• Title/Summary/Keyword: Protocol analysis

Search Result 2,499, Processing Time 0.034 seconds

Implementation of LAN-based TCP/IP Protocol Analyzer using the object-oriented programming (객체지향형 언어를 사용한 LAN 기반의 TCP/IP 프로토콜 분석기 구현)

  • 이시현;강정진;장학신;조병순;최규민;정중수
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.86-92
    • /
    • 2000
  • In this paper, we develop protocol analyzer that can analyze and monitor LAN(Local Area Network)-based TCP/IP protocol using the OOP(object-oriented programming) in Windows98/NT environment. TCP/IP(Transmission Control Protocol/Internet Protocol) protocol analyzer is consist of interface hardware, protocol analysis software and GUI(Graphic User Interface). It is designed for the real-time analysis using the real-time object. In results of Performance test, TCP/IP Protocol analyzer is showed that it can analyze and monitor without frame error in LAN-based. Also, developed protocol analyser operates better than conventional protocol analyzer in performance. It can be used in maintenance fields of communication and network.

  • PDF

A Legal Analysis on the Liability and Redress Regime under the Cartagena Protocol on Biosafety (바이오안전성의정서에서의 책임복구체제에 관한 법적 고찰)

  • Lee, Jae-Hyup
    • Journal of Environmental Policy
    • /
    • v.2 no.1
    • /
    • pp.107-135
    • /
    • 2003
  • This study reviews the proposed liability and redress regime under the Cartagena Protocol on Biodiversity. Several core elements for the regime are discussed in comparison with those listed in the 1999 Basel Protocol on Liability and Compensation for Damage resulting from the Transboundary Movements of Hazardous Wastes and their Disposal. These are (1) scope of the rules and procedures; (2) channeling of liability; (3) legal standing; (4) definition of damage; (5) standard of care; (6) ancillary sources of compensation; (7) limitation of liability; (8) financial guarantees; and (9) mutual recognition and enforcement of judgments. Korea has given relatively little attention to the issue of liability and redress in the context of LMOs trade. As the Protocol is expected to enter into force soon, Korea needs to develop appropriate implementing domestic mechanisms for the Biosafety Protocol. Establishing an adequate domestic liability and compensation scheme will be one of the most important mechanisms not only to comply the Protocol but to ensure safety of LMOs in general. A further research is needed on the basis of a comparision of relevant legislations in different countries as well as analysis of current laws related to the accidents arising from LMOs trade, such as product liability laws, food safety laws, liability provisions in some environmental legislations.

  • PDF

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

A Visual Protocol Analyzer for Session Monitoring over IMS Network (IMS 망에서 세션 모니터링을 위한 비쥬얼 프로토콜 분석기)

  • Jung, In-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.195-207
    • /
    • 2011
  • In this paper, we design and implement a visual IMS protocol analyzer, VIPA(Visual IMS Protocol Analyzer), providing a graphical view of session connection information between user equipments on IMS network. The VIPA captures SIP packets, which are used to setup sessions on IMS networks, and shows graphical view of session information to provide easy way to analyze IMS protocols. The existing protocol analyzer has limitation to show only terminal side protocol analysis information. Whereas the VIPA can provide not only terminal side but also server side analysis result so that the connection status between all the session participating user agents can be monitored.

Design of the SD Protocol Analyzer (SD 프로토콜 분석기 설계)

  • Moon, Ji-Hoon;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1697-1706
    • /
    • 2013
  • Protocol analyzer is being used to analyze proper processing of CMD & data when developing SD slave IP. In this thesis, a protocol analyzer was developed for analyzing SD protocol in Windows environment using Visual C++. SD protocol analyzer consists of embedded Linux software for storing SD memory data and MFC program for analyzing this. As for protocol analysis, it has been designed to collect data transmitted from SD memory card to host by Linux software for its analysis by MFC. It was found through the experiment that the CMD type could be confirmed that occurs when reading and writing data to SD memory card using the developed board, and debugging the problems that occur was possible.

A Study on communication Protocol of KTX TECA(Terminal Cabin) (KTX 운전자지원 단말기장치 통신프로토콜에 관한 연구)

  • Jung, Sung-Youn;Park, Shin-Ho;Kim, Hyeoung-In;Kim, Chi-Tae;Kang, Ki-Sok;Lee, Byung-Won;Lee, Dong-Soo;Jung, Do-Won
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1714-1721
    • /
    • 2007
  • TECA (Terminal Cabin), the terminal device which offers the information to the driver about the condition of High Speed Train(KTX), analyzes the system of train and plays a role of corrective maintenance guideline to a driver when a breakdown occurs. It also supports the driver to decide the situation of the train by offering a necessary information, in communicating with MPU(Main Processor Unit). For Localization of TECA, it is necessary to analyze communication protocol between TECA and MPU. As a part of analysis, communication protocol between OBCS(on-board computer system) and add-on devices has analyzed for the first step. Also with protocol analyzer appropriate method was offered for TECA and MPU protocol analysis. Finally, by appling proposed method to the drivers consol suitability was verified.

  • PDF

Development of Control and Analysis Software for Electronic Warfare Test System Using Reverse Engineering of Network Protocol (프로토콜 역설계를 이용한 전자전시험장비 제어 및 신호분석 소프트웨어 개발)

  • Jung, In-Hwa
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.58-66
    • /
    • 2008
  • In this paper, we have proposed a method and procedure which can find out the unknown network protocol. Although it seems to be difficult to identify the protocol, we can find out the rule in the packet according to the method we have proposed. We have to recognize functions of the system and make the list of events first. Then we capture the network packet whenever the event are occurred. The captured packets are examined by means of the method that is finding repeated parts, changed parts according to the input value, fixed parts and changed parts according to regular rules. Finally we make the test program to verify the protocol. We applied this method and procedure to upgrade Electronic Warfare Test System which is operated by ADD. We have briefly described the redesign of control and analysis software for Electronic Warfare Test System

A Performance Analysis of DPA(Dynamic Priority Assignment) MAC Protocol for traffic QoS Improvement on HFC-CATV Network (HFC-CATV 망에서 트래픽 QoS 향상을 위한 DAP MAC 프로토콜 성능분석)

  • Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.3-10
    • /
    • 2011
  • This paper proposes DPA(Dynamic Priority Assignment) MAC protocol to improve the traffic QoS on the HFC-CATV(Hybrid Fiber Coax CAble TeleVision) network. In results, DPA MAC protocol is the best performance compare with to IEEE 802.14a MAC in mean request delay, mean access delay. Also, the paper prove a reliability of proposed protocol through comparison between performance analysis and simulation result of DAP MAC protocol.

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.

Performance Analysis of S-LExpressnet protocol added a control station (컨트롤 스테이션을 갖는 S-LExpressnet 프로토콜의 성능 분석)

  • 유동관
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.84-89
    • /
    • 2003
  • In this Paper, an improved protocol is proposed by supplementing a control station for transmission cycle management. This protocol is proposed to complement the shortcomings of the conventional L-Expressnet protocol which is used for round robin process in bus topology. We analyzed the improved protocol in channel utilization viewpoint and compared the result with that of the conventional protocol. From this result, we showed that the channel utilization of the improved protocol is superior to that of the conventional protocol when a maximum normalized propagation delay is increased.

  • PDF