• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.029 seconds

Fault coverage evaluation method of test case for communcation protocol (통신 프로토콜 시험항목의 오류 발견 능력 평가 방법)

  • 김광현;허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.8
    • /
    • pp.1948-1957
    • /
    • 1996
  • The conformance testing of communication protocol is the process to evaluate whether the protocol implemented is identified with standard specification. By evaluating how generated test cases detect many faults, it can be used with standard estimating efficiency of conformance testing. The method that evaluates the capability of fault coverage for test cases, has been researched by mathematical analysis and simulation. In this paper, we pointed out the problem of existing method and proposed new evaluation model of fault covergage for test case which generated by foult model. Also, we analyzed the results comparing to the existing evaluation method and proved its validity.

  • PDF

An Analysis of Network-Based Control System Using CAN(Controller Area Network) Protocol (CAN 프로토콜을 이용한 네트워크 기반 제어 시스템의 구조 분석)

  • 전종만;김대원;김홍석;조영조
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.549-549
    • /
    • 2000
  • In the previous work, we dealt with a traffic analysis of network-based control system and its architecture using the CAN protocol. It is difficult to determine an optimal network architecture for a specific system. In this paper, we propose the architecture of network-based control system applicable to a specific AGV system with manipulator arms. We define the fixed number of periodic messages to be occurred in this system. In the proposed system architecture, we analyse its traffic for the real-time communication of all messages, determine the optimal sampling period of an analog sensor to be satisfied with the required specification and the number of possible sensors to be added through simulation.

  • PDF

how to analyse protocol of OBCS' peripheral devices in KTX (KTX OBCS 하부장치 프로토콜 분석방법)

  • Jung, Sung-Youn;Kim, Hyung-In;Kang, Ki-Sok;Kim, Hyun-Sik;Jung, Do-Won
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1198-1206
    • /
    • 2009
  • Peripheral devices of OBCS in kyeongbu KTX serve various function. those services operate to make sure the safety of trains by displaying some malfunction signs of system and help maintain them appropriately. and they also provide various services for passengers in KTX. They divide into TECA which supports drivers with various data, PID which displays where to go, FDTR, HVAC, MDT etc. To develop superannuated devices, maintain and check its malfunction., we need to analyse hardware specification, OBCS and also protocol for communication devices simultaneously. here, we're trying to find how to find efficient approach by using a protocol analyser properly. We're going to develop peripheral devices to elevate and improve maintenance functions by collecting, compiling data.

  • PDF

An Implementation of the Wireless Transaction Protocol Prototype using SDT (SDT를 이용한 무선 트랜잭션 프로토콜의 프로토타입 구현)

  • 정호원;오연주;최윤석;임경식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.349-351
    • /
    • 2000
  • 정보통신 분야의 급격한 발달은 다양한 프로토콜을 지원하는 통신 시스템의 개발 주기를 더욱 빠르게 하고 있다. 따라서, 소프트웨어 개발자들은 공식적인 규격에 따른 소프트웨어의 설계와 실제 구현단계 이전에 프로토타입의 구현을 통해 시스템의 요구사항 분석 및 문제점을 조기에 발견하고, 소프트웨어의 개발 주기를 단축시키며, 한편으로는 개발공정의 체계적 관리를 필요로 하게 되었다. 본 논문에서는 이에 대한 실질적인 해결방안을 제시하기 위해 통신 시스템의 명세서 작성 및 설계를 위한 표준화된 언어인 SDL(Specification and Description Language)을 이용해 WAP(Wireless Application Protocol)의 WTP (Wireless Transaction Protocol)를 설계하고, Telelogic사의 SDT를 이용하여 실행코드를 만들어 리눅스상에서 실제로 실행 가능한 프로토타입을 구현하였다.

  • PDF

Investigation of CDMA Air Interface and Protocols

  • Kim, Sun-Young;Song, Pyeong-Jung;Kim, Jin-Up;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.303-315
    • /
    • 1997
  • This appendix deals with the Korean air interface standard, TTA-62, for CDMA Mobile Systems, (CMS) [1]-[2]. The standard has been set up by Telecommunications Technology Association (TTA) which is a standardization organization in Korea [3]. This standard is an important specification that should be determined prior to the development of a digital cellular system. The CMS has been developed on the basis of this standard and the papers published in this special issue are the results of the CMS development. This appendix also describes the technical commonality of these papers. It covers the outline of the air interface and protocol specifications. The outline includes its major characteristics, radio protocol architecture, functionalties, and call processing. A comparison is also given between TTA-62 and IS-95[4], a North American digital cellular standard.

  • PDF

A Nondeterminism Removal Algorithm for Efficient Testing of Communication Protocols (효율적인 통신프로토콜 시험을 위한 비결정성 제거 알고리즘)

  • 허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.10
    • /
    • pp.1572-1581
    • /
    • 1993
  • DFSM(Deterministic Finite State Machine) is used because it easily represents the control flow of a protocol in the protocol specification. Real protocols contain problem of nondeterminisms that have more than one enabled transition in the same state by same input. But DFSM does not process nondeterminism. So, in this paper, we first specify a protocol with NFSM (Nonderministic FSM) that may show the characteristics of nondeterminism, and propose an algorithm which converts NFSM to DFSM.

  • PDF

Implementation of Extracting Specific Information by Sniffing Voice Packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.209-214
    • /
    • 2020
  • VoIP technology has been widely used for exchanging voice or image data through IP networks. VoIP technology, often called Internet Telephony, sends and receives voice data over the RTP protocol during the session. However, there is an exposition risk in the voice data in VoIP using the RTP protocol, where the RTP protocol does not have a specification for encryption of the original data. We implement programs that can extract meaningful information from the user's dialogue. The meaningful information means the information that the program user wants to obtain. In order to do that, our implementation has two parts. One is the client part, which inputs the keyword of the information that the user wants to obtain, and the other is the server part, which sniffs and performs the speech recognition process. We use the Google Speech API from Google Cloud, which uses machine learning in the speech recognition process. Finally, we discuss the usability and the limitations of the implementation with the example.

Development of RFID Middleware with Business Process Logic Representation Capability (비즈니스 프로세스 로직 표현을 지원하는 RFID 미들웨어 개발)

  • Park, Chul-Soon;Bae, Sung-Moon;Lu, Gao
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.80-89
    • /
    • 2008
  • Because of different hardware specifications, there are no unified protocol commands to use with various kinds of RFID readers. The current commercial RFID middlewares do not satisfy the various requirements from users to support business process logic representation. The EPCglobal, which is leading organization for the RFID research, suggested a RFID middleware architecture which is called ALE(Application Level Events) standard. However, their architecture also does not provide the application level's interfaces. Therefore, a new RFID middleware architecture is required to provide basic RFID functions, conform to ALE's specification and, additionally, support application level's business logic representation. This paper proposes a ALE-based RFID middleware architecture which provides business process logic representation. At first, the basic RFID control functionalities are identified. Secondly, the business process logic requirements in RFID applications are identified and classified Into six categories. Third, the Middelware architecture is implemented with Java and XML technology so that it can easily extended to support the various RFID hardware's protocols. Finally, an example RFID prototype system is developed to show the proposed architecture's feasibility and validate it. The proposed middleware is expected to be used In various application areas since it is using XML technology for easy adaptation and it also con- forms to ALE interface which is standard specification.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.