• Title/Summary/Keyword: Study protocol

Search Result 4,206, Processing Time 0.03 seconds

Implementation of Bandwidth Allocation Scheme in the MS/TP Protocol (MS/TP 프로토콜에서 대역폭할당기법구현 및 실험적 검증)

  • Hong, Seung-Ho;Song, Won-Seok;Kwon, Young-Chan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.52-55
    • /
    • 2004
  • Digital communication networks have become a core technology in advanced building automation systems. BACnet(${\underline{B}}uilding$ ${\underline{A}}utomation$ and ${\underline{C}}ontrol$ ${\underline{net}}works$) is a standard data communication protocol designed specifically for building automation and control systems. BACnet adopts Master-Slave/Token-Passing (MS/TP) protocol as one of its field level networks. In this study, we introduce a method of implementing bandwidth allocation scheme in the MS/TP protocol. The bandwidth allocation scheme improves the capability of real-time communication of the original MS/TP protocol. The bandwidth allocation scheme introduced in this paper can be easily implemented in the existing MS/TP protocol with a slight modification. In this study, we actually developed the hardware and firmware of MS/TP module in which bandwidth allocation scheme is implemented.

  • PDF

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

An Energy Efficient Multi-Chaning Routing Protocol using Angle of Arrival for WSN (WSN 환경에서 AoA를 이용한 에너지 효율적 멀티체이닝 라우팅 프로토콜)

  • Chae, Ji-Hoon;Kwon, Tae-Wook
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.11
    • /
    • pp.1564-1571
    • /
    • 2022
  • Wireless sensor network(WSN) is being used in various fields such as reconnaissance, echelon scale identification, weather observation, etc. using small sensors in an environment without a network infrastructure environment. In addition, WSN uses limited battery power, so study on routing protocols to extend the lifetime of the network is important. PEGASIS, a hierarchical routing protocol, accounts for the majority of energy-efficient routing protocol studies and is well known as a representative protocol. In this study, based on PEGASIS, we propose a protocol that constructs multiple chains rather than one chain using the AoA of nodes. The proposed protocol has the advantage of reducing the transmission distance of nodes and eliminating unnecessary transmissions, thereby increasing energy efficiency compared to the existing protocols.

The development and validation of a prehospital emergency delivery protocol for paramedics (병원 전 응급구조사의 응급분만 프로토콜 개발 및 타당도 검증)

  • Keun-Young Kim;Byung-Soo Kim
    • The Korean Journal of Emergency Medical Services
    • /
    • v.27 no.2
    • /
    • pp.79-89
    • /
    • 2023
  • Purpose: This study aimed to develop a standardized protocol of systematic and explicit roles and procedures for paramedics for the maternal and newborn management during prehospital emergency delivery situations. Methods: This study is a methodological study with detailed step-by-step items proposed by an expert group based on evidence from a literature review. The content validity of the proposed preliminary prehospital emergency delivery protocol was verified before the final protocol was confirmed. Results: All 23 detailed items of the preliminary protocol met the reference cut-off (CVI value of 0.8 or higher). After considering, revising, and supplementing expert opinions for each of the 23 items 23 detailed in the proposed protocols, four steps were confirmed. The steps included five items for the management of the imminent mother, 10 items for delivery progress, five items for newborn management, and three items for postpartum management of the mother. Conclusion: This study's findings may serve as reference for developing future specialized training programs for paramedics, to ensure enhanced competence in prehospital emergency delivery situations. The protocol should be reviewed and revised periodically to ensure currency.

