• 제목/요약/키워드: protocol model

검색결과 1,379건 처리시간 0.031초

무선망에서 패킷 재전송과 채널할당 성능분석을 위한 SRN 계층 모델링 (SRN Hierarchical Modeling for Packet Retransmission and Channel Allocation in Wireless Networks)

  • 노철우
    • 정보처리학회논문지C
    • /
    • 제8C권1호
    • /
    • pp.97-104
    • /
    • 2001
  • 본 논문에서는 무선망에서 채널할당을 받은 호가 무선 패킷 데이터를 서비스하는 경우의 성능분석 수행을 위한 계층 모델을 제안한다. 제안된 계층 모델로는 상위계층으로 무선자원 관리를 위한 채널할당 모델을, 하위계층으로 에러발생을 고려한 패킷 재전송 프로토콜 모델을 고려하였으며 이들 모델은 모델링 도구인 SRN을 이용하여 각각 개발한다. 추계적 페트리 네트의 확장형인 SRN은 시스템 성능분석을 위한 간결한 모델링 기능을 제공해 주며 모델에 적절한 보상률(reward) 기능을 부여함으로써 원하는 성능지표를 구할 수 있다. 이들 두 계층간의 상호 연관된 매개변수의 값인 서비스 시간과 패킷 발생률은 고정점 반복순환(fixed-point iteration) 기법을 사용하여 구한다. 즉 상위계층의 호 서비스 시간은 한 호당 K개의 패킷전송을 완료할때 까지 소요되는 시간인 하위계층 모델의 지연시간으로 구할 수 있고, 하위계층 모델의 패킷 발사율은 상위계층의 새로운 호와 핸드오프 호의 발생률로부터 구할 수 있다.

  • PDF

Performance Analysis of the UPC/NPC Algorithm for Guaranteed QoS in ATM Networks

  • Kim, Yong-Jin;Kim, Jang-Kyung;Lee, Young-Hee;Park, Chee-Hang
    • ETRI Journal
    • /
    • 제20권3호
    • /
    • pp.251-271
    • /
    • 1998
  • It is well known that if usage parameter control/network parameter control (UPC/NPC) functions are used together with a cell loss priority control scheme in ATM networks, the measurement phasing problem can occur. This makes it difficult for a network provider to define and commit the cell loss ratio as a QoS parameter. To solve the problem, we propose a new UPC/NPC algorithm. By using the proposed UPC/NPC algorithm, we can define the cell loss ratios for CLP = 0 and CLP = 0+1 cell streams without the measurement phasing problem under any conditions. We analyzed the performance of the proposed UPC/NPC algorithm. Using a discrete time model for the UPC/NPC architecture with a discrete-time semi-Markov process (DSMP) input model, we obtained the cell discarding probabilities of CLP = 0 and CLP = 0+1 cells streams and showed that more CLP = 0 cells are accepted compared to what was proposed in ITU-T.

  • PDF

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

  • Lim, Meng-Hui;Goi, Bok-Min;Lee, Sang-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권4호
    • /
    • pp.822-839
    • /
    • 2011
  • Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

Konnex 와 LnCP 네트워크의 시뮬레이션 성능 평가 (Simulation Performance Evaluation of KNX and LnCP network)

  • 최병훈;하경남;김현희;이경창;이석
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2004년도 추계학술대회 논문집
    • /
    • pp.203-206
    • /
    • 2004
  • Recently home network has been developed in the field of Information Technology. And there are many protocols for smart home, such as Lonworks, Echonet, KNX, LnCP etc. However, the performance evaluation has not been nearly known between the protocols. Hence, this paper evaluates the performance of KNX by Konnex Association and LnCP(Living network Control Protocol) by LG Electronics. We developed simulation model using flowchart of KNX and LnCP and simulation scenario through analysis of message to be generated in the home network. Furthermore, we evaluate simulation performance, such as mean transmission delay, maximum transmission delay, and collision rate of both protocols.

  • PDF

A Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment

  • Byun, Byung-Kil;Lee, Ki-Young
    • Journal of information and communication convergence engineering
    • /
    • 제9권2호
    • /
    • pp.187-192
    • /
    • 2011
  • Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal authentication are examined. And we propose new system model which uses our novel user authentication protocol based on strong one-time password (OTP) and short message service (SMS). We verify our system model and protocol by implementation.

제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델 (A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources)

  • 이헌길
    • 산업기술연구
    • /
    • 제29권B호
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

보행자 더미모델을 이용한 EURO-NCAP 상부다리모형 평가시험 방법에 대한 분석 (Upper Legform Impact Test of the EURO-NCAP Protocol using a Pedestrian Dummy Model)

  • 박상옥;최욱한;손대근;박경진;이은덕;권해붕
    • 자동차안전학회지
    • /
    • 제9권4호
    • /
    • pp.14-19
    • /
    • 2017
  • The mortality rate of car-pedestrian accidents is quite high compared to the frequency of accident. Recently, governments and insurance companies tend to establish and implement new safety standards for pedestrian protection such as EURO-NCAP and K-NCAP. The performance for the pedestrian protection has been gradually improved, but it is still insufficient. Therefore, various studies for the pedestrian protection are being carried out. The car-pedestrian accident is simulated in order to study to the upper legform test of the EURO-NCAP protocol. A pedestrian dummy model is employed and the results are discussed.

블루투스 기저대역 시스템 설계 (Design of Bluetooth baseband System)

  • 백은창;조현묵
    • 한국멀티미디어학회논문지
    • /
    • 제5권2호
    • /
    • pp.206-214
    • /
    • 2002
  • 본 논문에서는 블루투스 표준 1.0b를 기반으로 이동전화, 노트북, PDA 등 각종 이동 가능한 장치들을 무선으로 연결시켜주는 근거리 무선통신용 블루투스의 기저 대역 시스템을 설계하였다. 즉, 기저 대역 시스템의 각 기능블록인 패킷생성 블록, HEC와 CRC 기능블록, Whitening/Dewhitening 기능블록, FEC 기능블록, 입출력 블록(TX, RX 루틴), 클럭 생성 기능블록, 주파수 선별 기능블록, 그리고, 패킷 제어 블록 및 전체 데이터 처리절차를 Verilog HDL 코드로 설계하였으며, Model Sim 툴을 이용하여 기능을 검증하였다.

  • PDF

CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계 (The Design of Multicase Key distribution Protocol based CBT(Core Based Tree))

  • 김봉한;이재광
    • 한국정보처리학회논문지
    • /
    • 제7권4호
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

HFC-CATV 망에서의 충돌해결알고리즘에 대한 성능분석 (Performance Analysis of an Collision Resolution Algorithm in HFC-CATV Network)

  • 이수연;안정희
    • 한국콘텐츠학회논문지
    • /
    • 제2권3호
    • /
    • pp.113-118
    • /
    • 2002
  • HFC(Hybrid Fiber Coax)기반으로 한 CATV망에서 양방향을 제공하기 위해서는 매체접근제어(Medium Access Control)프로토콜이 필요하다. 특히, 가입자에서 헤드앤드로 데이터를 전송하는 상향채널은 500가입자 이상이 공유하기 때문에 충돌이 발생하게 된다. 본 논문은 HFC-CATV망에 적합한 충돌해결알고리즘인 이진 스택 알고리즘의 안정성(stability)을 연구하기 위해 분석 모델을 제안하고 기존 모델과의 시스템 처리율(throughput)을 비교ㆍ분석하였다

  • PDF