• Title/Summary/Keyword: Protocol design

Search Result 2,589, Processing Time 0.027 seconds

DESIGN AND IMPLEMENTATION OF A PROTOCOL VERIFICATION SYSTEM (프로토콜 검증시스템의 설계 및 구현)

  • Kim, Yong-Jin
    • ETRI Journal
    • /
    • v.11 no.4
    • /
    • pp.22-36
    • /
    • 1989
  • In this paper, a design and implementation of an efficient protocol verification system named LOVE has been described. The LOVE has been developed specifically for LOTOS. It performs not only protocol syntax validation (PSV) but also protocol functional verification(PFV). The PSV is a test to check if a protocol is free from protocol syntax errors such as deadlocks and livelocks. The PFV confirms whether or not a protocol achieves its functional objectives. For the PSV, the reachability analysis is employed, and the observational equivalence test is used for the PFV. For protocol verification using the LOVE, a schematic protocol verification methodology has been outlined.

  • PDF

The Visual Information Processing and the Characteristics of Behaviour of the Architectural design Process Using Visual Protocol Analysis (시각적 프로토콜 분석법을 이용한 건축디자인의 시각정보처리 과정 및 행위 특성 분석)

  • 김용일
    • Korean Institute of Interior Design Journal
    • /
    • no.19
    • /
    • pp.53-58
    • /
    • 1999
  • The goal of this paper is to understand the visual information process and the characteristics of behaviour of the architectural design process using visual protocol analysis through the actual experiment by the architect. The visual protocol analysis is developed on the basis of the theories of the visual information processing model and visual mental image, which can explain visual representation in architectural design process. A protocol study is reported in which the experimental data by architect is analyzed through the protocol analysis method. The whole design process is divided into the stage of 9 tasks which are classified into 18 visual representatiov. The results about visual cognition in cognitive science are reviewed and summarized, and these findings will help understand the architectural design nature.

  • PDF

The design and implementation of LAPD protocol for ISDN Basic Access (ISDN Basic Access를 위한 LAPD 프로토콜의 설계 및 구현)

  • Han, Woon-Young;Suh, Chang-Jin;Chung, Hee-Chang;Yim, Chu-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.921-923
    • /
    • 1987
  • This paper describes the design and implementation of LAPD protocol for ISDN Basic Access. In protocol design, Software module is divided according to function and interfaces between modules arc defined. After that, Software structure is defined. LAPD protocol is designed by state machine design technique and implemented by SDL.

  • PDF

Synthesizing of Communication Protocol using CFSM (CFSM을 이용한 통신 프로토콜의 합성)

  • 이철희;이상호;김성열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.4
    • /
    • pp.331-340
    • /
    • 1990
  • In communication protocol design, it is important that design procedure is simple and result protocol must be correct. This paper presents a communication protocol synth-sizing algorithm, which enhances productivity of protocol design, using CFSM. CFSM is defined as extended FSM for representing protocol information and simplification. In this method protocol designer descripts only one communication machine with out error consideration using FSM, then two communication machine M' and N' are generated. And then transformation rules for error-recovery converts M' and N' to EM' and EN' which are logically correct.

  • PDF

Identity-Based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design

  • Shen, Jian;Moh, Sangman;Chung, Ilyong
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.682-691
    • /
    • 2012
  • Key agreement protocol is a fundamental protocol in cryptography whereby two or more participants can agree on a common conference key in order to communicate securely among themselves. In this situation, the participants can securely send and receive messages with each other. An adversary not having access to the conference key will not be able to decrypt the messages. In this paper, we propose a novel identity-based authenticated multi user key agreement protocol employing a symmetric balanced incomplete block design. Our protocol is built on elliptic curve cryptography and takes advantage of a kind of bilinear map called Weil pairing. The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks. Furthermore, our protocol is efficient and needs only two rounds for generating a common conference key. It is worth noting that the communication cost for generating a conference key in our protocol is only O($\sqrt{n}$) and the computation cost is only O($nm^2$), where $n$ implies the number of participants and m denotes the extension degree of the finite field $F_{p^m}$. In addition, in order to resist the different key attack from malicious participants, our protocol can be further extended to provide the fault tolerant property.

Prototype design of fiber optics based 765kV substation control system (광 LAN을 적용한 765kV변전소 감시제어 시범시스템 설계)

  • 송인호;박종화;최종협
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.996-999
    • /
    • 1996
  • This paper introduces prototype design of 765kV Substation control system based on fiber optics LAN and distributed network protocol. Two major important facts, immunity of any surge which frequently occurs in Ultra High Voltage Substation and the most suitable communication protocol for substation control system, are considered on the system design conception. To meet the first fact, use of fiber optics cable and isolation transformer are considered, and to satisfy the second fact, DNP3.0(Distributed Network Protocol) which is IEC870-5 compatible is adopted.

  • PDF

Development and Effect of Pain Management Protocol for Nursing Home Patients with Dementia (노인 간호 요양시설에서의 치매환자 통증관리 프로토콜 개발 및 효과)

  • Chang, Sung-Ok
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.14 no.1
    • /
    • pp.29-43
    • /
    • 2007
  • Purpose: This study was done to develop a pain management protocol for nursing home patients with dementia and to examine effects of the protocol on pain assessments and interventions by the nurses and on pain relief signs in the patients. Method: The six steps in the protocol development and the examination of effect are outlined. Three rounds using the Delphi technique and one group pretest-posttest design experiment were developed. Design issues, such as sample selection and sample size, are addressed in relation to the study protocol. Results: After implementation of the pain management protocol, there were significant changes nursing actions including frequency of number of physical examinations, utilization of pain assessment tools, and request to doctors for discomfort management and there were significant changes in frequency in the number of verbal and physical expressions of pain, and emotional patterns. Conclusion: This is the first pain management protocol for patients with dementia in Korea. However, more study will be needed to determine the methodological strength and necessary revisions for the protocol.

  • PDF

Protocol Analysis of Product Design Assignment based on Design Information and Design Process : A Case Study (제품디자인과제에 대한 디자인 정보와 프로세스에 기반한 프로토콜분석 사례연구)

  • Jin, Sun-Tai;Kim, Yong-Se
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.109-118
    • /
    • 2006
  • A case study bas been conducted to explore design activities of four expert designers through protocol analysis, We examined relations among design information, process patterns and solution qualities with two complementary coding schemes based on design contents and design process, Relation between personal creativity modes and design activities has been examined as well. Regarding design process, an adequate distribution of activities in process may be necessary to bring out a good solution. It seemed that the more design contents about context, external knowledge, and general feature are used, the more unique design concepts are made. Regarding personal creativity modes, not much of differences in that design activity were observed while only a few relations between designer's personality and design activity were observed. The fact that the designers participated are all experienced designers could explain this. Investigation on the differences between novice designers and expert designer reflected in protocol data based on design information and design process coding scheme is to be done. Also, how personal process patterns observed through this protocol analysis can be utilized in composing design team.

  • PDF

Design of GE subgroup based User Authentication Protocol For efficient Electric Commerce (효율적 전자상거래를 위한 유한체 서브그룹 기반의 사용자 인증 프로토콜 설계)

  • 정경숙;홍석미;정태충
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.209-220
    • /
    • 2004
  • If protocol has fast operations and short key length, it can be efficient user authentication protocol. Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF(p/sup 6/) that is existent finite field, and uses GF(p²) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol with y/sub i/ = g/sup b.p/sup 2(i-1)//ㆍv mol q, 1(equation omitted) 3 that is required to do user authentication.

  • PDF