• Title/Summary/Keyword: uIP 프로토콜

Search Result 17, Processing Time 0.027 seconds

Study of Hierarchical Routing Protocol of Suggest to End Node in IP-USN (IP-USN에서 END 노드를 고려한 계층적 라우팅 프로토콜 연구)

  • Park, Jun-Sung;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.802-805
    • /
    • 2007
  • IP-USN은 U-city와 같이 대규모 혹은 모든 전자 장비에 IP기반의 서비스를 지원해줄 중요한 기술이다. IP-USN에서 IP의 할당과 무선 Ad-hoc 라우팅은 IP-USN의 핵심기술로 소형, 전력인 센서네트워크에서 중요고려 대상이다. 본 End 노드를 고려한 계층적 라우팅 프로토콜은 IP 할당 및 메모리를 최소화하는 주소할당 기법과 계층적 라우팅을 제안한다.

  • PDF

네트워크 해킹 공격 대응을 위한 IP Traceback 기술

  • Lee, Hyeong-U
    • Information and Communications Magazine
    • /
    • v.21 no.9
    • /
    • pp.120-131
    • /
    • 2004
  • 본 연구에서는 DDoS/DRDoS 공격과 같이 Zombie 및 Reflector 기반의 네트워크 기반 해킹 공격에 대해 스푸핑된 공격 패킷의 근원지 IP를 역추적 할 수 있는 기술에 대해 분석하였다. 현재까지 제시된 IP 역추적 기법은 크게 패킷을 중심으로 마킹 방법론을 사용한 기법과 ICMP 프로토콜과 같은 프로토콜 등에 대한 변형을 통해 근원지 패킷의 전달 경로 정보를 관리하는 기법 및 네트워크 망 구조 측면에서의 관리 프로토콜을 응용한 방법 등으로 나눌 수 있다. 각각의 기법은 현재의 인터넷 환경에서 적용하였을 경우 DDoS 공격에 대해 장단점을 보이고 있으며 적용 방법 및 해킹 공격의 특성에 따라서 각기 다른 성능을 보인다. 본 연구에서는 지금까지 연구된 IP 역추적 방법론에 대해 고찰과 함께 각 기법을 비교하고 시뮬레이션 방법 등에 대해 제시하며 앞으로 급속도로 확산될 것으로 예상되는 IPv6 기반의 네트워크 공격에 대응하는 방법 등 새로운 역추적 기법에 대해서도 살펴보았다.

IoT based Smart Health Service using Motion Recognition for Human UX/UI (모션인식을 활용한 Human UI/UX를 위한 IoT 기반 스마트 헬스 서비스)

  • Park, Sang-Joo;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.1
    • /
    • pp.6-12
    • /
    • 2017
  • In this paper, we proposed IoT based Smart Health Service using Motion Recognition for Human UX/UI. Until now, sensor networks using M2M-based u-healthcare are using non-IP protocol instead of TCP / IP protocol. However, in order to increase the service utilization and facilitate the management of the IoT-based sensor network, many sensors are required to be connected to the Internet. Therefore, IoT-based smart health service is designed considering network mobility because it is necessary to communicate not only the data measured by sensors but also the Internet. In addition, IoT-based smart health service developed smart health service for motion detection as well as bio information unlike existing healthcare platform. WBAN communications used in u-healthcare typically consist of many networked devices and gateways. The method proposed in this paper can easily cope with dynamic changes even in a wireless environment by using a technology supporting mobility between WBAN sensor nodes, and systematic management is performed through detection of a user's motion.

  • PDF

An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks (이동통신환경에서의 소규모 그룹통신을 위한 XMIP 프로토콜의 구현)

  • PARK IN-SOO;PARK YONG-JIN
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.267-280
    • /
    • 2005
  • In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP's mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.

A Survey on IEEE 802.11 Standardization for Supporting Emergency Services in WLANs (무선랜에서 긴급 서비스 지원을 위한 IEEE 802.11 표준 동향)

  • Lee, Kye-Sang;Jung, Ok-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.456-458
    • /
    • 2010
  • VoIP services are growing fast and WLAN VoIP phones are being used in widespread. Emergency services are very critical in WLAN VoIP as in other traditional networks. This paper summarize recent standards of IEEE 802.11 supporting emergency services in WLANs. Two standards are discussed. The 11u deals with the aspect of access in WLAN emergency services, and the 11v deals with the location services.

  • PDF

Design and Implementation of SIP UA for CPL process (CPL 처리를 위한 SIP UA 확장 설계 및 구현)

  • 이일진;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.758-761
    • /
    • 2002
  • Voice of U(VoIP) technology Provides voice service as well as data service via Internet. It has been a promising technology as Internet grows fast and the requirements are increasing. Recently, serveral protocols have been created to allow telephone calls to be made over IP networks, notably, SIP and H.323. Due to introducing SIP and H.323, There are many change at internet telephony service. Internet telephony enables a wealth of new service possibility Users can control telephony service directly. In this paper, we design and implementation CPL client based on SIP system.

