• 제목/요약/키워드: Data protocol

검색결과 3,891건 처리시간 0.035초

프로토콜 분석모듈 설계에 의한 TCP 패킷 분석 (Analysis of TCP packet by Protocol Analysis module Design)

  • 엄금용
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

멀티 홉 무선센서네트워크에서 에너지와 지연에 효율적인 하이브리드 MAC 프로토콜 (An Energy and Delay Efficient Hybrid MAC Protocol for Multi-Hop Wireless Sensor Networks)

  • 전준헌;김성철
    • 한국정보통신학회논문지
    • /
    • 제19권2호
    • /
    • pp.471-476
    • /
    • 2015
  • 본 논문에서는 멀티 홉 무선 센서 네트워크에서 에너지 효율적인 하이브리드(hybrid) MAC 프로토콜을 제안한다. 제안하는 MAC 프로토콜은 경쟁방식(CSMA) 방식과 비경쟁방식(TDMA) 방식을 혼합하여 사용한다. 싱크 노드로부터 멀리 떨어진 센서 노드들은 주로 데이터 측정 임무를 담당하기 때문에 데이터 발생 및 전송 트래픽이 적어 구현이 간단한 경쟁방식을 사용하는 것이 유리하다. 그러나 싱크 노드와 가까운 노드들은 데이터 측정 뿐 만 아니라 relay 노드로 동작하기 때문에 많은 데이터를 전송할 필요가 있으므로 경쟁방식을 사용하면 데이터 패킷의 충돌 및 전송지연이 증가하게 된다. 본 논문에서는 싱크 노드와 1홉 거리의 센서 노드들은 마치 비경쟁방식처럼 슬롯을 할당하여 데이터 패킷을 전송하는 메커니즘을 제안한다. 제안하는 메커니즘은 에너지 및 지연에 효율적인 장점을 가진다. 제안된 MAC 프로토콜은 유사한 다른 프로토콜에 비해 데이터 패킷 전송 지연에서 더 좋은 성능을 보였다.

WBAN 환경에서 응급 데이터 전송을 위한 우선순위 기반 MAC 프로토콜 (A Priority Based MAC Protocol for Emergency Data Transmission in Wireless Body Area Networks)

  • 이협건;이경화;신용태
    • 대한전자공학회논문지TC
    • /
    • 제49권4호
    • /
    • pp.26-33
    • /
    • 2012
  • WBAN(Wireless Body Area Networks)은 인체를 기준으로 인체 내 외부로부터 반경 3미터 이내의 무선통신이다. WBAN은 WBAN MAC 프로토콜 요구사항에 적합한 IEEE 802.15.4 MAC 프로토콜을 많이 사용하고 있다. IEEE 802.15.4 MAC 프로토콜은 QoS(Quality of Service)를 요구하는 응용프로그램들의 패킷 전송을 보장하기 위해 비경쟁 접근 방식에 의한 GTS(Guaranteed Time Slot) 할당 기법을 지원한다. 그러나 IEEE 802.15.4 MAC 프로토콜의 GTS 할당 기법은 패킷이 도착한 순서에 따라 채널을 할당하는 FIFS(First In First Service) 큐잉을 사용하여 패킷을 처리함으로서 데이터 전송 신뢰도를 저하시키고, 전송 지연이 발생하여 응급 데이터 전송에 적합하지 않다. 이에 본 논문에서는 응급 데이터 전송을 위한 우선순위 기반 WBAN MAC 프로토콜을 제안한다. 제안하는 MAC 프로토콜은 전송하려는 데이터에 우선순위를 부여하여 응급 데이터의 GTS 요청 처리율을 높이고 GTS 할당 지연시간을 감소시켜 응급 데이터 전송 신뢰도를 향상시킨다.

LLC class 3 프로토콜의 구현 및 분석 (Implementation and analysis of the LLC class3 protocol)

  • 김경신;이준호;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1991년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 22-24 Oct. 1991
    • /
    • pp.352-354
    • /
    • 1991
  • MAP is a standard communication protocol for manufactoring automation. In this paper we implemented IEEE 802.2 LLC class 3 protocol, which consist of type l(unacknowledged connecionless data transfer) mode and type 3 (acknowledged connectionless data transfer) mode. This implemented protocol is verified by the test.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권3호
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

효율적인 프로토콜 적합성 시험을 위한 변칙성 제거 (Anomaly Removal for Efficient Conformance Test)

  • 이현철;허기택
    • 한국정보처리학회논문지
    • /
    • 제6권3호
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • 제14권6호
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜 (Priority oriented dobule reservation probocol for very high speed wireless LANs)

  • 조광민;정상일;강철신
    • 한국통신학회논문지
    • /
    • 제22권1호
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

LLC/MAC 계층 구조에서의 정보 보호 포로토콜에 관한 연구 (A Study on the Information Security Protocol in LLC/MAC Layer Architecture)

  • 류황빈;이재광
    • 한국통신학회논문지
    • /
    • 제17권10호
    • /
    • pp.1164-1174
    • /
    • 1992
  • 본 논문에서는 LLC/MAC 계층 구조에서의 정보 보호 프로토콜에 대하여 기술하였다. 근거리 통신망에서의 정보 보호 위협과 취약성, 이의 해결을 위한 요구 서비스, 그리고 IEEE 802 근거리 통신망 구조에서의 정보 보호 프로토콜의 적용 대한을 기술하였다. 정보 보호 서비스를 제공하기 위해 LLC/MAC 서비스 프리미티브를 이용한 정보 보호 프로토콜 (SP2 : Security Protocol 2) PDU 구성을 제안하였으며, SP2 프로토콜을 구성하기 위하여 DES 알고리즘의 ECB, CBC 모드와 FIPS의 DAA를 이용하였다. 제안된 SP2프로토콜은 데이타 발신처 인증, 데이타 비밀유지, 데이타 무결성 서비스를 제공한다.

  • PDF

An SS_RRA Protocol for Integrated Voice/Data Services in Packet Radio Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제5권2호
    • /
    • pp.88-92
    • /
    • 2007
  • In this paper, an SS-RRA protocol that is based on Code Division Multiple Access is proposed and analyzed under the integrated voice and data traffic load. The backward logical channels consist of slotted time division frames with multiple spreading codes per slot. The protocol uses a reservation mechanism for the voice traffic, and a random access scheme for the data traffic. A discrete-time, discrete-state Markov chain is used to evaluate the performance. The numerical results show that the performance can be significantly improved by a few distinct spreading codes.