• Title/Summary/Keyword: Protocol Design and Verification

Search Result 120, Processing Time 0.043 seconds

SDL-OPNET Co-Simulation Technique for the Development of Communication Protocols with an Integrated Approach to Functional Verification and Performance Evaluation (기능 검증 및 성능 평가 통합 접근 방법을 통한 통신 프로토콜 개발을 위한 SDL-OPNET 코-시뮬레이션 기법)

  • Yang, Qi-Ping;Kim, Tae-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.157-164
    • /
    • 2010
  • While both functional verification and performance evaluation of a system are necessary for the development of effective and reliable communication systems, they have been usually performed individually through functional modeling with formal language tools and performance modeling with professional network performance evaluation tools, respectively. However, separate and duplicated modeling of a system may cause increase of the cost and inconsistency between the models. In order to overcome this problem, this paper proposes an integrated design technique that estimates the performance of a communication protocol designed in SDL with SDL-OPNET co-simulation. The proposed technique presents how to design a co-simulation system with the environment functions of Tau and the external system module of OPNET. InRes protocol was used as an example to show the applicability and usefulness of the proposed technique.

Implementation of WCDMA Air Protocol Analyzer with An Effective Equalizer Design using Characteristic of Sparse Matrix (희소 행렬의 특성을 이용하여 효율적인 등화기 설계법이 적용된 WCDMA 무선 신호 분석기 구현)

  • Shin, Chang Eui;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.111-118
    • /
    • 2013
  • This paper presents implementation of Air protocol analyzer and physical layer design algorithm. The analyzer is a measurement system providing real-time analysis of wireless signals between User Equipment (UE) and Node-B. The implemented system proposed in this paper consists of Digital Signal Processors (DSPs) and Field Programmable Gate Arrays (FPGAs). The waveform of Wideband Code Division Multiple Access (WCDMA) has been selected for verification of the proposed system. We designed the analyzer using equalizer algorithm and rake-receiver algorithm. Among various algorithms of designing the equalizer, we have chosen Linear Minimum Mean Square Error (LMMSE) equalizer that uses the inverse of channel matrix. Since the LMMSE equalizer uses the inverse channel matrix, it suffers from a large amount of computational load, while it outperforms most conventional equalizers. In this paper, we introduce an efficient procedure of reducing the computational load required by LMMSE equalizer-based receiver.

Mixed Dual-rail Data Encoding Method Proposal and Verification for Low Power Asynchronous System Design (저전력 비동기식 시스템 설계를 위한 혼합형 dual-rail data encoding 방식 제안 및 검증)

  • Chi, Huajun;Kim, Sangman;Park, Jusung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.96-102
    • /
    • 2014
  • In this paper, we proposed new dual-rail data encoding that mixed 4-phase handshaking protocol and 2-phase handshaking protocol for asynchronous system design to reduce signal activities and power consumption. The dual-rail data encoding 4-phase handshaking protocol should leat to much signal activities and power consumption by return to space state. Ideally, the dual-rail data encoding 2-phase handshaking protocol should lead to faster circuits and lower power consumption than the dual-rail 4-phase handshaking protocol, but can not designed using standard library. We use a benchmark circuit that contains a multiplier block, an adder block, and latches to evaluate the proposed dual-rail data encoding. The benchmark circuit using the proposed dual-rail data encoding shows an over 35% reduction in power consumption with 4-phase dual-rail data encoding.

The Flexible Design Architecture for a Continuous Packet Connectivity Protocol on High Speed Packet Access Platform (고속 패킷 접속 규격 플랫폼 기반 연속적인 패킷 연결 프로토콜의 유연한 구조 설계)

  • Kwon, Hyun-Il;Kim, Kyung-Ho;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.30-35
    • /
    • 2009
  • In this paper, we propose the flexible design architecture for a continuous packet connectivity (CPC) Protocol among additional features of 3GPP HSPA+. In order to meet a practical intellectual property (IP) reuse and the developing time reduction design goals, we utterly take a CPC protocol into account to be realized by reusing digital signal processor (DSP) IP of the proven high speed packet access (HSPA) platform with the minimum hardware modification and addition. Based on the Teak series DSP, the proposed CPC protocol is divided into discontinuous transmit and receive mode, CPC manager, and interface with the proven HSPA platform. According to the regularized verification flow for wireless cellular communication applications, the proposed CPC protocol has been verified in various test scenarios.

