• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.027 seconds

A Study on the Number Portability Application Protocol over Intelligent Networks (지능망의 번호이동성 응용프로토콜에 관한 연구)

  • Jng, Jong-Whan
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.79-84
    • /
    • 1998
  • This paper studies application protocol for local number portability(LNP) between SSP(Service Switching Point) and SCP(Service Control Point) when users switching from one telecommunication carrier to another in local area. Here, this paper considers that LNP uses CS-1 standard of IN(Intelligent Nework). So, this paper will propose application protocol for LNP when used IN.

  • PDF

Customization Technique of Web Service Protocol based on Android (안드로이드 기반의 웹 서비스 프로토콜 커스터마이제이션 기법)

  • Kim, Chul-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.92-99
    • /
    • 2012
  • According to the scale of mobile applications has been expanded, the high coupled application combined mobile and web service are growing. The growth of mobile application's size means that predicting design for variability should be involved. If mobile application's change is occurred, application should be reinstalled totally. However this reinstallation can raise side-effects in case of high-coupling application. Therefore, this paper proposes a technique of customization for changing web service protocol as the mobile applications are connected with web service in android platform. Proposed protocol customization technique is consist of selection and plug-in technique.

D-channel protocol application for NT2 function with small concentration and it's implementation using general O.S (소규모 집선용 NT2기능에 적합한 D채널 프로토콜 응용 및 이의 범용 O.S에 의한 구현)

  • 김협종;김시원;김재근;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.5
    • /
    • pp.451-465
    • /
    • 1987
  • With the introduction of ISDN network, the D channel protocol has bee defined as a signalling method for ISDN user-network interface. Therefore the NT2(Network Termination 2) which carry out concentration and switching function, must process the D channel related information. This paper describes how the D channel protocoal is applied and implented in a small ISDN subscriber concentrating system that has NT2 functions. The application protocol proposed is addressed taking into consideration the compatibility with ISDN standard facilities, TE(Terminal Equipment) or ET(Exchange Terminator), This protocol has been implementes using a general multitask operating system and it has the features of the minimized information processing and the simpified algorithm which are suitable for a small system. Its application programs are divided into various tasks to facilitate the addition and the modification of function. In this paper, we briefly outline the protocol defined in CCITT and show the application protocol that has fitted in a small concentrating system with NT2 functions. Also we present the experimental results and implementation method of this protocol.

  • PDF

A study on implementation of MAP-MMS protocol (MAP-MMS 프로토콜의 구현에 관한 연구)

  • 고우곤;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.520-523
    • /
    • 1989
  • MAP(Manufacturing Automation Protocol), Network Protocol for FA has 7 Layer Structure of OSI. Being an Application Layer Protocol for Communication Interfaced with the Actual Programmable Devices, MMS(Manufacturing Message Specification) Consists of Three Factors of Services, Interfaces, and Protocol. For Details, It Classifies with the Followings ; Connection/Context Management, Remote Variable Access, Semaphore Management, File transfer and Management, Program UP/DOWN Load, Remote Program Fxecution. In this Paper Designing MAP Network Station of Programmable Device, we Analyze the Protocol of MMS, and Realize the State Diagram of each Services and Propose the Model of MMS Function Call Instructions.

  • PDF

An Implementation of Home network Control Protocol(HnCP) and It's Application to an Intelligent lighting system. (저속 전력선통신 기반의 Home network Control Protocol(HnCP) 구현 및 지능형 조명에의 적용)

  • Kim, Woo-Young;Park, Won-Jang;Jeung, Bum-Jin;Lee, Young-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.403-405
    • /
    • 2004
  • This paper describes an implementation of Home network Control Protocol(HnCP) and it's application to an Intelligent lighting system. The HnCP was announced by korea PLC forum in June 2003 to provide a network protocol for PLC based home appliances. The HnCP master and HnCP slaves were implemented using XPLC30 which is an SOC with ARM9 core. The efficacy of the developed HnCP network modules were shown by applying them to a intelligent lighting system composed of dimmable fluorescent lamps. An extended message set was proposed for the intelligent lighting system and we proposed some directions for the future development of HnCP.

  • PDF

Protocol for Mobile On-line Conents in GVM Development Environment (GVM 개발환경에서 모바일 온라인 컨텐츠를 위한 프로토콜)

  • 김승훈
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.241-250
    • /
    • 2004
  • In this paper, an application layer protocol between sewer and client is proposed for mobile on-line contents in heterogeneous distributed environments. The proposed protocol guarantees the global state consistency in the distributed environments and controls the flow of communication. The protocol reduces the overhead of handsets for flow control and does not need to maintain state information for contents. CPs, by using the proposed sealable protocol, can easily develop their contents as application processes.

  • PDF

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.

Design of RFID Cryptanalysis Strengthening Protocol Using Access Time Interval scheme (접근시간 간격 확인 방식을 이용한 RFID 보안강화 프로토콜 설계)

  • Kim, Seung-Jin;Park, Seok-Cheon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.193-200
    • /
    • 2006
  • RFID technology has been gradually expanding its application areas however studies on personal space infringement along with security are insufficient. This paper proposes a new security protocol access time interval scheme and RSA algorithm to analyze existing RFID security protocol and attempts to solve the problem of lightweight protocol. Information protection for two-way channels can be enforced through the proposed protocol and other issues of sniffing and man-in-the-middle attacks can be solved by applying a mutual certification technique application among tag readers.

  • PDF

A Study on the MMS Protocol for Factory Automation Network (생산자동화 네트워크를 위한 MMS 프로토콜에 관한 연구)

  • 강문식;고우곤;박민용;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.10
    • /
    • pp.774-781
    • /
    • 1991
  • A communication network protocol among programable devices built-i manufacturing field, MAP (Manufacturing Automation Protocol), has to provide the job transfer service carrying out a lot of jobs distributively, and the MMS( manufacturing message specification) defines the above application layer protocol. In this paper user software required in job transfer was implemented. So as to provide each service with compatibility and extension, each module was designed according to the functions. A method is selected in double-assigning their domain and program applicable even in complex process, which loads and proceeds several programs sequentially. In order to confirm the logical validity of the designed protocol, local applying test is accomplished for the application layer of response station. Modelling the job flow process, each serice module is verified with the I/O primitives.

  • PDF

ETRI Protocol Test Architecture and Its Application to CCS Network Service Part Protocols (ETRI 프로토콜 검증구조와 CCS망 서비스부 프로토콜에의 응용)

  • Gang, Yeong-Man;Cheon, Dae-Nyeong;Cha, Yeong-Hwan;Baek, Yeong-Sik;Choe, Yang-Hui
    • ETRI Journal
    • /
    • v.10 no.2
    • /
    • pp.3-12
    • /
    • 1988
  • Several ISDN (Integrated Services Digital Network) protocols have implemented at ETRI (Electronics and Telecommunications Research Institute) in an experimental network so that functional characteristics of the protocols under test could be certified against their protocol specifications with the help of the ETRI protocol test facilities. This paper describes ETRI protocol test architecture and its application to testing the NSP (Network Service Part) protocols : MTP (Message Transfer Part) level 3 and SCCP (Signalling Connection Control Part) of the CCITT CCS (Common Channel Signalling ) system No. 7 The test architecture presented here allows tests for two different protocol classes : peer-to-peer and multipeer protocolos. Some extensions are made to the conventional test architectures, namely the test coordination, test result transfer and network state observation method.

  • PDF