• Title/Summary/Keyword: Protocol Design

Search Result 2,575, Processing Time 0.029 seconds

Design and Implementation for Relay Network Protocol based on Ad-hoc Network (Ad-hoc Network 기반 Relay Network Protocol 설계 및 구현)

  • Won, Yun-Jae;Lim, Seung-Ok;Kim, Yong-Sung;Cho, Jin-Woong
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.225-226
    • /
    • 2008
  • 본 논문은 스케줄링 기반 Ad-hoc Network에서의 Relay Network Protocol에 관한 것으로, Koinonia V2.0의 MAC Layer Protocol을 기반으로 Relay Network Protocol을 설계하였다. Ad-hoc Network 기반의 Relay Network Protocol은 단일 주파수 채널을 이용한 Relay Network Protocol과 듀얼 주파수 채널을 이용한 Relay Network Protocol이 있다. 전자는 하나의 모뎀 칩을 사용하여 시스템이 단순하고 전력소모가 적은 반면, 데이터 전송 속도가 낮아지고, 후자는 데이터 전송 속도에서 손해를 보지 않는 반면, 시스템이 복잡하고 전력소모가 많은 단점이 있다. 본 연구를 통해 Ad-hoc Network 기반의 Relay Network Protocol 구현에 대한 방법론을 제시할 수 있었다.

  • PDF

A Design for Interworking Scenario of AINI Signalling Protocol (AINI 신호 프로토콜의 연동 시나리오 설계)

  • 김정윤;주성순
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.225-228
    • /
    • 1998
  • This paper specifies the interface and procedures of AINI signalling protocol, which is defined for supporting interworking between ATM public network based BISUP and ATM private network based P-NNI. Also it is discussed in this paper that the required considerations such as message, information element and QoS to design AINI interworking scenario, and evolution direction.

  • PDF

Implementation of SEND Protocol in IPv6 Networks (IPv6 네트워크에서 SEND 프로토콜의 구현)

  • An, Gae-Il;Nah, Jae-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.403-410
    • /
    • 2007
  • Neighbor Discovery (ND) protocol was proposed to discover neighboring hosts and routers in IPv6 wire/wireless local networks. ND protocol, however, has a problem that it is vulnerable to network attacks because ND protocol allows malicious users to impersonate other legitimate hosts or routers by forging ND protocol messages. To address the security problem, Secure Neighbor Discovery (SEND) protocol was proposed. SEND protocol provides address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism to protect ND protocol. In this paper, we design and implement SEND protocol in IPv6 local networks. And also, we evaluate and analyze the security vulnerability and performance of SEND protocol by experimenting the implemented SEND protocol on IPv6 networks.

Implementation of the Label Distribution Protocol for the Multiprotocol Label Switching (Multiprotocol Label Switching System을 위한 Label Distribution Protocol 구현)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2249-2261
    • /
    • 1999
  • In this paper, we describe the design and implementation of the Label Distribution Protocol (LDP) for Multiprotocol Label Switching System. We review the implementation issues of LDP that is required to make a gigabit switched router, and propose a detail design of it. We present the data structures and procedures for the LDP as a result, which are based on IETF standard. We present design issues for applying this to carrier class products. The implemented protocol could afford 40,000 entries of the IP routing table that is required for deploying this system to commercialized data network. Furthermore this system implemented using the standard API of Unix, as a result, it has portability. By implementing LDP based on the international standard and these implementation issues, we expect that the implemented LDP will be interoperable with other commercialized products. We prove the validity of the design of the LDP through prototyping, and also verify the prototype with the specification using the process algebra and the performance analysis.

