• Title/Summary/Keyword: OSI 7계층

Search Result 18, Processing Time 0.024 seconds

The Study of MAC protocol for efficient Wireless Sensor Network (Wireless 센서 네트워크를 위한 MAC 프로토콜에 관한 연구)

  • Lee, Woo-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.517-520
    • /
    • 2005
  • Wireless sensor network combines sensing and computing technology which can sense light, temperature, vibration, magnetic field and wind etc, as each purpose of using those. Wireless nodes operate signal processing skill which has proceeded sensed information from the sensor, transmission which makes information reached to observer and limited energy managing skill which is needed on account of using battery to operate wireless. To make responsible measuring and sensing out of them, efficient energy management is so important to maintain life time of network. In this paper, after explaining CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) traditional wireless MAC protocol, and ER-MAC(Energy Rate Medium Access Control) which are not managing resource of hardware but MAN(Medium Access Control), data-link layer out of OSI 7 layer. We would like to analyze those efficiency of power saving comparing with each protocol.

  • PDF

A Real-time Traffic Control Scheme for ATM network:RCT (ATM망을 위한 실시간 트래픽 제어 기법:RCT)

  • Lee, Jun-Yeon;Lee, Hae-Wan;Kwon, Hyeog-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2822-2831
    • /
    • 1997
  • A B-ISDN network based on ATM must support several kinds of transport services with different traffic characteristics and service requirements. There is neither link-by-link flow control nor error control in the ATM layer. For different services, different flow/error controls could be performed at the AAL layer or at a higher Iayer(e.g. transport layer). In traditional data networks, the window now control mechanism combined with error control was used prevalently. But, the window flow control mechanism might be useless in ATM networks because the propagation delay is too large compared with the transmission rate. In this paper, we propose a simple flow control mechanism, called RCT(Rate Control for end-to-end Transport), for end-to-end data transport. The RCT shows acceptable performance when the average overload period is bounded by a certain time.

  • PDF

Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control (Content-Length 통제기반 HTTP POST DDoS 공격 대응 방법 분석)

  • Lee, Dae-Seob;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.809-817
    • /
    • 2012
  • One of the OSI 7 Layer DDoS Attack, HTTP POST DDoS can deny legitimate service by web server resource depletion. This Attack can be executed with less network traffic and legitimate TCP connections. Therefore, It is difficult to distinguish DDoS traffic from legitimate users. In this paper, I propose an anomaly HTTP POST traffic detection algorithm and http each page Content-Length field size limit with defense method for HTTP POST DDoS attack. Proposed method showed the result of detection and countermeasure without false negative and positive to use the r-u-dead-yet of HTTP POST DDoS attack tool and the self-developed attack tool.

User service extension for WebView materialized model in distributed environment (분산환경에서의 WebView 구체화 모델을 위한 사용자 서비스 확장)

  • Suh, Jin-Hyung;Kim, Kyung-Chang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1631-1634
    • /
    • 2003
  • 분산환경에서의 웹뷰 (WebView)는 기본적으로 3 단계 구조 (3-tier architecture)를 기본으로 하고 있으며, 이를 통하여 사용자가 요구하는 정보를 구체화시켜 제공하게 되나 현재 인터넷 환경에서는 사용자가 요구하는 정보가 한곳에만 있다고 볼 수 없다. 즉, 적절히 분산되어 있는 각 웹 서버의 정보를 다양하게 활용할 수 있는 환경을 제공하여야 사용자가 요구하는 정보를 얻을 수 있으며, 이를 위한 적합한 데이터 저장 및 웹뷰 유지 방법이 제시되어야 한다. 그러나 일반적인 3 단계 구조를 적절히 분산되어 있는 환경에 적응할 경우 사용자의 질의에 해당하는 정보를 추출할 수 있는 방법, 네트워크 연결시의 지연과 네트워크의 장애 등으로 인하여 많은 시간적인 문제와 상대방에서의 잘못된 정보의 전달 등으로 인하여 사용자가 요구하는 정보를 전달할 수 없으며, 이에 따른 추가적인 비용 모델이 산정하여야 한다. 이러한 이유로 본 논문에서는 기존의 단일 3 단계 모델을 확장한 분산환경에서의 사용자 서비스와 가장 관계가 있는 계층으로 OSI 7 레이어에서 응용 계층으로 사용자 서비스와 응용 계충의 사이에서는 제공하고 있는 분산 정보 서비스에 대한 조건의 확장을 통하여 추후 고려하여야 할 분산된 네트워크 웹뷰 모델에서의 성능 및 비용분석에 대비한다.

