• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.03 seconds

Anomaly Removal for Efficient Conformance Test (효율적인 프로토콜 적합성 시험을 위한 변칙성 제거)

  • Lee, Hyeon-Cheol;Heo, Gi-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

The Development of Power System Automation based on the CAN Communication Protocol (CAN 통신을 기반으로한 전력 시스템 자동화 구축)

  • Park, Jong-Chan;Kim, Beung-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.52 no.3
    • /
    • pp.95-99
    • /
    • 2003
  • In this paper, the power system automation based on CAN communication protocol is introduced. Along with digitalization of electrical device, the various on-line services such as remote control, remote monitoring, remote parameter setting, fault data recording and remote diagnostic have been realized and become available. Therefore, it is necessary for those electrical devices to have real-time and reliable communication protocols. Author proposes DNPC(Distributed Network Protocol with CAN) which is proper to the power system SCADA (Supervisory Control And Data Acquisition) and DCS (Distributed Control System). The physical and datalink layer of DNPC protocol consists of the CAN2.0B which has the real-time characteristics and powerful error control scheme. As the transport and application layer, DNP3.0 is adopted because of its flexibility and compatible feature. Using the DNPC protocol, the power system automation is realized.

Transmission Performance Comparison and Analysis with Different Publish/Subscribe Protocol (발행-구독 프로토콜에서 전송 성능의 비교 및 분석)

  • Fan, Zujie;Kim, JaeSoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.77-80
    • /
    • 2020
  • In this paper, we analyze and compare the performance of different publish and subscribe protocols in the real application environment. This paper provides a horizontal comparison of current publish/subscribe protocols in terms of security, throughput, and delay performance. Thanks to the use of lightweight frameworks, the MQTT protocol has demonstrated excellent performance in terms of delay performance. However, the AMQP protocol has more advantages in security and throughput. Although the REST/HTTP protocol has the worst delay performance, it is excellent in terms of compatibility because it is based on the HTTP protocol.

  • PDF

An Ad-hoc Routing Protocol for High-speed Multimedia Traffic Based on Path Quality and Bandwidth Estimation in Wireless Ad Hoc Networks (무선 애드혹 네트워크에서 경로 품질 및 잔여 대역폭 예측에 기반한 고속 멀티미디어 데이터 전송의 라우팅 프로토콜)

  • Shohel, Ahmed Md.;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.203-210
    • /
    • 2013
  • Majority of the wireless ad hoc routing protocols are proposed to find feasible routes without considering the network load, end-to-end link quality and bandwidth requirements of the application. Therefore, protocol may not provide sufficient quality of service (QoS) to a high speed traffic such as multimedia. In this paper, we propose a path-quality and bandwidth-estimation based routing protocol (PBBR) for the high quality multimedia stream that can meet the application's bandwidth requirements and find the best reliable route. The novelty of this protocol is to select a reliable path to respond the application's requirements based on available bandwidth at each intermediate node and end-to-end path loss ratio. Obtained results from the simulation demonstrates that our protocol can achieve sufficient performance in terms of throughput and end-to-end delay.

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

The Device Configuration Protocol with Real-Time Processing for QoS Support over IPv6 (IPv6 상에서 QoS 지원을 위한 실시간 처리용 DCP 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.660-668
    • /
    • 2005
  • Recently, the Internet-based communication method has been adopted as an open networking solution in the field of remote control and data acquisition. In the current Internet, most networking applications are developed according to the client-server approach. In this paper, we propose an innovative Device Configuration Protocol (DCP) that exchanges the traditional role between client and server to provide a uniform device interface over the Internet for various field devices. The proposed protocol is implemented as an application-level protocol running on top of the standard TCP/IP protocols. Also, the DCP protocol is extended with real-time processing to work with the FlowLabel of IPv6 for QoS (Quality of Service) support. The simulation results show that the real-time packets can be processed prior to the given deadline regardless of throughput, as compared to the normal packets.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

VALIDATION AND UTILIZATION OF THE SKINTEXTM SYSTEM

  • Gordon, V.C.;Realica, B.;Tolstrup, K.;Puls, B.
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.17 no.1
    • /
    • pp.64-80
    • /
    • 1991
  • The SKINTEX Method is based on a two-compartment physico-chemical model which includes a Biomembrane Barrier in compartment one and an organized macromolecular matrix in compartment two. Test samples absorb onto or permeate through the keratin/collagen Biomembrane Barrier and then can interact with the organized macromolecular matrix. Changes in the integrity of the barrier release a dye indicator: Changes in the matrix can alter its transparency. The sum of these two responses is read spectrophotometrically at 470nm. An early investigation of 950 chemicals and formulations in the SKINTEX System produced results which were 89% concordance to in vivo Draize dermal irritation results obtained with 24-hour occluded application of test samples with-out abrasion and standard scoring. Alkaline materials were analyzed in a specialized SKINTEX AMA Protocol. In this early study, the model did not distinguish nonirritant test materials and formulation with PDII(Primary Dermal Irritation Index)in the range from 0 to 1.2, A High Sensitivity Assay Protocol(HSA)was developed to amplify the changes in both compartments of this model and provide more accurate calibration of these changes. A study of 60 low irritation test samples including cosmetics, household products, chemicals and petro-chemicals distinguished nonirritants with PDII $\leq$ 0.7 for 26 of 30 nonirritants. A second protocol was developed to evaluate the SKINTEX model predictability with respect to human irritation. The Human Response Assay (HRA )has been optimized based on differences in penetration and irritation responses in humans and rabbits. An additional 32 test materials with different mechanisms and degrees of dermal toxicity were evaluated by the HRA. These in vitro results were 86% concordant to human patch test results. In order to further evaluate this model, a Standard Chemical Labelling (SCL) Protocol was developed to optimize this system to predict Draize dermal irritation results after a 4-hour application of the test material. In a study of 52 chemicals including acids, bases, solvents, salts, surfactants and preservatives, the SCL results demonstrated 85% concordance to Draize results for a 4-hour application of test samples on non-abraded rabbit skin. The SKINTEX System, including three specialized protocols, provided results which demonstrated good correlation to the endpoint of dermal irritation in man and rabbits at different application times.

  • PDF

A Performance Comparative between WAP Service and JAVA Wireless Internet Service (무선 인터넷의 WAP 기반 서비스와 자바 기반 서비스간의 성능 비교)

  • 오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.122-128
    • /
    • 2003
  • There are many development methods to implement wireless internet service. These methods are WAP(Wireless Application Protocol) based services and Java based service WAP based service has been proposed to support limited convenience for user But Java based service can support many convenience and GUI(Graphic User Interface) and easy to use to access for user. This paper will be propose a WAP based application development method and Java based application development method. As an illustrative experiment, WAP based service and Java based service are used to show performance for each systems.

  • PDF

Framework for One Account Log-in From Multi Device On Mobile Application

  • Aulya, Rafinno;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • Many applications require users to log-in, some applications can allow users to use the same account is active on multiple devices at the same time. On location-based application that serves to record the movement of the position, account is active on multiple devices could not be permitted because it causes a different location data from multiple devices, so the location of the users become ambiguous. This paper describes a simple protocol to prevent users from using their accounts on multiple devices at the same time. This Protocol will turn off one account on a device when the account log-in on new devices.