  • PDF

Detecting artefacts in analyses of extreme wind speeds

  • Cook, Nicholas J.
    • Wind and Structures
    • /
    • v.19 no.3
    • /
    • pp.271-294
    • /
    • 2014
  • The impact of artefacts in archived wind observations on the design wind speed obtained by extreme value analysis is demonstrated using case studies. A signpost protocol for detecting candidate artefacts is described and its performance assessed by comparing results against previously validated data. The protocol targets artefacts by exploiting the serial correlation between observations. Additional "sieve" algorithms are proposed to identify types of correctable artefact from their "signature" in the data. In extreme value analysis, artefacts displace valid observations only when they are larger, hence always increase the design wind speed. Care must be taken not identify large valid values as artefacts, since their removal will tend to underestimate the design wind speed.

Empirical approach to Cognitive Process for Problems of Marine Design (해양디자인 문제해결을 위한 인지적 프로세스에 관한 실증적 접근)

  • Kim, Kiesu
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.126-134
    • /
    • 2012
  • The researchers of this study closely looked into the methods for cognitive-scientific approach to problems of marine design at a time when the overall values of marine cultures are acknowledged in full scale. To that end, the researchers analyzed the problems and problem-solving process for the initial approach to marine design. At the same time, the researchers made the matrix of the design-developmental directions by cognitive scientific approach. After selecting the subjects, the researchers collected verbal protocol and behavior protocol which were shown in the process of a designer's thinking. This was for the sake of protocol analysis which is the representative research technique of cognitive science. Based on the collected data, the researchers empirically analyzed the behavior patterns shown in the marine design process so as to develop the design behavior-graph pattern of designers in an objective and systematic way. The behavior graph was helpful for looking into the initial developmental directions of design and for predicting cognitive structure of designers. The researchers hope that this study will become a fundamental material for predicting cognitive directions of designer for planning and designing the marine design.

A Design of General Communication Protocol for Online Game (온라인 게임을 위한 범용 통신 프로토콜 설계)

  • 두길수;정성종;안동언
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.233-236
    • /
    • 2001
  • When we execute a online game in the network, a lots of game informations and user informations are transfered between game server and game clients. This information has deferent data structure and communication protocol. So, game developers will be design the communication protocols and packet structures after analyze the game. And, they will be design the database for user management. It will be lots of overload to the game developers. From a user point of view, they must be register to each game server to use several games. It is a undesible operation for the game users. This problems are solved by using the communication server which operates commonly with several game servers. Game providers can get the benefit of multiple access of users and get freedom from user management. Game users can access the several games which connected to communication server by register the communication server only. In this paper we design the communication packet and propose a communication protocol which operates on the communication server described previous.

  • PDF

VLSI Design of Processor IP for TCP/IP Protocol Stack (TCP/IP프로토콜 스택 프로세서 IP의 VLSI설계)

  • 최병윤;박성일;하창수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.927-930
    • /
    • 2003
  • In this paper, a design of processor IP for TCP/IP protocol stack is described. The processor consists of input and output buffer memory with dual bank structure, 32-bit RISC microprocessor core, DMA unit with on-the-fly checksum capability. To handle the various modes of TCP/IP protocol, hardware and software co-design approach is used rather than the conventional state machine based design. To eliminate delay time due to the data transfer and checksum operation, DAM module which can execute the checksum operation on-the-fly along with data transfer operation is adopted. By programming the on-chip code ROM of RISC processor differently. the designed stack processor can support the packet format conversion operations required in the various TCP/IP protocols.

  • PDF

Development of Internet-Based Propeller Design System (인터넷 기반 프로펠러 설계 시스템 개발)

  • 이왕수;박범진;이창섭
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.40 no.6
    • /
    • pp.69-79
    • /
    • 2003
  • Existing large-scale complex programs usually reside In a single computer, and the user has to be physically in contact with the computer. With the wide spread use of the internet, the need to carry out the design and analysis tasks geographically away from the main computer is increasing. In this paper existing Windows-based propeller design and analysis package is separated into the server-client modules and the protocol program is developed to implement the communication between multi-client computers and a single server computer. A new protocol packet is designed to use the Windows socket and the server/client programs control the receive/send operations using the information transmitted in the packet. Test runs show that the remote user, connected to the server computer through the internet only, can perform the required tasks.