• Title/Summary/Keyword: Data Protocol

Search Result 3,905, Processing Time 0.031 seconds

Analysis of TCP packet by Protocol Analysis module Design (프로토콜 분석모듈 설계에 의한 TCP 패킷 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

An Energy and Delay Efficient Hybrid MAC Protocol for Multi-Hop Wireless Sensor Networks (멀티 홉 무선센서네트워크에서 에너지와 지연에 효율적인 하이브리드 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.471-476
    • /
    • 2015
  • In this paper, we propose an energy efficient hybrid MAC protocol for multi-hop wireless sensor networks. The proposed MAC protocol used a hybrid mechanism, in which contention-based MAC protocol and contention free MAC protocol are combined. The sensor nodes located far from the sink node usually send few data packet since they try to send measured data by themselves. So contention-based MAC protocol is useful among them. But other nodes located near sink node usually have lots of data packets since they plays as a relay node. Contention-based MAC protocol among them is not suitable. Using contention-based MAC protocol in heavy data traffic environment, packet collisions and transmission delay may increase. In this paper, slot assignment between sender nodes by sink node is used. The proposed mechanism is efficient in energy and latency. Results showed that our MAC protocol outperformed other protocol in terms of data packet delivery delay and energy consumption.

A Priority Based MAC Protocol for Emergency Data Transmission in Wireless Body Area Networks (WBAN 환경에서 응급 데이터 전송을 위한 우선순위 기반 MAC 프로토콜)

  • Lee, Hyeop-Geon;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.4
    • /
    • pp.26-33
    • /
    • 2012
  • Please WBAN(Wireless Body Area Networks) is wireless communication of within 3 m radius from inside and outside of the body. WBAN is many uses IEEE 802.15.4 MAC protocol for WBAN MAC protocol requirements. IEEE 802.15.4 MAC protocol applies GTS(Guaranteed Time Slot) allocation scheme for guarantee packet delivery of application which requests QoS(Quality of Service). However, GTS allocation scheme of IEEE 802.15.4 MAC protocol uses FIFS(First In First Service) queueing. So it reduces data transmission reliability and has many problems. Therefore, IEEE 802.15.4 applies not WBAN MAC protocol for emergency data transmission. In this paper, we proposes a priority based MAC protocol for emergency data transmission in wireless body area networks. the proposal MAC protocol sets priority the data. So GTS reqeuest throughput of emergency data increasing and GTS allocation delay of emergency data decreasing.

Implementation and analysis of the LLC class3 protocol (LLC class 3 프로토콜의 구현 및 분석)

  • 김경신;이준호;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.352-354
    • /
    • 1991
  • MAP is a standard communication protocol for manufactoring automation. In this paper we implemented IEEE 802.2 LLC class 3 protocol, which consist of type l(unacknowledged connecionless data transfer) mode and type 3 (acknowledged connectionless data transfer) mode. This implemented protocol is verified by the test.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Anomaly Removal for Efficient Conformance Test (효율적인 프로토콜 적합성 시험을 위한 변칙성 제거)

  • Lee, Hyeon-Cheol;Heo, Gi-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

Priority oriented dobule reservation probocol for very high speed wireless LANs (초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜)

  • 조광민;정상일;강철신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

A Study on the Information Security Protocol in LLC/MAC Layer Architecture (LLC/MAC 계층 구조에서의 정보 보호 포로토콜에 관한 연구)

  • 류황빈;이재광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.10
    • /
    • pp.1164-1174
    • /
    • 1992
  • In this paper, an Information Security protocol in LLC/MAC Layer Architecture is discussed. This paper examines the security Vulnerability and threats, the security Service required to protect these threats, and architectural considerations of security protocol in IEEE 802 LAN architecture. To provide an Information security service, an information security protocol(SP2 : Security Protocol 2) PDU construction with LLC/MAC service primitives is suggested. To construct the SP2 protocol, the ECB, CBC mode of DES algorithm and DAA(Data Authentication Algorithm) of FIPS is used. The SP2 protocol suggested in this paper provides data origin authentication, data confidentiality, data integrity service.

  • PDF

An SS_RRA Protocol for Integrated Voice/Data Services in Packet Radio Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.88-92
    • /
    • 2007
  • In this paper, an SS-RRA protocol that is based on Code Division Multiple Access is proposed and analyzed under the integrated voice and data traffic load. The backward logical channels consist of slotted time division frames with multiple spreading codes per slot. The protocol uses a reservation mechanism for the voice traffic, and a random access scheme for the data traffic. A discrete-time, discrete-state Markov chain is used to evaluate the performance. The numerical results show that the performance can be significantly improved by a few distinct spreading codes.