• 제목/요약/키워드: Protocol design

검색결과 2,587건 처리시간 0.024초

공중망을 이용한 화일전송 프로토콜의 설계 및 구현에 관한 연구 (Design and Impementation of File Transfer Protocol Through Public Network)

  • 이인행;양해권;김동용
    • 한국통신학회논문지
    • /
    • 제15권3호
    • /
    • pp.187-196
    • /
    • 1990
  • 이 연구는 공중망에 연결된 PC들 사이의 파일전송프로토콜의 설계 및 구현에 관한 것이다. 3B20S/UNIX을 호스트컴퓨터로 하여 공중망에 접속된 MS-DOS하의 PC들 사이에 파일처리시스템을 구현한 것으로 이때의 프로토콜로는 파일전송을 지원하는 Kermit 프로토콜에 윈도우기능및 파일관련 기능을 갖도록 확장한 것이다. 사용자들은 PC로부터 호스트컴퓨터로 데이터를 송신하고 호스트컴퓨터의 파일을 수신, 조회, 삭제할 수 있게 된다.

  • PDF

이동통신망 프로토콜 적합성 시험을 위한 시뮬레이터 설계 (Design of protocol simulator for mobile communication system)

  • 송평정;한영열
    • 전자공학회논문지A
    • /
    • 제32A권2호
    • /
    • pp.1-10
    • /
    • 1995
  • Since there is currently no commercial protocol simulator for CDMA mobile communication system, we need to develop a General-Purposed Protocol Test Simulator (G-PTS). This paper is concerned with the design and implementation of this G-PTS contains the multi-scenario generating functions, multi-tasking kernel and multiple interface functions. Thus it can be utilized in the test category using multiple base-stations such as soft-handoff, 3-way handoff and mulit-party call features. G-PTS is verified using the model of CDMA soft handoff scenario and the result shows its reliable operations.

  • PDF

해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상 (Security Enhancing of Authentication Protocol for Hash Based RFID Tag)

  • 전진오;강민섭
    • 인터넷정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.23-32
    • /
    • 2010
  • 본 논문에서는 해쉬 기반 RFID 태그를 위한 보안성이 향상된 인증 프로토콜을 제안하고, 제안한 인증 프로토콜 기반으로 한 RFID 태그의 디지털 코덱을 설계한다. 제안한 프로토콜은 태그와 back-end 서버 사이에서 3-way 질의 응답 인증 프로토콜을 기본으로 하고 있으며, 안전한 인증 메커니즘을 구현하기 위해, ISO/IEC 18000-3 표준에서 규정된 3가지 타입의 프로토콜 패킷을 개선된 형태로 수정한다. 제안한 방법은 Man-in-the-middle과 Replay attacks과 같은 능동 공격의 방어에 특히 유효하다. 제안된 프로토콜의 효과를 검증하기 위하여 RFID 태그에서의 디지털 코덱은 Verilog HDL을 사용하여 설계하였고 Hynix $0.25\;{\mu}m$ standard-cell library을 갖춘 Synopsys Design Compiler을 이용하여 합성하였다. 보안 분석 및 실험결과를 통해, 본 논문에서 제안된 방법이 사용자의 데이터 보안, 태그 익명성, Man-in-the-middle attack 예방, replay attack, 위조방지 및 위치 추적 등에 서 성능이 개선됨을 보였다.

전문가 설문조사에 기반한 재난 경험자에 대한 침치료 임상연구 프로토콜 개발 (Clinical Trial Protocol Development of Acupuncture for Disaster Survivors: Results from an Expert Survey)

  • 곽희용;권찬영;임정태;김상호
    • 동의신경정신과학회지
    • /
    • 제35권1호
    • /
    • pp.15-26
    • /
    • 2024
  • Objectives: The objective of this study is to develop a specialized clinical research protocol for acupuncture treatment specifically designed for disaster survivors based on insights from an expert survey. Methods: An expert panel comprising specialists in neuropsychiatry, acupuncture, and clinical research methodology was assembled. Initial data to inform the clinical research protocol design was collected utilizing open-ended responses, multiple-choice questions, and a 5-point Likert scale to gauge agreement levels. Next, this data was disseminated to a panel of experts. A cohesive clinical research protocol was then formulated during a core panel meeting by integrating insights from a panel of 10 experts. Results: The protocol developed herein entails a non-randomized controlled study involving participants aged 19~64 years old who have been identified as high-risk or cautious according to the National Trauma Center screening test. The study design includes the establishment of an active control group, which allows for the assessment of an additional effect through comparison with conventional therapy. The selected acupuncture approach involves a combination of manual acupuncture and ear acupuncture. For clinical outcome assessment, the Clinician-Administered Posttraumatic Stress Disorder Scale for DSM-5 was proposed to gauge trauma symptoms. Representative scales for various domains such as depression, anxiety, anger, insomnia, pain, and quality of life were also provided for reference. Conclusions: The developed protocol is anticipated to streamline the swift design and initiation of clinical trials during disaster scenarios. It is also designed to be scalable, thereby enabling its application in both non-randomized control group studies and single-group before-and-after comparisons.

