• Title/Summary/Keyword: protocol model

Search Result 1,379, Processing Time 0.035 seconds

A performance analysis of a DTN routing protocol in the working day movement using a taxi movement model (택시 이동 모델을 사용한 근무일 이동에서 DTN 라우팅 프로토콜의 성능 분석)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.265-270
    • /
    • 2014
  • The working-day movement model, which implemented in the ONE simulator, supports the environments similar to the real life by using the transportation. However, there is no taxi movement model in the working-day movement model. So, we implemented a taxi movement model in the ONE simulator as the previous work. It is changed significantly for the simulation results of routing protocols in the ONE simulator. In this paper, we analyze the performance evaluation of the DTN routing protocol such as an epidemic routing protocol using our taxi movement model in the ONE simulator.

Connection Control Protocol and Parallel Interworking Model for the VB5.2 Interface (VB5.2 인터페이스를 위한 연결 제어 프로토콜과 병렬형 연동 모델)

  • 차영욱;김춘희;한기준
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.2
    • /
    • pp.22-31
    • /
    • 2000
  • The VB5.2 interface of B-lSDN, that is located between an access network and a service node, allows dynamic allocation and release of ATM resources. In this paper, we propose the B-ANCC protocol of the VB5.2 interface to minimize the overall connection setup delay by introducing the access network. The B-ANCC protocol enhances the B-BCC protocol and adopts a parallel interworking function with signaling protocols in the service node. To confirm the correctness of the proposed B-ANCC protocol, we validate it using the automated validation tool, SPIN. We analyze and simulate the sequential interworking model based on the B-BCC protocol and the parallel interworking model based on the B-ANCC protocol, in terms of a connection setup delay and a completion ratio. It is shown that our proposed parallel interworking model with B-ANCC reduces a setup delay and improves a completion ratio compared to the sequential interworking model with B-BCC.

  • PDF

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.

Design and Implementation of NNI Interworking Protocol of OBP Satellite B-ISDN

  • Park, Seok-Cheon;Kang, Sung-Young;Kim, Jung-Hoon;Nam, Ki-Mo;Park, Jae-Kyun;Seo, Dong-Woon
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.719-722
    • /
    • 2000
  • It is essential to develop the internetworking strategies between the OBP satellite B-ISDN and the terrestrial B-ISDN for the economical and efficient implementation of the future network infrastructure. We have considered the implementation issues of the emerging B-ISDN, especially interworking strategies of the terrestrial B-ISDN with the OBP satellite B-ISBN. We proposed interworking model between terrestrial B-ISDN and OBP satellite B-ISDN NNI signaling protocol, and describes the design and verification of the interworking protocol. For the verification, interworking protocol is modeled by Predicate/Action Net derived from Petri Net and the designed model is analyzed by reachability tree. Using Unix socket, the verified interworking protocol is implemented in two workstations and implemented interworking protocol is tested by local test method which is outstanding in error detection and recommended by ISO.

  • PDF

A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds

  • Teng, Jikai;Wu, Chuankun
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.104-110
    • /
    • 2012
  • Group key agreement protocols allow a group of users, communicating over a public network, to establish a shared secret key to achieve a cryptographic goal. Protocols based on certificateless public key cryptography (CL-PKC) are preferred since CL-PKC does not need certificates to guarantee the authenticity of public keys and does not suffer from key escrow of identity-based cryptography. Most previous certificateless group key agreement protocols deploy signature schemes to achieve authentication and do not have constant rounds. No security model has been presented for group key agreement protocols based on CL-PKC. This paper presents a security model for a certificateless group key agreement protocol and proposes a constant-round group key agreement protocol based on CL-PKC. The proposed protocol does not involve any signature scheme, which increases the efficiency of the protocol. It is formally proven that the proposed protocol provides strong AKE-security and tolerates up to $n$-2 malicious insiders for weak MA-security. The protocol also resists key control attack under a weak corruption model.

