• Title/Summary/Keyword: TCP/IP Network

Search Result 505, Processing Time 0.027 seconds

A Study on Developing the TCP/IP Application Communication Protocol for the Standard Traffic Signal Controller (표준규격 교통신호제어기에서 TCP/IP 통신프로토콜 제정방안 연구)

  • Han, Won-Sub;Hyun, Cheol-Seung;Lee, Ho-Won;Joo, Doo-Hwan;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.71-84
    • /
    • 2009
  • The communication between the center system and the local controller in the Traffic Signal Controller Specification has been specified by a communication line for the exclusive use and the analog modem serial protocol. Therefore, it can't be adapted in the ITS communication network of the TCP/IP protocol being constructed in the local city. The international and domestic ITS device's communication specification has adapted the DATEX-ASN data exchange technique based on the ethernet communication network. So, this study was performed by the purpose of developing the application communication protocol's standard draft based on the TCP/IP communication protocol for the traffic signal controller, to be able to constitute the traffic signal control system in the ITS communication network. The communication format for 23 items of control, status, and database request etc. which are specified in the standard traffic signal controller was developed by appling the DATEX-ASN data interface procedure and structure which are KS ISO X 14827 Part1, 2, ISO/ DIS 15784 Part-3. To test the developed protocol, the application program for the communication items was developed and according to the test result, the encoding and the decoding transection for all communication items was possible.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Development of the Embedded Wireless LAN Technology for Power Utility Equipments (배전설비를 위한 임베디드 무선랜 기술 개발)

  • Woo, Jong-Jung;Shon, Su-Goog
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.10
    • /
    • pp.126-134
    • /
    • 2006
  • This paper describes the development of an embedded wireless LAN controller which can be in parallel operated with an existing utility controller. The embedded controller mainly consists of Prism(R) 2.5 chip set and Atmega 128 microcontroller. In order to communicate over the network, the controller including TCP/IP stack (IP, TCP, UDP, and ICMP), telnet, and X/Z modem has been developed. For a specific application, we have proposed an special method to convert data structure between TCP/IP and X/Z modem and a data buffer algorithm to minimize the RAM memory usage. Finally, the correctness and performance of the protocols are tested and verified using $CommView^{(R)}\;and\;DU^{(R)}$. The development is satisfactorily operated only for 3,381 bytes of RAM usage without sacrificing interoperability between hosts.

Simulation Evaluation for TCP Traffic over ATM Network (ATM 네트워크상에서 TCP 트래픽에 관한 시뮬레이션 평가)

  • 박봉주;육동철;박승섭
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.7-16
    • /
    • 2000
  • 초고속 통신의 실현과 다양한 멀티미디어 서비스를 위한 TCP/IP 통신의 전송 메카니즘으로서 ATM이 널리 사용되고 있다. TCP층과 ATM층의 상호작용이 TCP층 뿐만 아니라 ATM층에도 영향을 미쳐 처리율과 공정성의 성능이 저하되므로, ATM상의 TCP 트래픽 파라미터, 즉 TG(timer granularity)와 윈도우 크기를 적절하게 조정함으로써 TCP 흐름제어가 ABR 율제어와 상호작용하지 않는다. 그 결과로 상호작용의 영향을 최소화할 수 있으며, TCP의성능향상을 가져올 수 있다. 본 논문에서는 윈도우 크기와 TG와 같은 TCP 파라미터를 조절하여 VBR서비스상에서의 TCP 트랙픽의 성능평가를 통해 높은 처리율과 공정성을 나타내었다.

  • PDF

Implemenetation of The TCP/IP Network Address Translation (TCP/IP 주소 변환 기능 구현)

  • Go, Mun-Jun;Min, Sang-Won
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.1
    • /
    • pp.164-172
    • /
    • 2001
  • 폭발적인 TCP/IP 단말의 증가로 가용한 IP 주소가 부족하여지고 있다. IPng의 차세대 인터넷 프로토콜 방안이 이를 해결할 수 있는 적합한 방안이기는 하지만 적용 운용되기까지는 상당시간이 소요될 것으로 예상된다. 따라서 사설망과 공중 인터넷과 연결기능 중 네트웍 주소변환방안이 과도기적이기는 하지만 차세대 인터넷 망이 활성화될때까지 IP 주소의 고갈 문제를 해결할 수 있을 것이다. 본 논문에서 구현한 NAT 기능은 라우터에 할당된 공중 인터넷 주소를 이용하여 공중 인터넷 사용과 외부로부터 사설망을 보호할 수 있는 기능을 제공한다. NAT 구현을 위해서는 제공하는 서비스의 사용 프로토콜을 파악해야하며 각 서비스 종류에 적합한 ALG요구사항을 분석하여야 하며 본 논문에서는 NAT 구현과정에 필요한 사항을 구체적이고 체계적으로 제시하였다.

  • PDF

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

Design and Implementation of Embedded Ethernet Module for Home Network (홈 네트워크를 위한 Embedded Ethernet Module 설계 및 구현)

  • Kim Pan-kyu;Hoan Tae-Moon;Lee Jong-hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1111-1116
    • /
    • 2005
  • The necessity of the home network have been enlarged gradually according to the distribution of ultra-high speed internet, the expansion of a digital information equipment and the change of a life pattern. In this paper, we proposed the embedded ethernet module that could be operate on eight bit system, but it could control home appliance with full ethernet speed. The embedded ethernet module consists of 8051 MCU and Hardware TCP/IP. In this module, we construct simple web server and port remote control program for I/O device control. We verified through internet that the developed embedded ethernet module could control and check home appliances anywhere and anytime. We expect the developed ethernet module can build up niche market at home network. And it will be helpful to activate home network market.

Desiogn of secure IP SAN with high-speed paralllel PS-WFSR (고속 병렬형 PS-WFSR을 적용한 보안 IP SAN 설계)

  • Kim, Bong-Geun;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2164-2170
    • /
    • 2011
  • Rapid surge in date quantity lead to increase in storage demand from corporate. The existing SAN with fiber channel is being changed to IP-based SAN environment due to installment and maintenance cost. But the IP-based network still have some similar security problems as existing TCP/IP network. Also, for the security reasons of storage traffic, data are encrypted, but with the existing system, data larger than 10G can't be handled. To address security and speed issue, this paper proposes to a structure applied to IP SAN environment with Parallel Structure Word-based FSR (PS-WFSR) as hardware.

Performance Evaluation in Combination of Wired and Wireless Mesh Networks (메쉬 네트워크 기반의 유무선 통합망 성능 평가)

  • Han, Jin-Young;Jung, Hee-Dong;Im, Young-Bin;Lee, Jeong-Keun;Ryu, Ji-Ho;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.778-782
    • /
    • 2008
  • The performance in combination of wired and wireless mesh network which will be a main access network in future internet is directly linked with service quality to users. In this paper, we evaluate variant TCP performance and analyze traffic characteristics on Wireless (Seoul National University Mesh testbed) - Wired (KOREN/Abilene) - Wireless (HP Mesh testbed in the USA) Network. We found that RTT is proper in this network to serve a VoIP service. Also we propose an enhanced TCP protocol which can perform well in both wireless network which has many packet losses and wired network which has high bandwidth and long delay.