철도신호설비 상호간 정보전송을 위한 통신 프로토콜 검증시험 (Verification Test of Communication Protocol for Interface between EIS and LDTS)

  • 황종규;이재호;윤용기;신덕호
    • 한국철도학회논문집
    • /
    • 제7권2호
    • /
    • pp.114-119
    • /
    • 2004
  • According to the computerization of railway signalling systems. the communication protocol for interface between these systems are required. Therefore the new communication protocol for railway signaling system is required. Generally, there are two verification method for new designed protocol in the industrial and academic fields. One is the laboratory testing method which is very popular and general technique. In our research the comparison between existing and new designed protocol for signaling is described and the verification test results are also represented. From these laboratory test, we are verified the conformance of new designed protocol. Another method is verified by formal method. The format verification method is widely used at safety-critical system design but this approach is nor popular at verification communication protocol. However it is very important to verify the safety of new designed protocol for railway signaling system because signaling systems are very safety-critical systems. So, the methodology for formal verification of designed protocol is also reviews in this paper.

초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜 (Priority oriented dobule reservation probocol for very high speed wireless LANs)

  • 조광민;정상일;강철신
    • 한국통신학회논문지
    • /
    • 제22권1호
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

PTF(Protocol Test Facility)의 구조 설계 및 X.25 Packet Level Test (A Study on the Architectural Design of the PTF(Protocol Test Facility) and X.25 Packet Level Test)

  • 최양희;진병문
    • 한국통신학회논문지
    • /
    • 제10권5호
    • /
    • pp.240-249
    • /
    • 1985
  • 본 논문은 프로토콜 테스트의 기본 조건, 프로토콜 테스트 방법을 언급하며, PTF의 시스템 구성에 대하여 제시하였다. 또한 X.25 DTE Packet Level에 대한 프로토콜 테스트 계열 및 프로토콜 테스트 결과에 대하여 언급하였다.

  • PDF

수중 이동체 통신망을 위한 접속제어 프로토콜의 설계 및 구현 (Design and implementation of the MAC protocol for underwater vehicle network)

  • 신동우;임용곤;김영길
    • 한국해양공학회지
    • /
    • 제11권4호
    • /
    • pp.180-188
    • /
    • 1997
  • This paper proposes a new efficient MAC(Media Access Control) protocol to establish the ultrasonic communication network for underwater vehicles, which ensures a certain level of maximum throughput regardless of the propagation delay of ultrasonic and allows fast data transmission through the multiple ultrasonic communication channel. A MAC protocol for underwater communication network that allows 'peer-to-peer' communication between a surface ship and multiple underwater systems is designed, and the proposed control protocol is implemented for its verification.

  • PDF

듀티사이클 무선센서네트워크에서 저전력과 저지연을 위한 다중경로 라우팅 프로토콜의 설계 (Design of a multipath routing protocol for energy-efficiency and low-delay in duty-cycled wireless sensor networks)

  • 이형근
    • 전기전자학회논문지
    • /
    • 제24권1호
    • /
    • pp.326-332
    • /
    • 2020
  • 본 논문은 듀티사이클 기반의 무선센서네트워크에서 에너지 효율성을 높이고 시간 지연을 줄일 수 있는 경로설정을 위해 새로운 라우팅 메트릭을 고안하고 이를 활용한 라우팅 프로토콜을 제안한다. 듀티사이클을 고려한 새로운 라우팅 메트릭인 EDW 메트릭을 사용함으로써 에너지 효율적이며 저지연의 경로를 설정할 수 있다. 본 논문에서는 새로운 라우팅 메트릭을 적용하는 크로스레이어 기반의 다중경로 라우팅 프로토콜을 제안하고 실험을 통해 낮은 전송 지연시간과 적은 에너지소비를 확인하였다.