• Title/Summary/Keyword: protocol model

Search Result 1,379, Processing Time 0.024 seconds

MPLS Traffic Engineering of standard skill (MPLS Traffic Engineering의 표준 기술)

  • Kim, Kang;Jeon, Jong-Sik;Kim, Ha-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.68-73
    • /
    • 2001
  • MPLS(Multi protocol Label Switching) is standard skill for added to speed and control the Network Traffic. MPLS concerned the routing protocol to relative Pack line, Each Pack composed label and node, saved the time to seek the address of node. MPLS worked IP, ATM and Network protocol of flame rely. MPLS is Network OSI suport model, 2Layer send to most of Packinsted of 3Layer Switching. MPLS is added speed Traffic of QoS and effective controled the Network.

  • PDF

Secure Framework for SIP-based VoIP Network (SIP 프로토콜을 기반으로한 VOIP 네트워크를 위한 Secure Framework)

  • Han, Kyong-Heon;Choi, Sung-Jong;Choi, Dong-You;Bae, Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.295-297
    • /
    • 2008
  • Session Initiation Protocol (SIP) has become the call control protocol of choice for Voice over IP (VoIP) networks because of its open and extensible nature. However, the integrity of call signaling between sites is of utmost importance, and SIP is vulnerable to attackers when left unprotected. Currently a hop-by-hop security model is prevalent, wherein intermediaries forward a request towards the destination user agent server (UAS) without a user agent client (UAC) knowing whether or not the intermediary behaved in a trusted manner. This paper presents an integrated security model for SIP-based VoIP network by combining hop-by-hop security and end-to-end security.

  • PDF

BACnet/ZigBee-based Lighting Control System (BACnet/ZigBee 프로토콜 기반의 조명제어시스템)

  • Chon, Y.J.;Park, T.J.;Park, D.K.;Hong, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.117-119
    • /
    • 2006
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides five options for datalink layer protocols and these five datalink layer options can be applied with various transmission media. Recently wireless technology prevails in automation area. ZigBee is a standard protocol based on IEEE 802.15.4 for low-speed wireless communication network. In this study, we propose a BACnet/ZigBee model that uses ZigBee wireless technology in a BACnet communication network system as a wireless datalink layer protocol. We also applied this model to a lighting control system to evaluate the feasibility of proposed technology. The technology proposed in this paper can extend the application of BACnet not only for building automation but also for home automation by taking the advantages of ZigBee wireless communication technology in BACnet communication network systems.

  • PDF

Fault coverage evaluation method of test case for communcation protocol (통신 프로토콜 시험항목의 오류 발견 능력 평가 방법)

  • 김광현;허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.8
    • /
    • pp.1948-1957
    • /
    • 1996
  • The conformance testing of communication protocol is the process to evaluate whether the protocol implemented is identified with standard specification. By evaluating how generated test cases detect many faults, it can be used with standard estimating efficiency of conformance testing. The method that evaluates the capability of fault coverage for test cases, has been researched by mathematical analysis and simulation. In this paper, we pointed out the problem of existing method and proposed new evaluation model of fault covergage for test case which generated by foult model. Also, we analyzed the results comparing to the existing evaluation method and proved its validity.

  • PDF

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

Design and Implementation of a Secure Smart Home with a Residential Gateway

  • Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.9-17
    • /
    • 2022
  • In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.

THREE DIMENSIONAL FINITE ELEMENT ANALYSIS OF $BR{\AA}NEMARK\;NOVUM^{(R)}$ IMMEDIATE IMPLANT PROSTHODONTIC PROTOCOL ($Br{\aa}nemark\;Novum^{(R)}$ 즉시 임플랜트 보철 수복 방법에 관한 삼차원 유한요소 분석적 연구)

  • Kim Woo-Young;Kim Yung-Soo;Jang Kyung-Soo;Kim Chang-Whe
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.39 no.5
    • /
    • pp.463-476
    • /
    • 2001
  • Since the treatment of edentulous patients with osseointegrated implant was first introduced more than 30 years ago, implant therapy has become one of the most important dental treatment modalities today. Based on the previous experience and knowledge, $Br{\aa}nemark\;Novum^{(R)}$ protocol was introduced with the concept of simplifying surgical and prosthetic technique and reducing healing time recently. This protocol recommends the installation of three 5mm wide diameter futures in anterior mandible and the prefabricated titanium bars for superstructure fabrication. This study was designed to analyze the stress distribution at fixture and superstructure area according to changes of fixture number, diameter and superstructure materials. Four 3-dimensional finite element models were fabricated. Model 1 - 5 standard fixtures (13mm long and 3.75mm in diameter) & superstructure consisted of type IV gold alloy and resin Model 2- 3 wide diameter fixtures (13mm long and 5.0mm in diameter) & superstructure consisted of type IV gold alloy and resin Model 3-3 wide diameter fixtures (13mm long and 5.0mm in diameter) & superstructure consisted of titanium and resin Model 4-3 wide diameter fixtures (13mm long and 5.0mm in diameter) & superstructure consisted of titanium and porcelain A 150N occlusal force was applied on the 1st molar of each model in 3 directions - vertical($90^{\circ}$), horizontal($0^{\circ}$) and oblique($120^{\circ}$). After analyzing the stresses and displacements, following results were obtained. 1. There were no significant difference in stress distribution among experimental models. 2. Model 2, 3, 4 showed less amount of compressive stress than that of model 1. However, tensile stress was similar. 3. Veneer material with a high modulus of elasticity demonstrated less stress accumulation in the superstructure. Within the limites of this study, $Br{\aa}nemark\;Novum^{(R)}$ protocol demonstrated comparable biomechanical properties to conventional protocol.

  • PDF

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.