A study on implementation of MAP-MMS protocol (MAP-MMS 프로토콜의 구현에 관한 연구)

  • 고우곤;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.520-523
    • /
    • 1989
  • MAP(Manufacturing Automation Protocol), Network Protocol for FA has 7 Layer Structure of OSI. Being an Application Layer Protocol for Communication Interfaced with the Actual Programmable Devices, MMS(Manufacturing Message Specification) Consists of Three Factors of Services, Interfaces, and Protocol. For Details, It Classifies with the Followings ; Connection/Context Management, Remote Variable Access, Semaphore Management, File transfer and Management, Program UP/DOWN Load, Remote Program Fxecution. In this Paper Designing MAP Network Station of Programmable Device, we Analyze the Protocol of MMS, and Realize the State Diagram of each Services and Propose the Model of MMS Function Call Instructions.

  • PDF

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

A Traffic Model based on the Differentiated Service Routing Protocol (차별화된 서비스제공을 위한 트래픽 모델)

  • 인치형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.947-956
    • /
    • 2003
  • The current IP Routing Protocolspacket networks also need to provide the network QoS based of DiffServ, RSVP, MPLStraffic model which is standardized as IETF reference model for NGN. The first topic of this paper is to propose Traffic-Balanced Routing Protocol(TBRP) to process existing best effort traffic. TBRP will process low priority interactive data and background data which is not sensitive to dealy. Secondly Hierarchical Traffic-Traffic-Scheduling Routing Protocol(HTSRP) is also proposed. HTSRP is the hierarchical routing algorithm for backbone and access networkin case of fixed-wireless convergence network. Finally, HTSRP_Q is proposed to meet the QoS requirement when user want interactive or streaming packet service. This protocol will maximize the usage of resources of access layer based on the QoS parameters and process delay-sensitive traffic. Service classes are categorized into 5 types by the user request, such as conversational, streaming, high priority interactive, low priority interactive, and background class. It could be processed efficiently by the routing protocolstraffic model proposed in this paper. The proposed routing protocolstraffic model provides the increase of efficiency and stability of the next generation network thanks to the routing according to the characteristic of the specialized service categories.

Performance Analysis of Interworking Model for a Broadband Access Network with VB5.2 Interface (광대역 액세스 망의 VB5.2 인터페이스를 위한 연동 모델의 성능분석)

  • Kim, Choon-Hee;Cha, Young-Wook;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.237-246
    • /
    • 2000
  • A broadband access network in B-ISDN subscriber network, plays a role of concentration or multiplexing of various subscribers into a service node. For call and connection control functions, DSS2 and B-ISUP signalling protocols are standardized for each of a subscriber side and a network node. B-BCC and B-ANCC protocol were proposed for VB5.2 interface. This interface allows dynamic control of ATM connections at the broadband access network. To establish an end-to-end ATM connection, interworking functions between VB5.2 interface's connection control protocol and the signalling protocol, are performed at the service node. A sequential interworking model and a parallel interworking model were proposed for these interworking functions. The sequential interworking model recommended by ITU-T causes an overall connection setup delay by introducing the access network, because this model proceeds the signalling protocol of network node after the response of VB5.2 interface protocol. On the other hand, the parallel interworking model proceeds the signalling protocol and the VB5.2 interface protocol simultaneously. The simultaneity of the parallel interworking model minimizes the overall connection setup delay. In this paper, we analyze and simulate above two interworking models with B-BCC or B-ANCC protocol in terms of a connection setup delay and completion ratio.

  • PDF

Fast Network based Localized Mobility Management protocol using Media Independent Handover Services (MIH 서비스를 이용한 고속 NetLMM 프로토콜)

  • Park, Si-Hyun;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.35-43
    • /
    • 2006
  • In this paper we have presented a network based high-speed handover protocol using NetLMM(Network based Localized Mobility Management) WG protocol in IETF(Internet Engineering Task Force). We use IEEE 802.21 MIHS(Media Independent Handover Services) for improving handover latency and we analysis proposed Fast NetLMM protocol performance using Fluid Flow Mobility Model. Evaluation results show that the Fast NetLMM protocol performance is better than other mobility management protocols.