Concealing Communication Paths in Wireless Sensor Networks (무선 센서 네트워크에서의 통신 경로 은닉)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1353-1358
    • /
    • 2014
  • Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.

Implementation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability (상호 호환성 검증을 위한 IoT 기반의 CoAP 프로토콜 구현 및 실험)

  • Jin, Wen-Quan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • IETF (Internet Engineering Task Force) CoAP (Constrained Application Protocol) protocol is supported communication between sensor or actuator nodes by in a constrained environment, such as small amount of memory, and low power. CoAP and HTTP protocol can convert easily, and can use to monitor or controll the infrastructure utility through low-power sensor and actuator networks in IoT (Internet of Thing) and M2M (Machine-to-Machine) environment. IETF CoRE(Constrained RESTful environments) Working Group proposed CoAP protocol in 2010, and began to standardize it. Recently, CoAP protocol is published RFC (Request for Comments) 7252. In this paper, we design and implement of CoAP protocol for testing the interoperability in heterogeneous operating environments. For this experiment, we developed the CoAP client program based on Windows environment and CoAP server program in Linux environment to test the interoperability.

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

An Authentication Protocol using Fuzzy Signature Vault Scheme (퍼지서명볼트스킴을 이용한 인증 프로토콜)

  • Moon, Hyun-Yi;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.4
    • /
    • pp.172-177
    • /
    • 2008
  • In this paper, we design an authentication protocol based on Fuzzy Signature Vault Scheme using a light signature feature extraction method for user convenience and efficiency of electronic commerce. The signature is used broadly in electronic commerce because it is one of the simple and low-cost biometric items. However, signature has a problem that there are few low-cost and safe protocols. To solve this problem, we design a feature extraction method which is adequate for characters of signature and Fuzzy Vault Scheme. In addition, we design and analyze an efficient authentication protocol with some parameters used in this procedure. The followings are advantages when this protocol is applied to authentication procedure; 1) using convenient and low-cost signatures, 2) being possible to verify users with spending only about second for signature processing and authentication, 3) one time on transmission for sign-in and verification and 4) getting user authentication with secret value at the same time.

Design and Verification of Interworking Protocol of Frame Relay and ATM Network (프레임릴레이와 ATM망간 연동 프로토콜 설계 및 검증)

  • 강성용;최동영;김동영;변지섭;박석천
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.93-96
    • /
    • 1999
  • ATM을 근간으로한 초고속 정보 통신망은 융통성 및 효율성, 고속의 정보 전송 능력으로 인해 미래의 통신망으로 자리잡을 것으로 예상되며, 이와 같은 초고속 정보 통신망은 완전히 구축되기 전까지는 프레임릴레이 등과 같은 기존의 망들과 혼용해서 사용될 것이기 때문에 망 발전의 중간 단계에서 경제성이나 기술의 효용성 문제로 기본망과의 연동 연구는 매우 중요하다고 할 수 있다. 이에 따라 본 논문에서는 교환 가상 채널(Switched Virtual Channel SVC) 기반의 제어평면 연동을 고려하여 프레임 릴레이와 ATM간의 신호 연동을 중심으로 망간 연동 프로토콜을 설계하고 검증하였다.

  • PDF

Formal Design and Verification of MESI Protocol Designed by ESTEREL (ESTEREL을 이용한 MESI프로토콜의 정형 설계 및 검증)

  • 김민숙;김진현;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.40-42
    • /
    • 2001
  • 캐쉬 일관성 프로토콜의 하나인 MESI 프로토콜은 다중 프로세싱 환경에서 각각의 프로세서와 메모리 사이의 데이터 일관성을 유지하기 위해 캐쉬, 메모리 등의 통신 개체들을 조정하는 일종의 규칙들 중 하나이다. 프로세서의 수가 많아지고 시스템이 복잡해 질 경우 MESI 프로토콜을 정확하게 설계하고 그 동작을 분석하기는 매우 어렵다. 본 연구에서는 정형기법 도구인 ESTEREL을 이용하여 MESI 프로토콜을 설계하고 그 동작의 안정성을 검증하여, 시스템의 정확성과 안정성을 보장하는 방법에 대해 논한다.

  • PDF