• Title/Summary/Keyword: Standard protocol

Search Result 1,362, Processing Time 0.027 seconds

SCTS Conformance Test for OMA DS Standard for an Embedded Data Synchronization Gateway (임베디드 자료동기화 게이트웨이를 위한 OMA DS 표준 SCTS 적합성 테스트)

  • Pak, Ju Geon;Park, Kee Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.217-224
    • /
    • 2010
  • Nowadays, people perform their tasks anywhere anytime using their mobile devices. For this reason, data synchronization (DS) between mobile devices and a central server has become one of the most essential technologies in mobile environments. Currently, several mobile DS protocols are proposed and used. However, the existing DS protocols cannot guarantee interoperability between them. To solve the problem, an embedded DS gateway has been developed in our previous study. The gateway runs on a Windows Mobile-based emulator. It converts data on a mobile device into common data specified by OMA DS standard protocol and vice versa. The embedded gateway has been built to support the OMA DS standard protocol. In order to verify that the embedded gateway conforms to the OMA DS standard protocol, two kinds of OMA conformance tests have to be conducted - interoperability test with an OMA DS-based server and conformance test with SCTS (SyncML Conformance Test Suit). In this paper, some parts of the gateway previously built are modified and the modified gateway is installed on a Windows Mobile-based smart phone. And the interoperability test and the conformance test with the SCTS are conducted. The results of the tests show that the embedded DS gateway operates properly on the Windows Mobile-based smart phone and that the gateway passes the tests, verifying its conformity to the OMA DS standard protocol. In addition, DS performance tests show that DS delay times between a real smart phone and a DS server increase gently as the number of DS data increases. In other words, the embedded DS gateway built in this paper can be used for a real smart phone at a reasonable performance cost.

Implementation of the Label Distribution Protocol for the Multiprotocol Label Switching (Multiprotocol Label Switching System을 위한 Label Distribution Protocol 구현)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2249-2261
    • /
    • 1999
  • In this paper, we describe the design and implementation of the Label Distribution Protocol (LDP) for Multiprotocol Label Switching System. We review the implementation issues of LDP that is required to make a gigabit switched router, and propose a detail design of it. We present the data structures and procedures for the LDP as a result, which are based on IETF standard. We present design issues for applying this to carrier class products. The implemented protocol could afford 40,000 entries of the IP routing table that is required for deploying this system to commercialized data network. Furthermore this system implemented using the standard API of Unix, as a result, it has portability. By implementing LDP based on the international standard and these implementation issues, we expect that the implemented LDP will be interoperable with other commercialized products. We prove the validity of the design of the LDP through prototyping, and also verify the prototype with the specification using the process algebra and the performance analysis.

  • PDF

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

Oral health care intervention protocol for older adults at home in dental hygienists: a narrative literature review (치과위생사의 재가방문 구강건강관리 중재 활동을 위한 프로토콜 고찰 )

  • Jong-Hwa Jang
    • Journal of Korean society of Dental Hygiene
    • /
    • v.23 no.5
    • /
    • pp.333-341
    • /
    • 2023
  • Objectives: This study aims to propose a standard protocol for oral health care intervention activities by dental hygienists. Methods: A narrative literature review of home visit oral health care intervention activities reported in Cheonan, South Korea was conducted to enable the proposal of a standard home visit protocol for dental hygienists in the context of community care. Results: Oral health management intervention activities contributed to improving the quality of life, as well as the oral health, of older adults living at home. This was a result of applying a protocol consisting of oral observation, oral massage, expert oral hygiene management, oral muscle function training, and final stages. Conclusions: The visiting oral health intervention protocol was effective in resolving oral health problems of older adults. In the future, customized programs and reimbursement systems should be developed to promote oral health care for older adults that can be provided at home.

