• Title/Summary/Keyword: Protocol Data Unit

Search Result 164, Processing Time 0.024 seconds

VLSI Design of Processor IP for TCP/IP Protocol Stack (TCP/IP프로토콜 스택 프로세서 IP의 VLSI설계)

  • 최병윤;박성일;하창수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.927-930
    • /
    • 2003
  • In this paper, a design of processor IP for TCP/IP protocol stack is described. The processor consists of input and output buffer memory with dual bank structure, 32-bit RISC microprocessor core, DMA unit with on-the-fly checksum capability. To handle the various modes of TCP/IP protocol, hardware and software co-design approach is used rather than the conventional state machine based design. To eliminate delay time due to the data transfer and checksum operation, DAM module which can execute the checksum operation on-the-fly along with data transfer operation is adopted. By programming the on-chip code ROM of RISC processor differently. the designed stack processor can support the packet format conversion operations required in the various TCP/IP protocols.

  • PDF

Network Method for Automation Factory Processor (자동화 공정을 위한 네트웍 구현)

  • Kim, Jee-Hong;Hwang, Byung-Hun
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2483-2485
    • /
    • 2003
  • As design a network system that should command and response to do tasks by PLC, to make factory automation for being distributed facilities which are not guaranteed procedure, through polling method, commands are send orderly by PLC and responses are answered by each sub-unit. It make a guarantee of sequence and drive a master-slave operation in network. This method help to distribute procedure systems and make possible dividing tasks to each unit. To make this method, network protocol's format have Master or Slave ID and tasking data and Master's command or Slave unit's report. In network interpret algorithm, skip algorithm are included and it make guarantee of protecting data though network are in noise. Data that are made by this method are send to PC to transmit long-distance user by internet.

  • PDF

Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks

  • Jung, Youn-Chan;Peradilla, Marnel
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.583-590
    • /
    • 2011
  • Full-mesh IPSec tunnels pass through a black ("unsecure") network (B-NET) to any red ("secure") networks (RNETs). These are needed in military environments, because they enable dynamically changing R-NETs to be reached from a BNET. A dynamically reconfiguring security policy database (SPD) is very difficult to manage, since the R-NETs are mobile. This paper proposes advertisement process technologies in association with the tunnel gateway's protocol that sends 'hello' and 'prefix advertisement (ADV)' packets periodically to a multicast IP address to solve mobility and security issues. We focus on the tunnel gateway's security policy (SP) adaptation protocol that enables R-NETs to adapt to mobile environments and allows them to renew services rapidly soon after their redeployment. The prefix ADV process enables tunnel gateways to gather information associated with the dynamic changes of prefixes and the tunnel gateway's status (that is, 'down'/restart). Finally, we observe two different types of performance results. First, we explore the effects of different levels of R-NET movements on SP adaptation latency. Next, we derive the other SP adaptation latency. This can suffer from dynamic deployments of tunnel gateways, during which the protocol data traffic associated with the prefix ADV protocol data unit is expected to be severe, especially when a certain tunnel gateway restarts.

A Study on the Verification Scheme of SMS Encoding and Decoding Module (SMS 부호화 복호화 모듈 검증 방법에 대한 연구)

  • Choi, Kwang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2010
  • This paper proposes a test method for compliance of SMS encoder and decoder modules with 3GPP (3rd Generation Partnership Project) specification on SMS PDU (Protocol Data Unit). The existing tools have focused on providing an SMS gateway and on helping to view and edit a single SMS PDU, which rarely help to resolve the compliance test problem. The proposed compliance test method is based on an automatic generation of SMS PDUs fully compliant with the 3GPP specification by using QuickCheck library written in Haskell. By applying the proposed method to a C-based SMS encoder and decoder in Linux Mobile platform, we have found out several critical bugs such as wrong interpretation of time stamps in BCD format. The automatic SMS PDU generator is reusable in that it only depends on the 3GPP SMS specification. The QuickCheck library is also applicable for testing other network protocol data encoders and decoders, as used in this paper.