  • PDF

Implimentation of MMS using JNI (JNI를 이용한 MMS 구현)

  • Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Manufacturing Message Specification (MMS) is designed as a communication standard protocol, ISO/IEC 9506, on factory automation for messaging between heterogeneous programmable unit controller, PLC, NC, Robot, of different vendors on the networks. MMS is also a standard protocol of OSI reference model application layer, In this paper, we show an implementation of MMS over TCP/IP using ANSI-C programming language on the unix environment, and make java classification using java native interface (NJI) with MMS library. The use of java classification provides a basic environment ot overcome a difficult programming with different MMS application programming interface (MMS-I) which requires a siklled programming technique of graphic user interface (GUI). In this paper, we implement a MMS application program of the automated assembly model for printed circuit board based on WWW which shows the operation, control and monitoring of real manufacturing device (RMD) with web browser providing users for consistent user interface.

  • PDF

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

Composition Rule of Character Codes to efficiently transmit the Character Code in HDLC(High-level Data Link Control) Protocol (HDLC(High-level Data Link Control) 프로토콜에서 효율적 문자부호 전송을 위한 문자부호화 규칙)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.753-760
    • /
    • 2012
  • This paper is to show the character coding rule in computer and information equipment etc to improve the transmission efficiency in telecommunications. In the transmission system, the transmission efficiency can be increased by applying the proper character coding method. In datalink layer, HDSL ptotocol use FLAG byte to identify the frame to frame which consists of data bit stream and other control bytes. FLAG byte constits of "01111110". When data bit stream consist of the consecutive 5-bit "1" after "0", the decoder can not distinguish whether the data bit sequence is flag bit stream or data bit stream. To solve the problem, when the line coder in transmitter detects the consecutive 5-bits "1" after "0" in the input data stream, inserts violently the "0" after 5th "1" of the consecutive 5-bit "1" after "0". As a result, when the characters are decoded with the above procedure, the efficiency of system should be decreased. This paper shows the character code rule to minimize the consecutive 5-bits "1" after "0" when the code is given to each characters.

An adaptive resynchronization technique for stream cipher system in HDLC protocol (HDLC 프로토콜에서 운용되는 동기식 스트림 암호 통신에 적합한 적응 난수열 재동기 기법)

  • 윤장홍;황찬식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.1916-1932
    • /
    • 1997
  • The synchronous stream cipher which require absoulte clock synchronization has the problem of synchronization loss by cycle slip. Synchronization loss makes the state which sender and receiver can't communicate with each other and it may break the receiving system. To lessen the risk, we usually use a continuous resynchronization method which achieve resynchronization at fixed timesteps by inserting synchronization pattern and session key. While we can get resynchronization effectively by continuous resynchroniation, there are some problems. In this paper, we proposed an adaptive resynchronization algorithm for cipher system using HDLC protocol. It is able to solve the problem of the continuous resynchronization. The proposed adaptive algorithm make resynchronization only in the case that the resynchronization is occurred by analyzing the address field of HDLC. It measures the receiving rate of theaddress field in the decision duration. Because it make resynchronization only when the receiving rate is greateer than the threshold value, it is able to solve the problems of continuous resynchronization method. When the proposed adaptive algorithm is applied to the synchronous stream cipher system in packet netork, it has addvance the result in R_e and D_e.

  • PDF