• Title/Summary/Keyword: OSI 7layer

Search Result 27, Processing Time 0.028 seconds

Tourist Information Schema Design Using X.500 Directory (X.500 디렉토리를 이용한 관광 정보 스키마 설계)

  • Park, Mun-Seong;O, Ju-Byeong;Yang, Hae-Cheol;Lee, Yong-Jun;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1027-1036
    • /
    • 1996
  • X.500 Directory is an application level protocol in the Open Systems Interconnection(OSI) 7 layer's reference model adopted by the international Standards Organization (ISO). It manages effectively needed information for the communication service, and is a service to support the functions that the user can approach conveniently. Tourist information is distribution on several locations. The access of distributed information is similar to X.500 directory service. Therefore, we design of Tourist Information System(TIS) and directory schema using X.500 directory services. To define tourist information, we also propose Directory Information Tree(DIT) of locality architecture and several new object classes, such as museum, mountain, sea, hotel, etc.

  • PDF

An Introduction to Daeduk Science Town Network (대덕 지역 정보 통신망 개요)

  • 정선종
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1988.10a
    • /
    • pp.141-143
    • /
    • 1988
  • 대덕 연구 단지를 시범 대상으로 하여 구축되는 본 지역 정보 통신망은 IEEE 802.5 규격을 사용하여 광접속 장치 및 망접속 장치를 개발하고 시범망을 구축하여 테스트를 수행하며, 전송매체나 node의 fault 시 loop 를 형성하거나 고장난 지점을 bypass 시키는 기능이 잇어 망의 신뢰도를 향상시킬 수 있다. 또한 다양한 서비스 제공을 위하여 프로토콜 계층 구조는 OSI의 7 layer 개념을 기초로 하여 여러 이기종 컴퓨터를 접속할 수 있도록 구성한다.

  • PDF

Design and Implementation of Protocol Analyzer for PDA (PDA용 프로토콜 분석기의 설계 및 구현)

  • 이재종;김영웅;정인환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.64-66
    • /
    • 2003
  • 프로토콜 분석이란 이더넷(Ethernet)의 특성인 동보 기능(broadcasting)을 이용하여 LAN에 흘러 다니는 모든 패킷들을 실시간으로 수집하여 OSI 7 Layer별로 분석하는 것을 의미한다. 아직까지는 프로토콜 분석기가 일반 PC에서 사용이 가능한 형태로 개발되어 있는 실정이며 무선 LAN을 대상으로, 특히 PDA 상에서 사용 가능한 프로토콜 분석기는 찾아보기 어렵다. 무선 LAN은 중계기 역할을 하는 Access Point가 곳곳에 지역적으로 분산되어 설치되어야 한다. 본 논문에서는 이러한 무선 LAN 특성상 이동이 용이한 PDA 상에서 무선망의 운영 상태를 파악하고 검사할 수 있는 프로토콜 분석기를 설계하고 구현한다.

  • PDF

A study on the network schemes of the home appliance using the CEBus (표준 CEBus를 사용한 가전기기의 제어 방식에 관한 연구)

  • 송원국;이연천;김명식;김용득
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.327-331
    • /
    • 1991
  • This paper deals with the network schemes of the home appliance using the CEBus. Protocol schemes which are based on the OSI 7-layer and CAL application were described. And also it was adapted for microwave oven as case study. As a result, it is shown that it operates well under CEBus protocol with only power line media.

  • PDF

Detecting scheme against bypass Denial of Service Attack (우회 DoS 공격을 탐지하기 위한 모델 설계)

  • 김용석;전준철;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.709-711
    • /
    • 2003
  • 현재 사용되어지는 컴퓨터 통신 프로토콜(OSI 7 layer reference model)은 구조적인 문제점을 들어내고 있다. 이런 문제점 때문에, 해커들은 수많은 패킷들을 생성시키는 Denial of Service(DoS) 공격과 Distributed Denial of Service(DDoS) 공격을 사용하여 한 호스트나 한 네트워크 자원에 치명적인 악영향을 미친다. 특정한 TCP 포트나 UDP 포트에 공격을 가하는 경우에는 룰 기반의 침입탐지 시스템(IDS)이 탐지 해낼 수 있지만 다른 임의의 포트에 공격을 가하게 되연 IDS는 이것을 탐지하지 못한다. 따라서 우리는 잉의의 포트에 DoS나 DDoS 공격들이 일어났을 때 이 공격들을 탐지할 수 있는 모델을 설계하였다.

  • PDF

Implementation of Message Service for TCN Protocol (전동차용 네트웍 프로토콜의 메세지 서비스의 구현)

  • Park, Hong-Sung;Jin, Chang-Ki;Park, Geun-Pyo;Kim, Hyung-Yuk;Yoon, Gun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.133-133
    • /
    • 2000
  • This paper implements Message Service of TCN or IEC 61375-1. TCN is divided into two services, Variable and Message Service. Variable Service uses the broadcasting method with Source Address, but Message Service uses peer-to-peer method with Destination Address and has OSI 7 Layer. In TCN, interface between Transport and Network Layer has not been defined and Meaning of Packet Pool has not been defined exactly. Therefore, this paper proposes the Implementation method for both the interface between Transport and Network Layer and the packet pool for Message Service of TCN.

  • PDF

The Study of MAC protocol for efficient Wireless Sensor Network (Wireless 센서 네트워크를 위한 MAC 프로토콜에 관한 연구)

  • Lee, Woo-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.517-520
    • /
    • 2005
  • Wireless sensor network combines sensing and computing technology which can sense light, temperature, vibration, magnetic field and wind etc, as each purpose of using those. Wireless nodes operate signal processing skill which has proceeded sensed information from the sensor, transmission which makes information reached to observer and limited energy managing skill which is needed on account of using battery to operate wireless. To make responsible measuring and sensing out of them, efficient energy management is so important to maintain life time of network. In this paper, after explaining CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) traditional wireless MAC protocol, and ER-MAC(Energy Rate Medium Access Control) which are not managing resource of hardware but MAN(Medium Access Control), data-link layer out of OSI 7 layer. We would like to analyze those efficiency of power saving comparing with each protocol.

  • PDF

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control (Content-Length 통제기반 HTTP POST DDoS 공격 대응 방법 분석)

  • Lee, Dae-Seob;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.809-817
    • /
    • 2012
  • One of the OSI 7 Layer DDoS Attack, HTTP POST DDoS can deny legitimate service by web server resource depletion. This Attack can be executed with less network traffic and legitimate TCP connections. Therefore, It is difficult to distinguish DDoS traffic from legitimate users. In this paper, I propose an anomaly HTTP POST traffic detection algorithm and http each page Content-Length field size limit with defense method for HTTP POST DDoS attack. Proposed method showed the result of detection and countermeasure without false negative and positive to use the r-u-dead-yet of HTTP POST DDoS attack tool and the self-developed attack tool.