• Title/Summary/Keyword: Test protocols

Search Result 342, Processing Time 0.025 seconds

A study on the Conformance Test for Protocols Written in Estelle (Estelle로 기술된 프로토콜의 적합성 검증에 관한 연구)

  • 인소란;원유훈
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.11
    • /
    • pp.1-7
    • /
    • 1992
  • The conformance test is a methodology which verifies whether the Implementation Under Test (IUT) conforms to its standard specification or not. In this paper, first, the Conformance Test System(CTS) is implemented in prototype including verification test type, black-box test strategy, conformance test class, remote test structure, and IUT which is described by the ISO Estelle among Formal Description Techniques. Second, through this prototype the proposed system is experimented. The prototype is composed of two modules. The first module is the Estelle-to-Pascal preprocessor which converts the Estelle program to the corresponding Pascal program because the experimental IUT was described using the unexecutable code form of Estelle before being tested by the TD(Test Driver). The TD, the second module, is based on the master-slave concept and plays important role is CTS. The TD acts as the master with the IUTd being the slave. The prototype system is implemented using Turbo-C, Turbo-Pascal and Turbo-Assembly.

  • PDF

Performance Evaluation of VPN Protocols Using Various Traffic (다양한 트래픽을 이용한 VPN 프로토콜 성능 평가)

  • O, Seung-Hui;Chae, Gi-Jun;Nam, Taek-Yong;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.721-730
    • /
    • 2001
  • Nowadays corporation networks are growing rapidly and they are needed to communicate with branch offices. Therefore, a VPN (Virtual Private Network) appears to reduce the cost of access and facilitate to manage and operate the enterprise network. Along with this trend, many studies have been done on VPN. It is important that the performance issues should be considered when VPN protocols are applied. However, most of them are limited on the tunneling methods and implementation of VPN and a few studies are performed on how installation of VPN affects the network. Therefore, in this paper, a testbed is constructed and VPN protocols are installed on it. Real traffic is generated and transmitted on the testbed to test how installing a VPN affects the network. As a result, layer 3 VPN protocol shows lower network performance than layer 2 VPN protocols. And we realize that the combination of L2TP and IPSec is the better method to install VPN than using IPSec only in the aspects of performance and security.

  • PDF

Comparative Study of Target Genes and Protocols by Country for Detection of SARS-CoV-2 based on Polymerase Chain Reaction (PCR) (중합효소 연쇄반응 기반의 코로나-19 바이러스 검출법에 대한 국가별 목표 유전자 및 프로토콜 비교 연구)

  • Kim, Jin-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.465-474
    • /
    • 2021
  • Corona-19, a disease caused by 'Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2)', was declared a global pandemic by the World Health Organization (WHO) in March 2020, and a real-time polymerase chain reaction test is performed as a diagnostic test for screening and confirmation in most countries. However, not only the target genes and protocols differ by countries, but also the procedures for reading the diagnosis results are diverse, so the criteria for confirmed patients differ by country. Therefore, in this review, we discussed the target genes, test techniques, and diagnostic criteria for each country notified by WHO. And the specificity and sensitivity, limits of detection, positive and negative controls, false positive bacteria candidates, and specimens, and the specifics of the control setting were also described. In addition, the characteristics of Korea's test were compared to each country's one. Finally, in order to obtain the same diagnosis result for SARS-CoV-2 in the future, standardized diagnosis methods and result interpretations for Corona-19 diagnosis were proposed.

Header Data Interpreting S/W Design for MSC(Multi-Spectral Camera) image data

  • Kong Jong-Pil;Heo Haeng-Pal;Kim YoungSun;Park Jong-Euk;Youn Heong-Sik
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.436-439
    • /
    • 2004
  • Output data streams of the MSC contain flags, Headers and image data according to the established protocols and data formats. Especially the Header added to each data lines contain information of a line sync, a line counter and, ancillary data which consist of ancillary identification bit and one ancillary data byte. This information is used by ground station to calculate the geographic coordinates of the image and get the on-board time and several EOS(Electro-Optical Subsystem) parameters used at the time of imaging. Therefore, the EGSE(Electrical Ground Supporting Equipment) that is used for testing MSC has to have functions of interpreting and displaying this Header information correctly following the protocols. This paper describes the design of the header data processing module which is in EOS­EGSE. This module provides users with various test functions such as header validation, ancillary block validation, line-counter and In-line counter validation checks which allow convenient and fast test on imagery data.

