translator is composed of the IMS-ALG(IP Multimedia Subsystem - Application Level Gateway) and TrGW(Translation Gateway), and the conformance of these components are verified by experiments.

Design of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인기의 TM/TC 데이터 프로토콜 설계)

  • Hong, Su-woon;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.506-512
    • /
    • 2018
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. Among these, the Division UAV is designed to transmit fixed size TM/TC data repeatedly and the Corps UAV is designed to transmit aperiodic TM/TC data to the variable length of the message-based. In this paper, we analyze the TM/TC data protocol of existing military UAV systems and present data protocol design method which is considered to be more efficient in wireless communication environment applied to equipment under development. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

Relay Protocol applied to Optimal Power Allocation (최적의 전력 분배 방안이 적용된 중계기 프로토콜)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.93-97
    • /
    • 2015
  • In this Paper, we proposed optimization of system performance, optimal splitting factor applied to power splitting protocol with relay in the cooperative communication undergo co-channel interference. We can possible to optimize and maximize the channel capacity of the receiver through optimal factor of splitting protocol. So, we can solve inability in system, and to increase the efficiency of the network. Finally, performance of the proposed protocol is analyzed in terms of outage probability, capacity of system.