• Title/Summary/Keyword: Communication protocol design

Search Result 962, Processing Time 0.026 seconds

An Approach of Presenting NAVTEX message on Mobile Device using ee-INS (ee-INS를 이용한 육상안전정보시스템과의 연계를 고려한 선내 응용 미들웨어 개념 설계)

  • Lee, Seo-Jeong;Lee, Jae-Wook;Kim, Hyo-Seung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.10a
    • /
    • pp.123-124
    • /
    • 2012
  • Over the past decades, information and communication service providing safe and efficient navigation have been tried in maritime area. However, there were provided different ways such as different protocol or different policy. It made hard to serve efficiently. The introduction of MSI as a part of e-navigation development can be a kind of concepts to solve this problem. This paper tries to suggest a conceptual design of onboard application middleware to be able to communicate the shore-side maritime safety information system, take into account the reuse of open-source software.

  • PDF

Design of Bandwidth Measurement based Scheduler for Improving MPTCP Performance in Bufferbloat Environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 대역폭 측정 기반 스케줄러 설계)

  • Kim, Min Sub;Han, Ki Moon;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1508-1516
    • /
    • 2017
  • Multipath TCP (MPTCP) is a transport layer protocol that supports multipath transmission. If a bufferbloat occurs in one of the subflows of MPTCP, HoL blocking occurs at the receiver due to the difference in packet arrival time among paths. In MPTCP, HoL blocking degrades not only the performance of the path where bufferbloat occurs, but also the performance of other paths. In this paper, we propose a bandwidth measurement based scheduler to solve this problem. Bandwidth measurement based scheduler is designed to measure the bandwidth of each subflow and to perform packet scheduling based on it. In order to verify the proposed scheduler, we implemented the proposed scheduler in the Linux kernel and constructed a testbed in which bufferbloat occurs. Experimental results show that the proposed scheduler has better performance than the legacy MPTCP in bufferbloat environment.

Design Issues in Network Adaptive Delivery and its Networking Support for Continuous Media (연속적인 미디어를 위한 네트워크 적응형 전송 및 네트워킹 지원 설계 이슈들)

  • Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.899-915
    • /
    • 2003
  • Delivering rich and continuous media contents robustly over a wide range of network conditions of the wired/wireless Internet is a highly challenging task. To address this challenges, the continuous media applications at the edge of network has become more and more adaptive while the best-effort Internet is slowly progressing towards improved networking services. That is, the role of network adaptive media delivery, which dynamically links the quality demand of application contents to the underlying networking services, has become more crucial. In this paper, we will first review the required network adaptation functionalities seen from the application side: congestion control / rate control, error control, and synchronization / adaptive playout. Then, we start the coverage of networking support issues that helps the realization of network adaptive media streaming - from network support and protocol support toward consolidated support via middleware. Finally, we propose a dynamic network adaptation framework that efficiently leverages its awareness of both media application (including contents) and underlying networking support.

A Design of Authentication/Security Processor IP for Wireless USB (무선 USB 인증/보안용 프로세서 IP 설계)

  • Yang, Hyun-Chang;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2031-2038
    • /
    • 2008
  • A small-area and high-speed authentication/security processor (WUSB_Sec) IP is designed, which performs the 4-way handshake protocol for authentication between host and device, and data encryption/decryption of wireless USB system. The PRF-256 and PRF-64 are implemented by CCM (Counter mode with CBC-MAC) operation, and the CCM is designed with two AES (Advanced Encryption Standard) encryption coles working concurrently for parallel processing of CBC mode and CTR mode operations. The AES core that is an essential block of the WUSB_Sec processor is designed by applying composite field arithmetic on AF$(((2^2)^2)^2)$. Also, S-Box sharing between SubByte block and key scheduler block reduces the gate count by 10%. The designed WUSB_Sec processor has 25,000 gates and the estimated throughput rate is about 480Mbps at 120MHz clock frequency.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

Design and Implementation of High Throughput Geographical Handoff Using GPS Information (GPS정보를 이용한 위치기반 핸드오프의 설계 및 구현)

  • Han, Seung-ho;Yang, Seung-chur;Kim, Jong-duok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.80-83
    • /
    • 2009
  • The most popular communication protocol is those defined by the IEEE 802.11 WLAN to support broadband internet connection. The demand for real-time multimedia service is increasing through WLAN on the road. The Hand-off function of mobile terminal is essential to support mobility. But, the hand-off function of IEEE 802.11 WLANs has the latency up to 300ms, and recent research has focusing on channel scanning and reconnection to AP and certification process of AP. It is also the lack of consideration in related works that hand-off happens frequently when the mobile node is moving. This paper proposed the hand-off algorithm that guarantees high throughput and estimates the point which may occur hand-off using GPS information and RSSI. We implement the proposed hand-off function that achieves the best performance.

  • PDF

Developing Geriatric Nursing Competency Using Information and Communication Technology: Focusing on a Case of Depression Assessment (ICT 기반 노인간호 역량 개발: 우울증 측정 사례를 중심으로)

  • Kim, Heejung;Hong, Soyun;Kwon, Sooyoung;Kim, Namhee
    • Journal of Korean Gerontological Nursing
    • /
    • v.20 no.sup1
    • /
    • pp.119-126
    • /
    • 2018
  • Purpose: The aim of this study was to describe problems and solutions for older adults living alone and using wearable devices to report depressive moods in daily life. In addition, gerontology nurses' competencies and strategies were discussed based on lessons learned from the observational study. Methods: A hybrid method was used, combining literature review and content analyses based on interviews with 53 participants and observations done by the research team. Results: Main issues and relevant strategies were identified in terms of (1) applicability of information and communications technology (ICT) devices for older adults, (2) feasibility of older adults' use of ICT devices, (3) integration of ICT devices into daily life, and (4) relevant issues when older adults use ICT. Important roles and competencies were discussed regarding general and gerontology aspects of ICT. Conclusion: Findings indicate that a wearable device is feasible to measure daily depressive moods in older adults living alone in community settings. To extend our research protocol to practice, gerontology nurses must adequately prepare to meet emerging health care trends and end users' needs for ICT-based nursing. It is necessary to develop diverse educational programs and active involvement in research and design of relevant devices and programs.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

A Study on Automatic Generation of Interface Circuits Based on FSM between Standard Buses and Ips (FSM을 이용한 표준화된 버스와 IP간의 인터페이스 회로 자동생성에 관한 연구)

  • Lee, Ser-Hoon;Moon, Jong-Uk;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.137-146
    • /
    • 2005
  • IP-based design methodology has been popularly employed for SoC design to reduce design complexity and to cope with time-to-market pressure. Interface modules for communication between system buses and IPs are required, since many IPs employ different protocols. Automatic generation of these interface modules would enhance designer's productivity and IP's reusability. This paper proposes an automatic interface generation system based on FSM generated from the protocol description of IPs. The proposed system provides the library modules for the standard buses to reduce the burdens of describing the protocols for data transfer from/to standard buses. Experimental results show that the area of the interface circuits generated by the proposed system had been increased slightly by 4.5% on the average when compared to manual designs. In the experiment, where bus clock is 100 Mhz and slave module clock is 34 Mhz, the latency of the interface had been increased by 7.1% in burst mode to transfer 16 data words. However, occupation of system bus can be reduce by 64.9%. A chip designer can generate an interface that improves the efficiency of system bus, by using this system.