  • PDF

Efficient mutual authentication and key distribution protocol for cdma2000 packet data service (cdma2000 패킷 데이터 서비스를 위한 효율적인 상호 인증과 키 분배 프로토콜)

  • 신상욱;류희수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.107-114
    • /
    • 2003
  • In this paper, we propose an efficient mutual authentication and key distribution protocol for cdma2000 packet data service which uses Mobile U access method with DIAMETER AAA(Authentication, Authorization and Accounting) infrastructure. The proposed scheme provides an efficient mutual authentication between MN(Mobile Node) and AAAH(home AAA server), and a secure session-key distribution among Mobile If entities. The proposed protocol improves the efficiency of DIAMETER AAA and satisfies the security requirements for authentication and key distribution protocol. Also, the key distributed by the proposed scheme can be used to generate keys for packet data security over 1xEV-DO wireless interface, in order to avoid a session hijacking attack for 1xEV-DO packet data service.

An Effective Service Discovery Architecture at Wired/Wireless Networks (유무선 네트워크에서 효율적인 서비스탐색 구조 설계)

  • Seo, Hyun-Gon;Kim, Ki-Hyung;Hong, You-Sik;Lee, U-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.64-75
    • /
    • 2007
  • Service discovery protocols is software components to find specific services or resources on network. The SLP defined by IETF protocol is a framework for automatic service discovery on IP based networks. Automatic service discovery is an important component on ubiquitous computing environment. This paper proposes a service discovery architecture named as SLPA(Service Location Protocol based on AMAAM). AMAAM(Mobility Agent Advertisement Mechanism) is an aggregation-based Mobile IP implementation in MANET. In SLPA, the role of the directory agent is assigned to the mobility agent in AMAAM. The mobility agent periodically beacons an advertisement message which contains both the advertisement of the directory agent in SLP and the advertisement of the mobility agent in Mobile IP. For evaluating the functional correctness of SLPA and the overhead of maintaining a service directory of SLPA. We simulate SLPA using ns-2 and analyze the overhead of control overheads for the aggregation. Through the simulation experiments we show the functional correctness of the proposed architecture and analyze the performance results.

A Comparative Study of IP Mobility Protocols : Fast Handover vs. Mobile IPv6 (IP 이동성 지원 프로토콜에 대한 비교 연구: Fast Handover 대 Mobile IPv6)

  • 백상헌;최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6A
    • /
    • pp.651-659
    • /
    • 2004
  • The Fast Handover protocol [1] provides seameless handover in wireless If networks by minimizing handover latency, which uses anticipation based on layer 2 (L2) trigger information. Therefore, it incurs higher signaling costs compared with the basic Mobile U protocol. Furthermore, since the L2 trigger is based on fluctuating wireless channel states, the handover anticipation may sometimes be incorrect. In the case of incorrect anticipation, unnecessary buffer space may be used for the purpose of providing a smooth handover. Therefore, it is essentical to analyze these overhead costs, in order to evaluate and compare the performance of Fast Handover with that of the basic Mobile U protocol. In this paper, we analyzed the overhead associated with Fast Handover including the signaling cost and the packet delivery cost. We formulated these costs based on a timing diagram and compared Fast Handover with basic Mobile Ipv6 in terms of their packet loss rates and buffer requirements. Also, we studied the impact of the L2 triggering time on the total overhead cost.

Development of Communication Interface Based on Vl Architecture (VIA기반의 통신 인터페이스 개발)

  • 이상기;이윤영;서대화
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.85-87
    • /
    • 2001
  • 하드웨어와 소프트웨어의 발전과 함께 컴퓨터에서 처리 해야 할 데이터량이 크게 증가하고 있다. 클러스터 내의 node들 사이에서 이런 대용량의 데이터들을 보다 빠르게 전송하기 위해서 Lightweight Messaging 기법이 등장하였으며, 대표적으로 AM, FM, U-Net, VIA등이 있다. 이 중에서 VIA는 커널 수준에서 구현된 TCP/IP를 대신해서 사용자 수준에서 커널을 거치지 않고 네트워크 장치와 직접적으로 통신을 할 수 있게 하여 다양한 분야에서 사용되고 있으며, 새로운 프로토콜의 표준으로 자리를 잡아가고 있다. 그러나 이러한 장점에도 불구하고 프로그래밍의 난이성 때문에 제대로 숙지하기 가지는 많은 시간의 투자가 필요한 것이 사실이다. 이에 이 논문에서는 EVIL(Easy-to-use Virtual Interface Library)이라는, 개발자들이 좀더 쉽게 접근할 수 있는 라이브러리를 제안하였다 그리고 EVIL. Native VIA TCP/IP로 각각 같은 역할을 하는 프로그램을 작성하여 기존의 프로토콜들과 성능을 비교하였다.

  • PDF