• 제목/요약/키워드: PROTOCOL

검색결과 13,905건 처리시간 0.035초

패킷음성 프로토콜의 구현 (Implementation of Packet Voice Protocol)

  • 이상길;신병철;김윤관
    • 한국통신학회논문지
    • /
    • 제18권12호
    • /
    • pp.1841-1854
    • /
    • 1993
  • Ethernet에 음성신호의 전송을 위한 패킷음성 프로토콜을 PC 구현하였다. 구현한 패킷음성 프로토콜은 CCITT의 G.764 패킷음성 프로토콜을 수정하여 사용하였다. 이를 위하여 ethernet을 통한 음성통신을 하기 위한 하드웨어 시스템을 설계하였는데, 전화기 인터페이스부분, 음성처리부분, PC인터페이스부분 및 제어부분으로 나누어진다. 소프트웨어는 OSI 7 계층에 맞추어 설계하였으며 ethernet device driver, 전화기 인터페이스 하드웨어 driver 그리고 패킷음성 프로토콜 처리부분으로 구성되어 있다. 실제 실험결과 ethernet을 통하여 전화를 연결하고 만족한 음성통화를 할 수 있었다.

  • PDF

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

임베디드 리눅스 기반의 다중 프로토콜 제어기 개발 및 빌딩자동화시스템과의 연동 적용 (Development of Multi-protocol Controller based on Embedded Linux and Its Application to BAS)

  • 김현기;신은철;최병욱
    • 제어로봇시스템학회논문지
    • /
    • 제10권5호
    • /
    • pp.428-433
    • /
    • 2004
  • In this paper, we developed a multi-protocol controller based on SoC and embedded Linux and applied it to integrate with BAS in a unified TCP/IP socket communication. The multi-protocol controller integrates control networks of RS-485 and LonWorks devices to BAS. The system consists of three-tier architecture, such as a BAS, a multi-protocol converter, and control devices. By using UML, we modeled the system architecture. In order to show the feasibility of system architecture, it was applied to a small BAS system. The experimental results show that the multi-protocol controller using embedded Linux is flexible and effective way to develop a building control system.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

IPv6 프로토콜 LAN 설계 및 구축 (A Design and Implementation of IPv6 LAN)

  • 김상범;김두석
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.481-484
    • /
    • 2000
  • In this paper, we describe the design and implementation of IPv6 LAN. The legacy protocol for Internet is IPv4(IP version 4). The ability of IPv4 is not enough for modern real time multimedia communication services. So IPv6(IP version 6) protocol was suggested to resolve the problems of IPv4. We implemented IPv6 LAN using sTLA(sub Top Level Aggregation identifier) address and KOREN(KOrea Research and Experimental Network). Our IPv6 LAN is connected with 6TAP(Chicago), WIDE(Tokyo), and SingAREN(Singapore). We used a dedicated router, Windows 2000 PC host FreeBSD PC host, Solaris 7 workstation and Solaris 8 workstation for IPv6 NDP(Neighbor Discovery Protocol) protocol test. To support all data services including voice and video, IP protocol should be enhanced because the characteristics of modern network services are requiring QoS(Quality of Service) functions, auto-configuration, security, mobility and so on. So a new IP protocol, IPv6, has been developing to meet the requirements. In this paper, we introduce the implementation method and configuration information of IPv6 LAN.

  • PDF

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권5호
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF

Improved Ad Hoc On-demand Distance Vector Routing(AODV) Protocol Based on Blockchain Node Detection in Ad Hoc Networks

  • Yan, Shuailing;Chung, Yeongjee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권3호
    • /
    • pp.46-55
    • /
    • 2020
  • Ad Hoc network is a special wireless network, mainly because the nodes are no control center, the topology is flexible, and the networking could be established quickly, which results the transmission stability is lower than other types of networks. In order to guarantee the transmission of data packets in the network effectively, an improved Queue Ad Hoc On-demand Distance Vector Routing protocol (Q-AODV) for node detection by using blockchain technology is proposed. In the route search process. Firstly, according to the node's daily communication record the cluster is formed by the source node using the smart contract and gradually extends to the path detection. Then the best optional path nodes are chained in the form of Merkle tree. Finally, the best path is chosen on the blockchain. Simulation experiments show that the stability of Q-AODV protocol is higher than the AODV protocol or the Dynamic Source Routing (DSR) protocol.

스마트 아웃렛 시스템을 위한 무선 센서네트워크 프로토콜 설계 및 구현 (Design and Implementation of a Wireless Sensor Network Protocol for a Smart Power Outlet System)

  • 정한수;문정호;박성욱;이형봉;박래정;정태윤
    • 대한임베디드공학회논문지
    • /
    • 제7권6호
    • /
    • pp.291-300
    • /
    • 2012
  • This paper deals with the design and implementation of wireless sensor network protocol for smart power outlet system capable of fire detection, power monitoring, standby power cutoff, and home automation. The proposed protocol integrates both the CSMA and the TDMA protocols for low power consumption and good scalability. A prototype smart power outlet system employing the proposed protocol and a simple home automation network including the power outlet system have been implemented for evaluating the feasibility of the proposed protocol The result shows that the proposed protocol allows the power outlet system to be scalable with high power efficiency.

병행처리 기능을 갖는 멀티링크 스위칭기법의 성능 분석 (Performance Analysis of Multi-Link Switching Method with Concurrent Processing Function)

  • 유동관
    • 한국컴퓨터정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.84-89
    • /
    • 2001
  • 본 논문은 근거리 통신망 (LAN)의 종단에서 사용되는 기존의 멀티링크 스위칭 기법이 최대 정규화 전파 지연 값이 커질수록 채널 이용률이 급격히 떨어지는 단점이 있어 이를 보완하고자 병행처리 기능을 추가하여 프로토콜을 개선시킨 다음에 성능을 분석하여 보았다. 개선된 프로토콜의 성능 분석은 채널 이용률 관점에서 이루어졌으며 이것을 기존의 다른 프로토콜과 비교하여 보았다. 그 결과 병행처리 기능이 추가된 프로토콜이 기존의 여러 방식의 프로토콜보다 최대 정규화 전파 지연 값이 커질 경우 더 나은 성능을 보임을 알 수 있었다.

고속 광통신망에서 스위칭 오버헤드를 고려한 동적 전송 예약 프로토콜 (A dynamic transmission reservation protocol with non-zero tunig delay for high-speed mutliwavelength networks)

  • 최형윤;이호숙;김영천
    • 전자공학회논문지S
    • /
    • 제34S권5호
    • /
    • pp.25-34
    • /
    • 1997
  • Relatively slow tuning speed of optical device causes the unwanted delay in high speed single-hop multiwavelength networks. To lessen the overhead, we present a channel access protocol with dynamjic message scheduling. Th eframe structure of proposed protocol adopts hybrid multiaccess scheme in which WDMA is used as a basic multiaccess technique and TDMA is used to provide subchannels within a wavelength band. This architecture has two merits : the network extention is not limited by available number of wavelengths, and the transmission delay caused by optical device tuning time can to minimize the number of tunings. It schedules messages that require same wavelength channels sequencely, so the total transmission delay is reduced by decreasement of wavelength changes. The performance of proposed protocol is evaluated through numerical analysis based on probability and queueing theory. The peformance of proposed protocol is evaluated through numerical analysis based on probability and queueing theory. The numeric results show that the peformance of proposed protocol is better than that of previous one.

  • PDF