• Title/Summary/Keyword: Open Protocol

Search Result 478, Processing Time 0.03 seconds

Connection Control and Network Management of OBS with GSMP Open Interface (GSMP 개방형 인터페이스 기반의 OBS 연결 제어 및 망 관리 메커니즘)

  • Choi In-Sang;Kim Choon-Hee;Cha Young-Wook;Kwon Tae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.1
    • /
    • pp.89-100
    • /
    • 2006
  • The introduction of GSMP open interface to OBS network can materialize to separate the transport plane and the control plane in OBS network. This makes the implementation of OBS switches simple and provides various flexibility. However, the introduction of open interface will cause the connection setup delay because of the additional processing overhead of open interface protocol. Also, in GSMP based network, the location of network management functions are not defined explicitly and the research result about the OBS network management is almost nothing. This paper proposes a parallel connection setup mechanism using centralized connection control server to minimize connection setup delay in OBS network with GSMP open interface and defines managed objects to support connection, configuration, performance, and fault management for the management of OBS network with GSMP open interface. This paper also proposes a distributed network management model, in which the above managed objects are distributed in a controller and an OBS switch according to network management functions. We verify the possibility of OBS control and network management by implementing network management function using proposed parallel connection setup mechanism and distributed network management model.

  • PDF

ASIC Design of OpenRISC-based Multimedia SoC Platform (OpenRISC 기반 멀티미디어 SoC 플랫폼의 ASIC 설계)

  • Kim, Sun-Chul;Ryoo, Kwang-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.281-284
    • /
    • 2008
  • This paper describes ASIC design of multimedia SoC Platform. The implemented Platform consists of 32-bit OpenRISC1200 Microprocessor, WISHBONE on-chip bus, VGA Controller, Debug Interface, SRAM Interface and UART. The 32-bit OpenRISC1200 processor has 5 stage pipeline and Harvard architecture with separated instruction/data bus. The VGA Controller can display RCB data on a CRT or LCD monitor. The Debug Interface supports a debugging function for the Platform. The SRAM Interface supports 18-bit address bus and 32-bit data bus. The UART provides RS232 protocol, which supports serial communication function. The Platform is design and verified on a Xilinx VERTEX-4 XC4VLX80 FPGA board. Test code is generated by a cross compiler' and JTAG utility software and gdb are used to download the test code to the FPGA board through parallel cable. Finally, the Platform is implemented into a single ASIC chip using Chatered 0.18um process and it can operate at 100MHz clock frequency.

  • PDF

API Selection and Automatic Open API Composition Method Based on REST Protocol (REST 프로토콜 기반의 API 선별 기법 및 Open API 자동 합성 방안)

  • Kim, Sang-Il;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.587-594
    • /
    • 2013
  • With the development of web 2.0 and the rapid diffusion of smart devices, current web service, which only provides very limited information and service, has been transformed into user-friendly and comprehensive web service called mash-up service. Mash-up service is defined as comprehensive service that is created by combining variety of web services. When composing a mesh-up service, Open API is used as web service interface. Current mash-up service, however, has fundamental problem in that it could not satisfy the various needs of users who want I-centric personalized service because it is developed and provided by service developers. To overcome these obstacles, a lot of studies on mesh-up framework are being performed for improving mash-up proess though, it is still in beginning stage. In this paper, we introduce an API selection and compostion method as the key technology for mesh-up framework that support the automatic creation of mesh-up service.

Design and Implementation of Class Structure for Bluetooth HCI Layer (블루투스 HCI 계층을 위한 클레스 구조의 설계 및 구현)

  • Kim, Sik;Ryu, Su-Hyung
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.69-77
    • /
    • 2002
  • The Bluetooth is expected to be one of the most popular wireless telecommunication technology in the near future, and the protocol stack is essential to providing the various services with the Bluetooth-embedding systems or devices. The Bluetooth specification is an open, global specification defining the complete system, however, the protocol stack is usually implemented partly in hardware and partly as software running on its system, with different implementations partitioning the functionality between hardware and software in different ways. I investigate how to design and implement the Bluetooth protocol stack according to its specification. I focus on the HCI and the lower layer of the software protocol stack as a basic step for the development of our own protocol stack. As a result, paper provides how to partitioning the role of HCI layer, and how to implement the relationship between HCI packets, it's functionality and the flow control. Experiments show the discovering other Bluetooth devices and their connection. Furthermore experiments demonstrate the proper operation of data communication between the Bluetooth modules.

