• Title/Summary/Keyword: OSI 7 Layer

Search Result 27, Processing Time 0.041 seconds

Composition Rule of Character Codes to efficiently transmit in HDLC Protocol with HDB-3 Scrambling (HDB-3 스크램블링과 HDLC 프로토콜에서 효율적 문자부호 전송을 위한 문자부호 작성 규칙)

  • Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.831-838
    • /
    • 2012
  • In the transmission system, the transmission efficiency can be increased by applying the proper character coding method. This paper is to show the character coding rule in computer and information equipment etc to improve the transmission efficiency in datacommunications. The character coding rule showing in this paper was suggested by considering the two view points. First one is FLAG bits in HDLC and PPP protocol on datalink layer in OSI 7 layer. Second one is one of the scrambling method, HDB-3, on physical layer in OSI 7 layer. The former is to prevent the sequence of over 5bits of "1" in the character codes. The latter is to prevent the sequence of over 4bits of "0" in the character codes.

Method of Vulnerability Analysis from Layer Scanning (Layer별 Scanning을 사용한 취약성 분석 방법)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.277-280
    • /
    • 2010
  • Network based on the OSI 7 Layer communication protocol is implemented, and the Internet TCP / IP Layer Based on the vulnerability is discovered and attacked. In this paper, using the programs on the network Layer Scanning conducted by the Layer-by each subsequent vulnerability analysis. Layer by Scanning each vulnerability analysis program to analyze the differences will be studied. Scanning for the studies in the program reflects the characteristics of the Scanning Features of way, and security countermeasures by each Layer is presented. The results of this study was to analyze its vulnerability to hackers and security for defense policy as the data is utilized to enhance the security of the network will contribute.

  • PDF

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

Design of an Intrusion Detection System for Defense in Depth (계층적 방어를 위한 침입탐지 시스템 설계)

  • Koo, Min-Jeong;Han, Woo-Chul;Chang, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.525-526
    • /
    • 2010
  • 2000년 대규모 DDoS 공격이래, 2009년 7월 7일 국가주요정부기관 및 인터넷 포털, 금융권 등의 웹사이트 대상으로 1차, 2차, 3차로 나누어 대규모 사이버 공격이 발생하였다. 지속적으로 발전되는 행태를 보이고 DDoS 공격에 대해 본 논문에서는 계층적인 침입탐지시스템을 설계하였다. 네트워크 패킷을 분석하기 위해 e-Watch, NetworkMiner등의 패킷, 프로토콜 분석도구를 이용하여 TCP/IP의 Layer별 공격을 분석한 후 패킷의 유입량, 로그정보, 접속정보, Port, Address 정보를 분석하고 계층침입에 대한 방어를 수행하도록 설계하였다. 본 논문은 DDoS(Distributed Denial of Service)에 대한 패킷 전송에 대해 계층적인 방어를 통해 보다 안정적인 패킷수신이 이루어진다.

  • PDF

Development of an Integrated Packet Voice/Data Terminal (패킷 음성/데이터 집적 단말기의 개발)

  • 전홍범;은종관;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.2
    • /
    • pp.171-181
    • /
    • 1988
  • In this study, a packet voice/data terminal(PVDT) that services both voice and data in the packet-switched network is implemented. The software structure of the PVDT is designed according to the OSI 7 layer architecture. The discrimination of voice and data is made in the link layer. Voice packets have priority over data packets in order to minimize the transmission delay, and are serviced by a simple protocol so that the overhead arising form the retransmission of packets may be minimized. The hardware structure of the PVDT is divided into five modules; a master control module, a speech proessing module, a speech activity detection module, a telephone interface module, and an input/output interface module. In addition to the hardware implementation, the optimal reconstruction delay of voice packets to reduce the influence of delay variance is analyzed.