  • PDF

A Study on the Design and Validation Methodology of Communication Protocols Using International Communication Standard Languages (국제 통신 표준 언어를 이용한 통신 프로토콜 설계 및 검증 방법론 연구)

  • Ro, Cheul-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.31-42
    • /
    • 2002
  • In this paper, We set up the development methodology of communication protocols as well as the concrete design concept concerning for how to define and use the PDU, SDU, SAP, and service primitives using SDL, which is recommended by ITU-T, and other international standard languages such as ASN.l, MSC, and TTCN. This methodology covers the SDL design of extended lures protocol, a well known protocol example, insertion of ASN.1 message for transportation of bit string, generation of MSC for validation of design specification, generation of test cases using TTCN from validation, and performance of conformance test.

  • PDF

Implementation and Conformance Test of DYMO Protocol for Ad-Hoc Networks (애드혹 네트워크를 위한 DYMO 프로토콜 구현 및 적합성 검증)

  • Park, Il-Kyun;Kwak, Jung-Nam;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.71-78
    • /
    • 2006
  • MANET routing protocols must support not only wireless networking without any relaying on network infrastructure, but also dynamic management of routing information caused by node mobility. Hence, they are one of important routing protocols for USN. Recently DYMO is regarded as a promising routing protocol for UMT because it is simple and easy to extend as well as it requires less networking load than others. In this paper, we design and implement DYMO routing protocol into various operation systems. Also, we develop a DYMO conformance test tool to evaluate our implementations.

Challenges in the Toxicological(Mutagenic and Teratogenic)/Environmental methods under the GLP system

  • Andrson, D.
    • Proceedings of the Korea Society of Environmental Toocicology Conference
    • /
    • 2002.10a
    • /
    • pp.107-116
    • /
    • 2002
  • GLP regulations were initially “promulgated to address assuring the validity of data in the wake of investigations by EPA and FDA during the mid -1970's which revealed that some studies submitted to the agencies had not been conducted in accordance with acceptable laboratory practices.” [1] In the early 1970s, results of an investigation by the FDA in about 40 laboratories revealed many cases of badly managed studies, poor training of personnel and some cases of deliberate fraud. The general findings were that there were poorly trained study directors and study personnel, poorly designed protocols, protocols not followed, procedures not conducted as described, raw data badly collected, data not correctly identified, data without traceability, data not verified and approved by responsible persons, lack of standardised procedures, poor animal husbandry, inadequate characterisation of test items and test systems, inadequate resources, equipment poorly calibrated or otherwise qualified, reports not sufficiently verified, not an accurate account of the actual study, not a proper reflection of raw data and inadequate archiving of data. These problems are not just past history, since they resurface time and time again, even in quite recent times as the experience of GLP inspectors shows [1]. The GLPs specify minimum practices and procedures in order to ensure the quality and integrity of data submitted in accordance with a regulatory requirement

  • PDF

A Study on a Tester System for the Next Generation Convergence Network (IP기반 차세대 통합네트워크를 위한 시험기 시스템 연구)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1947-1953
    • /
    • 2008
  • This paper studies a system design of testifying next generation convergence network. Next generation convergence network includes such elements as not only various gateway systems interworking with conventional PSTN(Public Switched Telephone Network) but also various protocols communicating between gateway systems and softswitches or gateway controllers. Discussed are an effective system solution to verify functionalities and performance of protocols professing. From such discussion, the study identifies functional blocks and operational flows required for establishing a test system, and then with a basis of these proposes a system architecture. Finally this paper presents system design results and its implemented functional details.

Design and test of two-way communications technologies applicable to Smart meter (스마트미터에 적용 가능한 양방향 통신방식 설계 및 실험)

  • Lee, Sang-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.941-943
    • /
    • 2013
  • A standardized communication protocol is required to exchange the data of electric charge and current-using electric power through the two-way communications between the smart meter and electric power supplier. In this paper, a two-way communications technologies is designed for control technologies and de/registration services of electric equipment, and the international communication protocols is applied to the communications technologies.

  • PDF

Accurate Performance Evaluation of Internet Multicast Architectures: Hierarchical and Fully Distributed vs. Service-Centric

  • Said, Omar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2194-2212
    • /
    • 2013
  • The multicast routing architectures have become indispensable due to the increasing needs for extreme communication services anywhere and anytime. The most recent approaches are called hierarchical and fully distributed, what have been proposed by O. Said et al. in a previous work. These proposed architectures were introduced to enhance the service-centric approach. In this paper, NS2 is used to build a simulation environment to test the hierarchical and the fully distributed multicast architectures as regards the service-centric one. The results of simulation show that the performance of the hierarchical and the fully distributed architectures outperforms the service-centric architecture. Furthermore, the fully distributed architecture is found to have the best performance.