Develpoment of Automatic Meter Reading Program for Electronic Power Meter (전자식 전력량계용 한전 프로토콜 및 운영 프로그램 개발)

  • Yu, In-H.;Jang, Mun-J.;Hyun, Duk-H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2219-2221
    • /
    • 2001
  • A communication protocol for automatic meter reading is designed for electronic power meter. Communicational functions and data structures are standardized and data reading software is developed according to the developed protocol. The communication protocol is designed with reference specifications, IEC 62056-31 and Distributed Network Protocol(DNP). For design, communicational functions and specifications of the industrial meters were analyzed for the purpose of developing a new one for KEPCO meters. The protocol is designed with 3 layer model, physical layers, data link layer and application layer. A documentation was completed with data gathering, data classification, authentication, error detection. An emulator system was made for testing the protocol. A meter reading software was developed using the protocol. Many different protocols and meter reading softwares are integrated into one with the developed protocol and software as KEPCO's standard.

  • PDF

Performance Analysis of Data Link Protocol for Interface between EIS and LDTS (전자연동장치와 역정보전송장치간 인터페이스를 위한 데이터링크 프로토콜 성능해석)

  • Hwang, Jong-Gyu;Lee, Jae-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.6 no.2
    • /
    • pp.135-141
    • /
    • 2003
  • According to the computerization of railway signaling systems, the interface link between these signaling equipment is also replaced by digital communication channel, expecially communication link for interface between EIS and LDTS, but there are some problems in the present state of railway signaling. First of all, different communication protocol is applied to interface between above two signaling equipment although they have same functions. The other is that the communication protocol currently used in railway field has some unreasonable points such as structure, formation of byte, error correction scheme and etc. To solve these problems, the standard communication protocol for railway signaling is designed. The structure of designed communication protocol and the results of performance analyses are represented in this paper. It will be expected the increase of safety, reliability and efficiency of maintenance of signaling system by using of the designed communication protocol for railway signaling.

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11 (IEEE 802.11 환경에서 빠른 핸드오프를 제공하는 그룹키 기반의 인증 프로토콜)

  • Lee, Chang-Yong;Kim, Sang-Jin;Oh, Hee-Kuck;Park, Choon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.103-113
    • /
    • 2008
  • Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.

Implementation of Bandwidth Allocation Scheme in the MS/TP Protocol (MS/TP 프로토콜에서 대역폭할당기법구현 및 실험적 검증)

  • Hong, Seung-Ho;Song, Won-Seok;Kwon, Young-Chan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.52-55
    • /
    • 2004
  • Digital communication networks have become a core technology in advanced building automation systems. BACnet(${\underline{B}}uilding$ ${\underline{A}}utomation$ and ${\underline{C}}ontrol$ ${\underline{net}}works$) is a standard data communication protocol designed specifically for building automation and control systems. BACnet adopts Master-Slave/Token-Passing (MS/TP) protocol as one of its field level networks. In this study, we introduce a method of implementing bandwidth allocation scheme in the MS/TP protocol. The bandwidth allocation scheme improves the capability of real-time communication of the original MS/TP protocol. The bandwidth allocation scheme introduced in this paper can be easily implemented in the existing MS/TP protocol with a slight modification. In this study, we actually developed the hardware and firmware of MS/TP module in which bandwidth allocation scheme is implemented.

  • PDF

Implementation of Fault Tolerant BBMD Mechanism in BACnet/IP Protocol (BACnet/IP 프로토콜에서 BBMD의 결함허용 기능 구현)

  • Cho, Su-Un;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.107-109
    • /
    • 2005
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides BACnet/IP Protocol for data communication through the internet. BACnet device transmits BACnet broadcast messages and BACnet/IP messages using conventional IP technologies. Specially, BBMD(BACnet Broadcasting Management Device) is used to deliver BACnet broadcast messages. In this study, we propose a mechanism of fault tolerant BBMD in the BACnet/IP protocol. The Fault Tolerant BBMD mechanism(FTBM) improves the connectivity of BACnet/IP networks by inheriting the operation of BBMD in the networks. The FTBM is implemented with added functions to the original BACnet/IP protocol so that it can be applied together with original BACnet/IP devices. We also prove the FTBM's backward compatibility with original BACnet/IP protocol using experimental analysis.

  • PDF