• Title/Summary/Keyword: protocol model

Search Result 1,374, Processing Time 0.026 seconds

Simulation and performance evaluation of J1850 protocol for automotive communication (차량통신용 J1850 프로토콜의 시뮬레이션 및 성능평가)

  • Nam, Sang-Un;Yoon, Jung-A;Lee, Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.816-819
    • /
    • 1996
  • This paper focuses on development of simulation model for SAE J1850 and performance evaluation of a J1850 network. The simulation model has been developed by using discrete event simulation language. SAE J1850 is one of Class B network protocol for general data sharing applications. Through numerous simulation experiments, several important performance factors such as the probability of a successful transmission, average queue delay, and throughput have been evaluated.

  • PDF

Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network (무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

Performance Evaluation of a BACnet-based Fire Detection and Monitoring System for use in Buildings

  • Song Won-Seok;Hong Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.1
    • /
    • pp.70-76
    • /
    • 2006
  • The objective of this paper is to propose a reference model of a fire detection and monitoring system using MS/TP protocol. The reference model is designed to satisfy the requirements of response time and flexibility. The reference model is operated on the basis of BACnet, a standard communication protocol for building automation systems. Validity of the reference model was examined using a simulation model. This study also evaluated the performance of the BACnet-based fire detection and monitoring system in terms of network-induced delay. Simulation results show that the reference model satisfies the requirements of the fire detection and monitoring system.

Communication Delay Properties in Performance Model of PROFIBUS Token Passing Protocol (PROFIBUS 토큰 패싱 프로토콜의 성능모델에서의 전송지연 특성)

  • Kim, Hyun-Hee;Lee, Kyung-Chang;Lee, Seok
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.511-514
    • /
    • 2002
  • In may automated systems such as manufacturing systems and process plants, an industrial network or fieldbus is a very important component for the exchange of various and sometimes crucial information. Some of the information has a tendency to rapidly lose its value as time elapses after its creation. Such information or data is called real-time data that includes sensor values and control commands. In order to deliver these data in time, the fieldbus network should be tailored to have short delay with respect to the individual time limit of various data. Fine-tuning the network for a given traffic requires the knowledge on the relationship between the protocol parameters such as timer values and the performance measure such as network delay. This paper presents a mathematical performance model to calculate communication delays of the Profibus FMS network when the timer value TTR and the traffic characteristics are given. The results of this model is compared to those from experiments to assess the model's validity.

  • PDF

One-round Secure Key Exchange Protocol With Strong Forward Secrecy

  • Li, Xiaowei;Yang, Dengqi;Chen, Benhui;Zhang, Yuqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5639-5653
    • /
    • 2016
  • Security models for key exchange protocols have been researched for years, however, lots of them only focus on what secret can be compromised but they do not differentiate the timing of secrets compromise, such as the extended Canetti-Krawczyk (eCK) model. In this paper, we propose a new security model for key exchange protocols which can not only consider what keys can be compromised as well as when they are compromised. The proposed security model is important to the security proof of the key exchange protocols with forward secrecy (either weak forward secrecy (wFS) or strong forward secrecy (sFS)). In addition, a new kind of key compromise impersonation (KCI) attacks which is called strong key compromise impersonation (sKCI) attack is proposed. Finally, we provide a new one-round key exchange protocol called mOT+ based on mOT protocol. The security of the mOT+ is given in the new model. It can provide the properties of sKCI-resilience and sFS and it is secure even if the ephemeral key reveal query is considered.

