• Title/Summary/Keyword: protocol architecture

Search Result 796, Processing Time 0.023 seconds

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

A Study for the PES Service System Architecture (PES 서비스 시스템 구조에 관한 연구)

  • Oh, Jong-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.471-476
    • /
    • 2011
  • A improved system and protocol architecture for Personal Environment Service which has been created recently, is proposed in this paper. PES is the typical mobile convergence service based on smart phone and user profile, and its influence would be very huge in the near future. In order to make it feasible more efficiently, the system architecture should be studied from the early stage. The proposed PES system and protocol architecture could be valuable reference for the further study and development of PES system and technology.

Design and Implementation of the Internetworking Architecture between IPv4 and IPv6 in IMS based Mobile networks (IMS기반 이동패킷망에서의 IPv4/IPv6 연동구조 설계 및 구현)

  • You, Seugn-Kwan;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.168-174
    • /
    • 2006
  • In this paper, we propose an architecture for communication between the IPv4-based UA and the IPv6-based UA in IMS based Mobile Networks, and design and implement the IMS protocol Translator for verification of the architecture. For the design of the internetworking between the IPv4 and the IPv6, we analyze the transition mechanisms and investigate the protocol translator. The IMS protocol translator is composed of the IMS-ALG(IP Multimedia Subsystem - Application Level Gateway) and TrGW(Translation Gateway), and the conformance of these components are verified by experiments.

Multicast Secure Architecture based on PIM-SM (소규모 멀티캐스트를 기반으로 한 멀티캐스트 보안구조)

  • 김성선;이상순;정영목
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.116-122
    • /
    • 2001
  • A conventional multicast secure protocol. MVMRP, CBT is designed for a large scaled r protocol so the PIM-SM (protect Independent Multicst-Sparse Mode) routing protocol which small number of clients, long distance path among the hosts and shortest path routing chara weak point of require it's own Core tree and re-keying when the traffic is pass through the ro In this study, proposes a architect for a licit information secure of join/leave to all the user or on-service user. With proposed architect, subgroups for multicast secure group mana will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the whole architecture size is samller than the other multicast secure architecture.

An IS-IS Routing Protocol with Traffic Engineering Extensions in MPLS System (MPLS 시스템에서 트래픽 엔지니어링 확장을 고려한 IS-IS 라우팅 프로토콜)

  • 양미정;박혜경;함진호;김상하
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.5
    • /
    • pp.365-374
    • /
    • 2004
  • This paper proposes the architecture of Intermediate System to Intermediate System routing protocol. IS-IS is a link state routing protocol designed to provide routing in a network layer protocols with datagram services. IS-IS has favored scalability and stability. So, it is important to support IS-IS for the MPLS system used in backbone networks. Especially, IS-IS must provide network state information and available resource information for supporting qualify of services in MPLS network. Therefore, we propose the design architecture of IS-IS routing protocol and the implementation technologies. Also, we propose extended architecture for traffic engineering in ATM based MPLS system.

A Study on the Architectural Design of the PTF(Protocol Test Facility) and X.25 Packet Level Test (PTF(Protocol Test Facility)의 구조 설계 및 X.25 Packet Level Test)

  • 최양희;진병문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.10 no.5
    • /
    • pp.240-249
    • /
    • 1985
  • This paper proposes the requirements of protocol testing, the protocol test methods and the architecture of PTF. Also this paper includes the test sequences and the test results for X.25 DTE packet level protocol.

  • PDF

Ad hoc Network for Dynamic Multicast Routing Protocol Using ADDMRP

  • Chi, Sam-Hyun;Kim, Sung-Uk;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.209-214
    • /
    • 2007
  • In this paper, we proposed a new MANET (Mobile Ad hoc Networks) technology of routing protocol. The MANET has a mobility formation of mobile nodes in the wireless networks. Wireless network have two types architecture: the Tree based multicast and shared tree based. The two kind's architecture of general wireless networks have difficult to solve the problems existing in the network, such as connectivity, safety, and reliability. For this purpose, as using that ADDMRP (Ad hoc network Doppler effect-based for Dynamic Multicast Routing Protocol), this study gives the following suggestion for new topology through network durability and Omni-directional information. The proposed architectures have considered the mobility location, mobility time, density, velocity and simultaneous using node by Doppler effects and improved the performance.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

An Efficient Hybrid Replication Protocol for High Available Distributed System (고 가용성 분산 시스템을 위한 효율적인 하이브리드 복제 프로토콜)

  • Youn Hee Yong;Choi Sung Chune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.171-180
    • /
    • 2005
  • In distributed systems data are replicated and stored at several nodes to increase the availability and overall performance. Here Quorum protocol doffing a certain set of replicas required for read/write operation exists for global concurrency control. One of the representative replication Protocols - the Tree Quorum protocol - has a drawback of rapidly growing number of replicas as the level increases, while the Grid protocol requires the same operation cost even without any failure. In this paper, thus, we propose a new replication protocol called hybrid protocol which capitalizes the merits of the existing protocols and solves the problems of them at the same time. The proposed hybrid protocol has very low operation cost in the absence of failure like the tree quorum protocol, and has relatively lower operation cost and higher availability than existing protocols when failure occurs by employing tree architecture as the overall organization while each level of the tree is organized as a row of a grid architecture. It is thus effective to be applied to survival storage system. We conduct cost and availability analysis of the proposed protocol through mathematical modeling, and response time and throughput are compared with those of the Tree Quorum protocol through computer simulation.