• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.026 seconds

Transmission Performance of Voice Traffic over LTE-R Network (LTE-R 네트워크에서 음성트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.568-570
    • /
    • 2018
  • Currently, with rapid progress and supply of mobile communication technology, LTE(Long Term Evolution) technology is expanded and widely used to industrial and emergency communications beyond earlier smart-phone based service. In this paper, transmission performance of voice traffic, one of railway communication service based on LTE-R as an application field of LTE technology, is analyzed. This study is performed performance analysis with level of application service and consider effects of satisfaction level for users. Computer Simulation based on ns(Network Simulation)-3 is used for analysis and VoIP(Voice over Internet Protocol) specification is used for voice traffics. Results of this paper is used to implement LTE-R networks and develope application services over LTE-R network.

  • PDF

Circuit Design of Frquency Hopping Wireless LAN PLCP Sublayer (주파수 호핑방식 무선 LAN의 PLCP 계층 회로 설계)

  • 최해욱;김경수;기장근;조현묵
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.1941-1951
    • /
    • 1998
  • In this paper, hardware circuit that performs functions of IEEE 802.11 wireless LAN frequency hopping PLCP protocol is designed using 0.8 um CMOS cmn8a technology of the COMPASS. Transmission rate of the designed hardware is 1Mbps. The designed circuit have about 6300 gates and $2.5{\times}2.5mm^2$ area. In order to verify the circuit, two PLCP circuits are interconnected and frames are transmitted from one PLCP circuit to the other PLCP circuit. As a results of the simulation, we conclude that the designed PLCP circuit works well as the IEEE 802.11 standard specification.

  • PDF

A Study on Timing Modeling and Response Time Analysis in LIN Based Network System (LIN 프로토콜 시간 모델링 및 메시지 응답 시간 해석에 관한 연구)

  • Youn, Jea-Myoung;Sunwoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, a mathematical model and a simulation method for the response time analysis of Local Interconnect Network(LIN) based network systems are proposed. Network-induced delays in a network based control system can vary widely according to the transmission time of message and the overhead time of transmission. Therefore, in order to design a distributed control system using LIN network, a method to predict and verify the timing behavior of LIN protocol is required at the network design phase. Furthermore, a simulation environment based on a timing model of LIN protocol is beneficial to predict the timing behavior of LIN. The model equation is formulated with six timing parameters deduced from timing properties of LIN specification. Additionally, LIN conformance test equations to verify LIN device driver are derived with timing constraints of the parameters. The proposed model equation and simulation method are validated with a result that is measured at real LIN based network system.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Method of Digital Signature Using FIDO2 CTAP (FIDO2 CTAP을 활용한 전자서명 방법)

  • Cho, Han-koo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1049-1062
    • /
    • 2019
  • The national accredited certificate is a user certificate issued based on the user's personal information, which has been identified in advance, and has become a universal authentication method used for most electronic financial transactions and user authentication. And it contributed a lot to the use of e-government and domestic service. However, due to the lack of web standards on how to use, it was inconvenient to install a separate plug-in, and efforts to improve it have been continued. In this paper, we attempt to solve the problem of certificate usage environment by presenting the certificate digital signature method using the extension of the FIDO2 (Fast Identity Online v2) client to authentication protocol (CTAP) specification.

Gen-Z memory pool system implementation and performance measurement

  • Kwon, Won-ok;Sok, Song-Woo;Park, Chan-ho;Oh, Myeong-Hoon;Hong, Seokbin
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.450-461
    • /
    • 2022
  • The Gen-Z protocol is a memory semantic protocol between the memory and CPU used in computer architectures with large memory pools. This study presents the implementation of the Gen-Z hardware system configured using Gen-Z specification 1.0 and reports its performance. A hardware prototype of a DDR4 Gen-Z memory pool with an optimized character, a block device driver, and a file system for the Gen-Z hardware was designed. The Gen-Z IP was targeted to the FPGA, and a 512 GB Gen-Z memory pool was configured on an ×86 server. In the experiments, the latency and throughput of the Gen-Z memory were measured and compared with those of the local memory, SATA SSD, and NVMe using character or block device interfaces. The Gen-Z hardware exhibited superior throughput and latency performance compared with SATA SSD and NVMe at block sizes under 4 kB. The MySQL and File IO benchmark of Gen-Z showed good write performance in all block sizes and threads. Besides, it showed low latency in RocksDB's fillseq dbbench using the ext4 direct access filesystem.

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

An Implementation of H.283 Remote Device Control in H.323 (H.323에서 운용되는 H.283 원격기기제어의 구현)

  • 성동수;이건배
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.239-248
    • /
    • 2002
  • International Standard Organizations such as ITU(International Telecommunication Union) and IETF (Internet Engineering Task Force) are proceeding standardization for various applications and protocols to provide video-conference and multimedia conference services on a variety of networks. Remote device control among these protocols is provided with various capabilities as well as device control to multimedia conference. This protocol for remote device control is standardizing as H.282 recommendation which is specified as core service for the configuration and control of remote device to multimedia conference. The H.282 recommendation does not specify the use of a particular transport protocol. That is, T.120 multimedia conference uses T.136 and H.323 video conference uses H.283 for the transport of H.282 protocol. The introduced system in this paper is based on H.282 and is implemented to be capable of remote device control within the framework of H.323 using H.283. Also, it is shown that a variety of services in the specification of the standard are satisfied through experiments.

  • PDF

A Study on Multi-Channel Multi-Interface MAC Protocols for Mesh Networks (Mesh Networks을 위한 다중채널 다중인터페이스 MAC 프로토콜에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1465-1470
    • /
    • 2011
  • In this paper, we propose a new MAC protocol, namely DM-MMAC (Doze Mode Multi-Channel MAC) for ad hoe wireless networks which can utilize multiple channels effectively, thereby enhancing the network throughput considerably. Basically, the IEEE 802.11 specification allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a single channel with the fatal drawback, so called multi-channel hidden terminal problem in multi-channel environments. In this vein, several multi-channel MAC protocols have been proposed, but most of them demonstrate the performance problem that its throughput drastically decreases as the number of mobile hosts residing in a given network increases with small number of available channels. In this work, we tried to improve the performance of multi-channel MAC protocols in terms of network throughput as well as power saving effects by simplifying the channel assignment and channel capturing procedures and reducing the possibility of collisions between mobile hosts.

On the Generation of Synchronizable Conformance Test Sequences Using the Duplex Digraph and Distinguishing Sequences (이중 방향그래프와 구별시퀀스를 이용한 동기적 적합시험 항목의 생성)

  • Kim, Chul;Song, Joo-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.241-249
    • /
    • 1997
  • In this paper, a new technique is proposed for generating a minimum-length synchronizable test sequence that can be applied in the distributed test architecture where both external synchtonization and input/output operation costs are taken into consideration. the method defines a set of transformation rules that constructs a duplex digraph from a given finite state machine representation of a protocol specification rules that constructs a duplex digraph from a given finite state machine representation of a protocol specificatio such that a rural chinese postman tour of the duplex digraph can be used to generate a minimum-length synchronizable test sequence using synchronizable distinguishing sequences as the state identification sequence for each state of the given finite state machine. The method provides an elegant solution to the synchronization problem that arises during the application of a predetermined test sequence in some protocol test architectures that utilize remote testers.

  • PDF