Protocol-independent Information Modeling and Web Services Implementation for Resource Management in NGN Transport Stratum (NGN 전송 층의 자원 관리를 위한 프로토콜 중립적인 정보 모델링과 웹 서비스 구현)

  • Yim, Young-Eun;Kwon, Tae-Hyun;Kim, Choon-Hee;Han, Tae-Man;Jeong, You-Hyeon;Cha, Young-Wook
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.453-462
    • /
    • 2007
  • NGN is a packet-based converged network to support session and non-session based services in QoS-enabled broadband transport technologies. Resource and admission control functions(RACF) of NGN have been considering COPS and SNMP as resource management protocols to collect network topology and resource status information of transport network. This paper defines requirements of resource management in NGN transport network, and proposes protocol independent information model to keep consistency of data models of each resource management protocol. Based on this information model described with UML class diagram, we designed and implemented NGN resource management system on Web Services.

Design of protocol simulator for mobile communication system (이동통신망 프로토콜 적합성 시험을 위한 시뮬레이터 설계)

  • 송평정;한영열
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.2
    • /
    • pp.1-10
    • /
    • 1995
  • Since there is currently no commercial protocol simulator for CDMA mobile communication system, we need to develop a General-Purposed Protocol Test Simulator (G-PTS). This paper is concerned with the design and implementation of this G-PTS contains the multi-scenario generating functions, multi-tasking kernel and multiple interface functions. Thus it can be utilized in the test category using multiple base-stations such as soft-handoff, 3-way handoff and mulit-party call features. G-PTS is verified using the model of CDMA soft handoff scenario and the result shows its reliable operations.

  • PDF

A Study on Signalling Protocol of Satellite B-ISDN (위성 B-ISDN 신호 프로토콜 연구)

  • 박석천;최동영한기호윤석환
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.59-62
    • /
    • 1998
  • Satellite communication systems will play an important role in establishing high-speed information communication network ddue to the characteristics of flexibility of bandwidth, mobile communication, wide coverage, multipoint and broadcasting. Also satellite systems have the capability to supply terrestrial B-ISDN with flexible links for accessing networks as well as trunking networks. Therefore, satellites must provide compatibility to earth-based B-ISDN signalling interface, services and network capability. This paper proposed interworking model between terrestrial B-ISDN and satellite B-ISDN signalling protocol and illustrated basic call-process procedure of satellite B-ISDN signalling protocol supporting point-to-point and point-to-multipoint connection.

  • PDF

Performance Model for Distributed shared Memory (분산공유 메모리를 위한 성능비교 모델)

  • 임승범;김재훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.116-118
    • /
    • 2000
  • 분산 공유 메모리(Distributed Shared Memory)시스템은 사용자에게 간단한 공유메모리 개념을 제공하기 때문에 사용자는 노드 사이의 데이터 이동에 관여할 필요가 없다. DSM에서 일치서 유지를 위한 프로토콜을 선택하는 것은 통신부하를 줄이는데 중요한 역할을 한다. 본 논문은 DSM 프로토콜을 효과적으로 선택하기 위한 새로운 성능평가 모델을 제시한다. 본 연구에서 제안하는 성능평가 모델을 사용함으로써 무효화방식(invalidate protocol), 갱신 방식(update protocol) 그리고 이주방식(migratory protocol)의 성능예측이 가능하다. 본 성능평가모델은 노드들 사이의 데이터 일치성(consistency)유지를 위한 부담을 최소화하는 최적의 DSM 프로토콜을 결정하는데 사용된다.

  • PDF

A study on IWU functions interconnecting LANs via B-ISDN (B-ISDN을 경유한 LAN간 접속 IWU 기능에 관한 연구)

  • 이종영;조용구;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.7
    • /
    • pp.1746-1755
    • /
    • 1996
  • In this paper, we propose the protocol stact and the server functions of IWU which interconnects distributed LAN's users by using of B-ISDN. The protocol stact of interconnecting IWU under consideration users TCP/IP in upper layer. TCP/IP is popular communication protocol in interconnecting distributed LANs. The interconnecting IWU has server functions for transfering datagrams to B-ISDN such as address translation, fragment and reassembly, CL server, signalling and traffic control. We analyze the performance ofinterconnecting IWU with M/M/1/K queueing model and obtain the throughput and buffer size of interconnecting IWU.

  • PDF