• Title/Summary/Keyword: Application protocol

Search Result 1,509, Processing Time 0.038 seconds

AIN Protocol conformance test Suite Generation Using Formal Methods (지능망 교환기에 대한 INAP 적합성 시험 스위트 개발 및 검증)

  • Do, Hyeon-Suk;Bae, Seong-Yong;Kim, Sang-Gi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.741-750
    • /
    • 1998
  • 본 논문에서는 형식 기법을 이용하여 차세대 지능망 응용 프로토콜(INAP:Intelligent Network Application Protocool)적합성 시험 스위트를 생성하는 방법 및 IUT(Implenentation Under Test)시뮬레이터를 구축하여 시험을 수행함으로써 시험 스위트를 검증하는 방법에 관해 기술한다. SDL(Specification and Description Language)과 같은 형식 언어를 사용하여 INAP FSM(Finite State Machine)을 모델링하고 MSC(Message Sequence Chart)로 시험 목적을 기술한다. 기술된 FSM모델과 시험 목적을 검증하기 위해 모의 시험을 거치며, 검증이 완료된 후 시험 스위트로 변환이 된다. 형식 기법을 이용하여 INAP규격을 정확하게 기술할 수 있을 뿐 아니라 시험 스위트를 자동으로 생성함으로써 시간과 비용을 절감할 수 있다. 또한 생성된 시험 스위트를 시험기에 탑재하여 IUT시뮬레이터를 대상으로 시험을 수행함으로써 시험 스위트를 검증할 수 있는 방안을 제시하였다.

  • PDF

The Remote Access Algorithm by Object Replication (객체 복제 기법에 의한 원격 접근 알고리즘)

  • Yun, Dong-Sik;Lee, Byeong-Gwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.799-807
    • /
    • 2000
  • In this paper, object replication Client/server under distributed computing system is design and implementation. Today many end-users have a computer communication by using internet in the distributed system of client/server. If many users request services to a specific remote server, the server should have got a overhead for hat service processing, delayed the speed for replay, and bring a bottleneck in communication network. Therefore object replication method was proposed to solve this problems. The growth of internet works and distributed applications has increased the need for large scale replicated systems. However, existing replication protocols do not address scale and autonomy issues adequately. Further, current application protocol require consistency of different levels, and therefore should be the selection function of consistency in them, in order to have particular semantics of each level. In this paper, server overhead and bottleneck happening in remote procedure call be using server object replication. Therefore access transparency can be improved by sharing object duplicately. So it will Keep up with the consistency within the replicated objects.

  • PDF

A study on the application for the mobile VPN using password-based authentication Protocol (패스워드 기반 인증 프로토콜의 무선 VPN 적용에 관한 연구)

  • 김현택;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.718-720
    • /
    • 2003
  • 근래 휴대폰과 PDA등의 대중적인 보급과 동시에 기업체의 유무선 VPN 구축도 활기를 띄고 있다. 유선환경에서의 VPN은 보안적인 측면에서 무선환경보다 비교적 안전하다고 할 수 있다. 그러나 무선환경은 유선환경과 달리 능동적인 공격자뿐만 아니라 수동적인 공격자에 비해서도 보안상 취약한 면을 가지고 있다. 또한 무선 VPN에서 사용하는 단말기인 PDA, 휴대폰 등의 하드웨어적 제약 또한 우선 VPN 구축시 반드시 고려하여야 한다. 따라서 본 논문에서는 이러한 무선환경에서의 하드웨어적 제약 밀 보안 취약성을 보완할 수 있도록 패스워드 기반 인증 프로토콜을 무선 VPN에 적용하고자 한다.

  • PDF

Development of Network remote Control System using Ethernet (Ethernet을 이용한 네트워크 원격 컨트롤 시스템 개발)

  • Kim, Yi-Cheal;Lee, Jea-Ho;Lee, Jong-Sung;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2140-2142
    • /
    • 2003
  • Recently, TCP/IP on Ethernet protocol is in use environment of LAN have developed a single chip by hardware. Therefore, the study about the single chip applies to the system control application like information electronic appliances, manufacturing automation machine has been made progress. This paper is the development of experimental Client node and Serve node that can transfer input-output data needed on Network Control System Client node is a sensor part of control system, that is, an analog signal is applicable to output data convert AD through LAN. Server node data sended in client convert DA, and then it is applicable to driver of Control System, so it achieves its part. In this study, is prove that using TCP/IP construct Network Control System.