  • PDF

Evaluation of Security Protocols for the Session Initiation Protocol (SIP 보안 프로토콜의 성능 분석)

  • Cha, Eun-Chul;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.55-64
    • /
    • 2007
  • Behind the popularity of VoIP in these days, it may present significant security challenges in privacy and accounting. Authentication and message encryption are considered to be essential mechanisms in VoIP to be comparable to PSTN. SIP is responsible for setting up a secure call in VoIP. SIP employs TLS, DTLS or IPSec combined with TCP, UDP or SCTP as a security protocol in VoIP. These security mechanisms may introduce additional overheads into the SIP performance. However, this overhead has not been understood in detail by the community. In this paper we present the effect of the security protocol on the performance of SIP by comparing the call setup delays among security protocols. We implement a simulation of the various combinations of three security protocols and three transport layer protocols suggested for SIP. UDP with any combination of security protocols performs a lot better than the combination of TCP. TLS over SCTP may impose higher impact on the performance in average because TLS might have to open secure channels as the same number of streams in SCTP. The reasons for differences in the SIP performances are given.

Management of the Access Control for a WebDAV-based Collaborative System (웹데브 기반 협업시스템에서의 접근 제어 관리)

  • Kim, Seong-Hune;Lee, Hong-Chang;Lee, Myung-Joon;Park, Yang-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.167-181
    • /
    • 2010
  • WebDAV is an IETF standard protocol which supports asynchronous collaborative authoring on the Web. The WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. In this paper, to provide high level collaboration, we introduce a technique for managing access control over WebDAV resources through the WebDAV Access Control Protocol and describe the development of an access control manager for the CoSlide Collaborative system based on the technique. To provide users with the access control features in an easily understandable manner, the developed technique presents the privileges for performing WebDAV methods instead of the standard privileges in the WebDAV Access Control Protocol. In addition, we present the facility for detecting conflicts between new access privileges on resources and old access privileges on them. We applied the method-based access control management technique to the CoSlide collaborative system. The developed access control manager enables us to create group workspaces with flexible access control strategies for group members and resources.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

QoS-enabled Next Generation Local Area Network for IP-based Convergence Services (IP 기반 통합서비스를 위한 QoS 가능 차세대 LAN)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2166-2172
    • /
    • 2006
  • This paper presents a quality-of-service-enabled next generation local area network architecture which can provide efficiently convergence services over the Internet protocol. The basic concept of the architecture is to combine such three principle technologies as programmable switched network quality-of-service resource management and Internet protocol based network convergence. We discuss system entities and technologies development, which constitute the proposed network. The architecture of the network is then described. Implementation of systems verifies the proposed technologies. The network as a next generation local area network can provide quality-of-service-enabled real-time communication services as well as existing data traffic, and the open programmable interface can facilitates to adopt cost-effectively emerging new services or functionalities.

A Development of PC/Ethernet based Fieldbus Network for Large Realtime Data Communication

  • Gwak, Kwi-Yil;Lee, Sung-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.362-367
    • /
    • 2005
  • Control network adopted in the national power-plant or manufactory are mostly vendor-dependent products, which have their own special specification, components and individual communication methods. These systems not only raise installation cost, but also bring many difficulties to maintenance and extension. To overcome these problems, this paper introduces a development and application case of a new "PC/Ethernet-based fieldbus" architecture and protocol to be used in mid-level fieldbus. The designed system has a basic idea of "3 Layers fieldbus over Standard-LAN" and implemented on PCs. PC gives user friendly environment. By using an open standard Ethernet in layer 1,2, the system has low cost, wide communication bandwidth and high compatibility. Layer 3 protocol designed for large realtime data communication makes user bypass TCP/IP layer and gives user direct access to the Ethernet. This new protocol eliminates potential collision of Ethernet, and transmits large periodic/non-periodic control data by using long-frame/wide-bandwidth of Ethernet effectively, and offers simple API-Services to the upper layer. Since the system have installed in H-power plant simulator and U-nuclear power plant simulator in Korea, it have been proved to be efficient and stable without any trouble in realtime communication service for full-scope plant simulator that has a lot of control elements.

  • PDF

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.