• Title/Summary/Keyword: Protocol Design

Search Result 2,575, Processing Time 0.027 seconds

Design and Impementation of File Transfer Protocol Through Public Network (공중망을 이용한 화일전송 프로토콜의 설계 및 구현에 관한 연구)

  • 이인행;양해권;김동용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.3
    • /
    • pp.187-196
    • /
    • 1990
  • This paper presents the design and implementation of a File Transfer Protocol between PC's which are connected through public network. The file handling system was implemented under 3B20S/UNIX which has connections to IBM-PC under MS-DOS. In designing the Protocol we use Kerimit Protocol which supports a file transfer between several kinds of PC's, and we extended the Kermit Protocol to have window function and file managing system. Users prepare data at PC and are able to send it to host computer and can receive, inquire, and delete file in host computer.

  • PDF

Design of protocol simulator for mobile communication system (이동통신망 프로토콜 적합성 시험을 위한 시뮬레이터 설계)

  • 송평정;한영열
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.2
    • /
    • pp.1-10
    • /
    • 1995
  • Since there is currently no commercial protocol simulator for CDMA mobile communication system, we need to develop a General-Purposed Protocol Test Simulator (G-PTS). This paper is concerned with the design and implementation of this G-PTS contains the multi-scenario generating functions, multi-tasking kernel and multiple interface functions. Thus it can be utilized in the test category using multiple base-stations such as soft-handoff, 3-way handoff and mulit-party call features. G-PTS is verified using the model of CDMA soft handoff scenario and the result shows its reliable operations.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Clinical Trial Protocol Development of Acupuncture for Disaster Survivors: Results from an Expert Survey (전문가 설문조사에 기반한 재난 경험자에 대한 침치료 임상연구 프로토콜 개발)

  • Huiyong Kwak;Chanyoung Kwon;Jungtae Leem;Sang-Ho Kim
    • Journal of Oriental Neuropsychiatry
    • /
    • v.35 no.1
    • /
    • pp.15-26
    • /
    • 2024
  • Objectives: The objective of this study is to develop a specialized clinical research protocol for acupuncture treatment specifically designed for disaster survivors based on insights from an expert survey. Methods: An expert panel comprising specialists in neuropsychiatry, acupuncture, and clinical research methodology was assembled. Initial data to inform the clinical research protocol design was collected utilizing open-ended responses, multiple-choice questions, and a 5-point Likert scale to gauge agreement levels. Next, this data was disseminated to a panel of experts. A cohesive clinical research protocol was then formulated during a core panel meeting by integrating insights from a panel of 10 experts. Results: The protocol developed herein entails a non-randomized controlled study involving participants aged 19~64 years old who have been identified as high-risk or cautious according to the National Trauma Center screening test. The study design includes the establishment of an active control group, which allows for the assessment of an additional effect through comparison with conventional therapy. The selected acupuncture approach involves a combination of manual acupuncture and ear acupuncture. For clinical outcome assessment, the Clinician-Administered Posttraumatic Stress Disorder Scale for DSM-5 was proposed to gauge trauma symptoms. Representative scales for various domains such as depression, anxiety, anger, insomnia, pain, and quality of life were also provided for reference. Conclusions: The developed protocol is anticipated to streamline the swift design and initiation of clinical trials during disaster scenarios. It is also designed to be scalable, thereby enabling its application in both non-randomized control group studies and single-group before-and-after comparisons.

Verification Test of Communication Protocol for Interface between EIS and LDTS (철도신호설비 상호간 정보전송을 위한 통신 프로토콜 검증시험)

  • 황종규;이재호;윤용기;신덕호
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.2
    • /
    • pp.114-119
    • /
    • 2004
  • According to the computerization of railway signalling systems. the communication protocol for interface between these systems are required. Therefore the new communication protocol for railway signaling system is required. Generally, there are two verification method for new designed protocol in the industrial and academic fields. One is the laboratory testing method which is very popular and general technique. In our research the comparison between existing and new designed protocol for signaling is described and the verification test results are also represented. From these laboratory test, we are verified the conformance of new designed protocol. Another method is verified by formal method. The format verification method is widely used at safety-critical system design but this approach is nor popular at verification communication protocol. However it is very important to verify the safety of new designed protocol for railway signaling system because signaling systems are very safety-critical systems. So, the methodology for formal verification of designed protocol is also reviews in this paper.

Priority oriented dobule reservation probocol for very high speed wireless LANs (초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜)

  • 조광민;정상일;강철신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

A Study on the Architectural Design of the PTF(Protocol Test Facility) and X.25 Packet Level Test (PTF(Protocol Test Facility)의 구조 설계 및 X.25 Packet Level Test)

  • 최양희;진병문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.10 no.5
    • /
    • pp.240-249
    • /
    • 1985
  • This paper proposes the requirements of protocol testing, the protocol test methods and the architecture of PTF. Also this paper includes the test sequences and the test results for X.25 DTE packet level protocol.

  • PDF

Design and implementation of the MAC protocol for underwater vehicle network (수중 이동체 통신망을 위한 접속제어 프로토콜의 설계 및 구현)

  • 신동우;임용곤;김영길
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.180-188
    • /
    • 1997
  • This paper proposes a new efficient MAC(Media Access Control) protocol to establish the ultrasonic communication network for underwater vehicles, which ensures a certain level of maximum throughput regardless of the propagation delay of ultrasonic and allows fast data transmission through the multiple ultrasonic communication channel. A MAC protocol for underwater communication network that allows 'peer-to-peer' communication between a surface ship and multiple underwater systems is designed, and the proposed control protocol is implemented for its verification.

  • PDF

Design of a multipath routing protocol for energy-efficiency and low-delay in duty-cycled wireless sensor networks (듀티사이클 무선센서네트워크에서 저전력과 저지연을 위한 다중경로 라우팅 프로토콜의 설계)

  • Lee, Hyungkeun
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.326-332
    • /
    • 2020
  • This paper presents the design of a routing metric for energy-efficient and low-delay path selection and a new routing protocol utilizing the metric in duty-cycyled wireless sensor networks. The new routing metric based on duty cycle, EDW, can reduce the energy and delay of transmission paths, which represents total waiting time from source to destination due to duty cycle. Therefore, in this paper, we propose a new multipath routing protocol based on cross-layer information utilizing the new routing metric, and simulation results show that the proposed protocol shows better performance of end-to-end delay and energy consumption.