  • PDF

Application of the SCGE Assay for Detecting Induced DNA Damage in Plant Leaves

  • Kim, Jin Kyu;Song, Hi Sup;Kim, Do Young;Gichner, Tomas
    • Proceedings of the Korea Society of Environmental Biology Conference
    • /
    • 2003.11a
    • /
    • pp.68-73
    • /
    • 2003
  • The possibility of using the alkaline protocol of the single cell gel electrophoresis (SCGE) assay as a method for detecting induced DNA damage has been studied for six major plants. The EMS was applied as a model genotoxic agent on young excised leaves of the tested crops for 18 h at 26$^{\circ}C$ in the dark. With increasing concentrations of 0 to 10 mM EMS, the DNA damage, expressed by the averaged median tail moment values, significantly increased in nuclei of all plants studied. As the results, no correlation between the diameter of nuclei and sensitivity to EMS treatment was observed. The data obtained demonstrate the feasibility of using the SCGE assay for detecting induced DNA damage in plants.

  • PDF

A Study on the Cooperation Methodology between R&D and Subsidy Policies in NRE Using Diffusion Models (확산모형을 이용한 신재생에너지의 기술개발과 보급정책의 연계방안 연구)

  • Hwang, Sung-Wook;Kim, Jung-Woo;Won, Jong-Ryul;Chun, Yeong-Han;Kim, Jung-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.786-787
    • /
    • 2007
  • Nowadays the concern about development and diffusion strategies of new & renewable energy and its technologies is getting higher globally as Kyoto Protocol has taken effect this year and oil has been rising in price tremendously. Developed countries have already commenced the study and research for this problem and are looking for various solutions. In this paper, R&D environments and diffusion status solar thermal energy in the United States are analyzed and the probability of application into Korea case is observed. To achieve this observation, correlations between US case and Korea case is estimated and the variation of duration and amounts in R&D and the R&D contribution to national economic growth are considered.

  • PDF

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

An Implementation of EMV Specifications for Smartcard Terminals (스마트 카드 터미널를 위한 EMV Specification의 구현)

  • Park, Chang-Hyeon;Doo, Myung-Taek;Lee, Baek-Soon;Kwon, Oh-kyu
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.429-440
    • /
    • 2002
  • Smartcard is a kind of computing device with it's own processor and memory Thus, the international money market is going to accomodate the use of smartcards instead of traditional magnetic cards for the future money market. EMV is a standard protocol for smartcards, proposed by Europay, Mastercard, and Visa, which are three famous international settlement organizations. This paper presents the implementation of EMV specifications for the smartcard terminals for supporting various application programs. This paper shows that the implemented EMV terminal passes the international approval tests.

Design and Implementation of WAP Based Server Management System (WAP기반 서버 관리 시스템의 설계 및 구현)

  • Choi, Won-Seok;Ahn, Seong-Jin;Chung, Jin-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1479-1482
    • /
    • 2002
  • 급격한 인터넷의 발달로 인해 네트워크와 시스템들은 더욱 복잡해져 가고 이에 대한 관리가 필요하게 되었다. 기존 웹 상에서의 시스템관리는 인터넷이 연결된 컴퓨터에서만 가능하기 때문에 상당한 제약이 따랐다. 그러나 무선 인터넷 기술의 급속한 발달은 무선 인터넷상의 휴대단말기를 이용하여 시스템을 관리할 수 있는 여건을 제공하게 되었다. 이러한 서비스의 기반이 되는 것은 무선 인터넷 프로토콜인 WAP(Wireless Application Protocol)이다. 본 논문에서는 WAP 기술을 통해 시스템 관리자가 무선 인터넷으로 시스템 관리하는 기능을 설계 및 구현하였다.

  • PDF

IEC 61850 Application in Distribution Automation System (배전자동화 시스템에 IEC 61850 적용 방안)

  • Kim, Taw-Wan;Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae;Kwon, Sung-Chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.4
    • /
    • pp.687-693
    • /
    • 2011
  • In this paper, problems and solutions are proposed for applying IEC 61850 to Distribution Automation System(DAS). Communication protocol integration in power automation system have issued by IEC standards, IEC 61850 of them has researched for applying IEC 61850 to many areas of power system in spite of that it was made for substation automation system. Especially, DAS is just about to apply IEC 61850 by communication network change from serial to ethernet although DNP 3.0 is used. But it's impossible to apply directly IEC 61850 to DAS by difference of environment which unfixed wide area and separated nodes in power distribution system unlike concept of IEC 61850 is made by Substation Automation System(SAS) environment of limited space. Thus, this paper proposed applications of three types which conceptual, practical, and future to consider problems and solutions when apply IEC 61850 to Ethernet based DAS.