  • PDF

Implementation of ANSI C12.22 Communication Protocol for Two-way Communications of Smart Meter (스마트미터의 양방향 통신을 위한 ANSI C12.22 통신 프로토콜 구현)

  • Lee, Sang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.815-821
    • /
    • 2013
  • In this paper, application layer protocol of C12.22 node, defined by ANSI C12.22 is implemented. ANSI C12.22 defines application layer only among the OSI 7 layers and recommends using the existing protocols for the 1~4 layer to transmit the information. TCP/IP which is one of the generally used protocols has been applied for the transport and network layer protocol in this paper. ANSI C12.19 defines the parameters for the watt-hour meter, and C12.22 application layer defines the network services and data structures networking the watt-hour meter parameters at a minimum. This kind of services and data structures are used for the configuration, programming, monitoring of the networked watt-hour meter or collecting information of the watt-hour meter. A embedded board has been used to implement the C12.22 application layer and a test program for the AMI application server has been developed for the functional test.

A study on implementation of MAP-MMS protocol (MAP-MMS 프로토콜의 구현에 관한 연구)

  • 고우곤;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.520-523
    • /
    • 1989
  • MAP(Manufacturing Automation Protocol), Network Protocol for FA has 7 Layer Structure of OSI. Being an Application Layer Protocol for Communication Interfaced with the Actual Programmable Devices, MMS(Manufacturing Message Specification) Consists of Three Factors of Services, Interfaces, and Protocol. For Details, It Classifies with the Followings ; Connection/Context Management, Remote Variable Access, Semaphore Management, File transfer and Management, Program UP/DOWN Load, Remote Program Fxecution. In this Paper Designing MAP Network Station of Programmable Device, we Analyze the Protocol of MMS, and Realize the State Diagram of each Services and Propose the Model of MMS Function Call Instructions.

  • PDF

An implementation of MMS on full MAP environment (Full MAP에서의 MMS구현)

  • Choi, Yobb;Ha, Jeong-Hyeon;Chae, Young-Do
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.761-766
    • /
    • 1990
  • Manufacturing Message Specification(MMS) was sewed as an International Standard by International Standardization Organization(ISO). MMS is being accepted throughout the world as a solution to communications among multi vendor factory floor environments. This paper describes an implementation of MMS which operates on Application Layer of Open Systems Interconnection(OSI) 7 layer model. MMS was implemented on MSDOS in apersonal computer environment.

  • PDF

Implementation of Packet Voice Protocol (패킷음성 프로토콜의 구현)

  • 이상길;신병철;김윤관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.12
    • /
    • pp.1841-1854
    • /
    • 1993
  • In this paper, the packet voice protocol for the transmission of voice signal onto ethernet is implemented in a personal computer (PC). The packet voice protocol used is a modified one from CCITT G.764 packetized voice protocol. The hardware system to facilitate the voice communication onto ethernet is divided into telephone interface, speech processing, PC interface and controllers. The software structure of the protocol is designed according to the OSI seven layer architecture and is divided into three routines : ethernet device driver, telephone interface, and processing routine of the packet voice protocol. Experiments through ethernet with telephone interface show that this packet voice communication achieves satisfactory quality when the network traffic is light.

  • PDF

SDH 망관리 프로토콜 기술 및 이의 구현

  • Park, Jae-Min;Choe, Seong-Hyeok;Choe, Ji-Yeong;Lee, Dong-Chun;Kim, Chun-Hui;Song, Ju-Bin;Kim, Sang-Jun
    • ETRI Journal
    • /
    • v.14 no.2
    • /
    • pp.72-90
    • /
    • 1992
  • SDH(Synchronous Digital Hierarchy) 에 의한 동기식 전송방식은 비동기식 전송장치의 관리특성상의 문제점을 고려하여 일원화된 망관리가 가능하도록 OSI 망관리 기법에 기본을 둔 TMN(Telecommunication Management Network) 접속기능이 CCITT 에 의해 권고되었다. 본 논문은 동기식 전송망의 관리를 위해서 필요한 TMN 과 SMN 구조, OAM 메시지 전달 프로토콜, 메시지구조에 대해 고찰하고 현재 ETRI에서 개발되고 있는 155Mb/s 급 동기식 전송장치에 직접 실장된 Agent, MIB, 그리고 OSI 7Layer 의 구현내용을 기술하였다

  • PDF