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

A Study on IEC61850-9-2 Distributed Sampled Measured Values Applications for Merging Unit at Process Level (프로세스 레벨의 병합 단위장치를 위한 IEC61850-9-2 샘플링 값 서비스 구현에 관한 연구)

  • Kim, Gwan-Su;Lee, Hong-Hee;Kim, Byung-Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.7
    • /
    • pp.1177-1182
    • /
    • 2007
  • Recently, IEC61850 supports the standardized communication technique in both station bus and process bus, and presents the substation automation model. In this paper, we propose the required techniques to develop the Merging Unit (MU), which is one of the important data acquisition equipment in substation automation, under IEC61850 communication protocol. Especially, we also propose the precision time synchronization technique using GPS(Global Positioning System) for the MU. IEC61850-9-2 SV (Sampled Value) service is applied to the MU which is designed using microprocessor. In order to evaluate the performance of the proposed MU, the playback program, which can reconstruct the transmitted sampled value data on the basis of time information, is developed and the performance of the IEC61850 SV service for MU is verified experimentally.

Multicast Secure Architecture based on PIM-SM (소규모 멀티캐스트를 기반으로 한 멀티캐스트 보안구조)

  • 김성선;이상순;정영목
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.116-122
    • /
    • 2001
  • A conventional multicast secure protocol. MVMRP, CBT is designed for a large scaled r protocol so the PIM-SM (protect Independent Multicst-Sparse Mode) routing protocol which small number of clients, long distance path among the hosts and shortest path routing chara weak point of require it's own Core tree and re-keying when the traffic is pass through the ro In this study, proposes a architect for a licit information secure of join/leave to all the user or on-service user. With proposed architect, subgroups for multicast secure group mana will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the whole architecture size is samller than the other multicast secure architecture.

MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

  • Yoo, Seung-Mok;Chou, Pai H.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.553-563
    • /
    • 2012
  • Serial peripheral interface (SPI) has been identified as a bottleneck in many wireless sensing systems today. SPI is used almost universally as the physical connection between the microcontroller unit (MCU) and radios, storage devices, and many types of sensors. Virtually all wireless sensor nodes today perform up to twice as many bus transactions as necessary to transfer a given piece of data, as an MCU must serve as the bus master in all transactions. To eliminate this bottleneck, we propose the master-handoff protocol. After the MCU initiates reading from the source slave device and writing to the sink slave device, the MCU as a master becomes a slave, and either the source or the sink slave becomes the temporary master. Experiment results show that this master-handoff technique not only cuts the data transfer time in half, but, more importantly, also enables a superlinear energy reduction.

The Effect of Fathers' Kangaroo Care Experience of Preterm Babies on Paternal Attachment (미숙아 아버지의 캥거루 케어 경험이 부성 애착에 미치는 영향)

  • Kim, Eun Sook;Cho, Yong Ae
    • Journal of Korean Critical Care Nursing
    • /
    • v.10 no.2
    • /
    • pp.45-55
    • /
    • 2017
  • Purpose: This study was intended to standardize the Kangaroo care protocol for fathers, and to determine the effect of fathers' Kangaroo care experience on paternal attachment. Methods: The data was collected from February to April, 2013. The study subjects were 34 fathers (17 experimental group subjects, 17 control group subjects) of premature babies, bornatatertiaryhospitalinSeoul, who agreed to participate . The standardized Kangaroo care protocol, which consisted of at least three 60-minutes sessions during the hospitalization period in a neonatal intensive care unit, was carried out with the experimental group. The data was analyzed by a $x^2$-test and Mann-Whitney U test. Results: The results were as follows: 1) There were no between-group differences in the general characteristics of babies and their fathers. 2) The Kangaroo care fathers showed higher scores of paternal attachment than the control group (Z=-3.657, p=0.008). Conclusion: Fathers who attended the Kangaroo care sessions showed stronger paternal attachment than those who did not. Therefore, use of a Kangaroo care program for fathers of premature babies at neonatal intensive care units is recommended.

  • PDF

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.