• Title/Summary/Keyword: protocol testing

Search Result 250, Processing Time 0.025 seconds

A Study on the implementation of a Portable Http Live Streaming Transmitter (휴대용 Http 라이브 스트리밍 전송기 구현에 관한 연구)

  • Cho, Tae-Kyung;Lee, Jea-Hee
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.3
    • /
    • pp.206-211
    • /
    • 2014
  • In this Paper, We proposed the HLS(Http Live Streaming) transmitter which is operated easily and cheap in all networks and client environments compared to the exist video live streaming transmitter. We analyzed the HLS protocol and then implemented for making the HLS transmitter cheaper and portable. After designing the HLS transmitter hardware using the RISC processor of Arm11 core, we ported the Linux Operating System and implemented the HLS protocol using the open source FFmpeg and Segmenter. For the performance evaluation of the developed HLS transmitter, we made the testing environment which is including the notebook, iPhone, and aroid Phone. In this testing environment, we analysed the received video data at the client displayer. As a results of the performance evaluation, we could certify that the proposed HLS transmitter has a higher performance than the Apple company's HLS.

Li100A Study on the Usability of WAP Interface in the Philippines

  • Chong, Jazmin N.;Ponio V, Amelia S.
    • Industrial Engineering and Management Systems
    • /
    • v.7 no.1
    • /
    • pp.66-77
    • /
    • 2008
  • The existence of Internet revolutionized the computer and communications world. With the rising demand for accessing the Internet, the mobile technology has incorporated the use of Internet in mobile phones. Wireless Application Protocol (WAP) has combined two of the widest utilized technology today: mobile phones and Internet. This study aims to assess the existing WAP pages offered by the top service providers in the Philippines through usability testing experiments. The paper also aims to identify existing problems in WAP interface by focusing on the errors committed by the users. From the usability study, it was found out that common usability problems are wrong selection of links, unclear grouping of categories, wrong feedback, and redundant links. The type of service provider used is significant in determining the performance of users while experience in accessing WAP is insignificant.

Development of Verification and Conformance Testing Tools for Communication Protocol (통신 프로토콜 검정기 및 적합성시험 도구 개발)

  • Seo Mi-Seon;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1119-1133
    • /
    • 2005
  • As a very important part in development of the protocol, verification and conformance test for protocol specification are complementary techniques that are used to increase the level of confidence in the system functions as prescribed by their specifications. In this paper, we verify the safety and liveness properties of rail signal control protocol type 1 specified in LTS with model checking method, and experimentally prove that it is possible to check for the deadlock, livelock and rechability of the states and actions on LTS. The implemented formal checker is able to verify whether properties expressed in modal logic are true in specifications using modal mu-calculus. We also propose a formal method on generation of conformance test cases using the concept of UIO sequences from verified protocol specification. The suggested tools are implemented by C++ language under Windows NT.

  • PDF

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Network Coding-Based Fault Diagnosis Protocol for Dynamic Networks

  • Jarrah, Hazim;Chong, Peter Han Joo;Sarkar, Nurul I.;Gutierrez, Jairo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1479-1501
    • /
    • 2020
  • Dependable functioning of dynamic networks is essential for delivering ubiquitous services. Faults are the root causes of network outages. The comparison diagnosis model, which automates fault's identification, is one of the leading approaches to attain network dependability. Most of the existing research has focused on stationary networks. Nonetheless, the time-free comparison model imposes no time constraints on the system under considerations, and it suits most of the diagnosis requirements of dynamic networks. This paper presents a novel protocol that diagnoses faulty nodes in diagnosable dynamic networks. The proposed protocol comprises two stages, a testing stage, which uses the time-free comparison model to diagnose faulty neighbour nodes, and a disseminating stage, which leverages a Random Linear Network Coding (RLNC) technique to disseminate the partial view of nodes. We analysed and evaluated the performance of the proposed protocol under various scenarios, considering two metrics: communication overhead and diagnosis time. The simulation results revealed that the proposed protocol diagnoses different types of faults in dynamic networks. Compared with most related protocols, our proposed protocol has very low communication overhead and diagnosis time. These results demonstrated that the proposed protocol is energy-efficient, scalable, and robust.

Framework and Methodology for Interoperability Testing of Software (소프트웨어 상호운영성 시험 체계와 방법론)

  • 강성원;신재휘;성종진;홍경표
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.4
    • /
    • pp.394-402
    • /
    • 2004
  • When two or more entities interact with each other as when they collaborate or communicate, the degree of correctness of the interactions is called interoperability. In software, the necessity of interoperability testing arises when we build a software system in which multiple interacting software entities are employed to perform the function or task of the system. These days as software is more and more being used to solve complex problems and through networking functions of software can be distributed to provide abundant services, the more the interoperability testing becomes important. This paper provides the framework and methodology for interoperability testing by discussing the fundamental concepts and principles that underlie interoperability and interoperability testing and the approaches for practicing interoperability testing.

Fatigue experiments on steel cold-formed panels under a dynamic load protocol

  • Garcia-Palencia, Antonio J.;Godoy, Luis A.
    • Structural Engineering and Mechanics
    • /
    • v.46 no.3
    • /
    • pp.387-402
    • /
    • 2013
  • A dynamic load protocol has been used to experimentally simulate fatigue behavior in cold-formed metal panels with screwed connections under wind loading. The specific protocol adopted is an adaptation of SIDGERS, originally developed for non-metallic membranes, which is composed of levels each under increasing load values. A total of 19 tests were performed on 3.35 m long by 0.91 m wide panels, identified as Type B-wide rib and Type E, both with screw connections at the edge and at the center, thus conforming two-span specimens. In some configurations the panels were fixed at the valleys, whereas crest-fixed connections were also investigated. Reinforcing the connections by means of washers was also investigated to evaluate their efficiency in improving fatigue capacity. The experimental results show maximum load capacities in improved connections with washers of approximately twice of those with classical connections.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.