Analysis of TCP packet by Protocol Analysis module Design (프로토콜 분석모듈 설계에 의한 TCP 패킷 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

A study on implementation of MAP-MMS protocol (MAP-MMS 프로토콜의 구현에 관한 연구)

  • 고우곤;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.520-523
    • /
    • 1989
  • MAP(Manufacturing Automation Protocol), Network Protocol for FA has 7 Layer Structure of OSI. Being an Application Layer Protocol for Communication Interfaced with the Actual Programmable Devices, MMS(Manufacturing Message Specification) Consists of Three Factors of Services, Interfaces, and Protocol. For Details, It Classifies with the Followings ; Connection/Context Management, Remote Variable Access, Semaphore Management, File transfer and Management, Program UP/DOWN Load, Remote Program Fxecution. In this Paper Designing MAP Network Station of Programmable Device, we Analyze the Protocol of MMS, and Realize the State Diagram of each Services and Propose the Model of MMS Function Call Instructions.

  • PDF

A study on Design of the Interface Module supporting the Traffic management (트래픽 관리를 지원하는 인터페이스 모듈 설계에 대한 연구)

  • 박노식;손승일
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.394-397
    • /
    • 2003
  • This paper has been studied a interworking signalling protocol between two hybrid networks by analyzing Satellite B-ISDN architecture, DSS2 Layer 3 Signalling protocol, B-ISUP protocol, S-BISUP protocol stack and so on. Also in the paper, messages and primitives have been defined for B-ISDN's Connection Type, Ownership and each protocol in order to connect point-to-multipoint. And then this paper has designed basic call procedures for OBP Satellite B-ISDN NNI interworking protocol, verified and implemented them.

  • PDF

A Study of TCP Performance with Snoop Protocol over Fading Wireless Links

  • Cho, Yang-Bum;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.214-218
    • /
    • 2004
  • In this paper, we have analyzed TCP performance over wireless correlated fading links with and without Snoop protocol. For a given value of the packet error rate, TCP performance without Snoop protocol is degraded as the fading is getting fast (i.e. the user moves fast). When Snoop protocol is introduced in the base station, TCP performance is enhanced in most wireless environments. Especially the performance enhancement derived from using Snoop protocol is large in fast fading channel. This is because packet errors become random and sporadic in fast fading channel and these random packet errors (mostly single packet errors) can be compensated efficiently by Snoop protocol's local packet retransmissions. But Snoop protocol can't give a large performance improvement in slow fading environments where long bursts of packet errors occur. Concerning to packet error rate, Snoop protocol results in the highest performance enhancement in the channel with mid-high values of packet error rate. This means Snoop protocol cannot fully fulfill its ability under too low or too high packet error rate environments.

A Study on Routing Protocol using C-NODE for Mobile Ad-Hoc Networking (Mobile Ad-hoc Networking에서의 C-NODE를 이용한 Routing Protocol에 관한 연구)

  • Choi, Bong-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.195-201
    • /
    • 2006
  • This thesis proposes hybrid routing protocol that mix proactive routing protocol and reactive routing protocol used in Ad hoc network. Proposed method is that establish special node offering network service of nods which construct Ad hoc network and do routing different from existing hybrid routing protocol, ZRP. Special node doing these parts is called C-node. Routing using C-node can accompany efficient routing by decreasing path institution time and flooding time than existing routing protocol.

  • PDF

A Study of Relay Efficiency in WCDMA Core Networks Using BICC Signaling Protocol (BICC 적용을 통한 WCDMA 교환망 중계 효율성 제고방안 연구)

  • Cho, Jeong-Je;Kim, Nak-Po
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.147-148
    • /
    • 2007
  • BICC protocol is a relay protocol adaptable to ATM and IP based core networks compared to ISUP protocol to TDM networks. Using BICC protocol, multi-rate bearer traffic such as voice and video can flow in the relay core networks. BICC protocol is standardized as WCDMA circuit switching networks in 3GPP Release 4. Thus KTF is now operating core networks using BICC protocol. In this paper, we describe the background and characteristics of BICC protocol. We also provide the status of KTF WCDMA core networks using BICC. To show the efficiency of BICC protocol an analytical simulation is given in which the results can be expected by intuitive observation.

  • PDF