• Title/Summary/Keyword: message protocol

Search Result 945, Processing Time 0.028 seconds

Performance Evaluation of a New AODV Protocol with Auxiliary Metrics

  • Ngo, Van-Vuong;Jang, Jaeshin
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.14-20
    • /
    • 2016
  • The AODV protocol uses many RREQ messages and one RREP message in the path-discovery process. This protocol has only one metric, the number of hops. Although it is simple, this protocol is not efficient. To avoid this problem, we propose a new AODV with two auxiliary metrics (AuM-2-AODV). The AuM-2-AODV protocol tries multiple route replies, which reduces the chance of path failure and helps the network obtain a better data rate. It has two auxiliary metrics, the remaining energy of its nodes and the number of HELLO messages received at the nodes. With these two metrics, the reliable path from the source node to the destination node will be chosen. In this paper, the performance of the AuM-2-AODV is evaluated using the NS-3 simulator. The performance results show that AuM-2-AODV provides greater throughput and packet delivery ratio by 20% and up to 50% and about 100% in some cases, respectively, than previous protocols.

An Implementation of Home network Control Protocol(HnCP) and It's Application to an Intelligent lighting system. (저속 전력선통신 기반의 Home network Control Protocol(HnCP) 구현 및 지능형 조명에의 적용)

  • Kim, Woo-Young;Park, Won-Jang;Jeung, Bum-Jin;Lee, Young-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.403-405
    • /
    • 2004
  • This paper describes an implementation of Home network Control Protocol(HnCP) and it's application to an Intelligent lighting system. The HnCP was announced by korea PLC forum in June 2003 to provide a network protocol for PLC based home appliances. The HnCP master and HnCP slaves were implemented using XPLC30 which is an SOC with ARM9 core. The efficacy of the developed HnCP network modules were shown by applying them to a intelligent lighting system composed of dimmable fluorescent lamps. An extended message set was proposed for the intelligent lighting system and we proposed some directions for the future development of HnCP.

  • PDF

Public-Key Based Registration/Session-Key Distribution Protocol in AAA for Mobile IP (Mobile IP AAA에서의 등록과 세션키 분배 프로토콜)

  • 황재훈;송홍엽
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.220-225
    • /
    • 2002
  • Mobile IP aims to support mobility within the Internet. This paper concerned with the security aspect of Mobile IP. We show that current registration protocol has a possible replay attack despite the use of authenticated registration message and replay protection. We propose a public-key based registration protocol that also distributes a session-key distribution protocol in AAA. Proposed protocol provides authentication of mobile node and session-key distribution simultaneously. It also provides non-repudiation of service request.

The Authentication Mechanism Using Public-Key infrastructure in Mobile IP Registration Protocol (Mobile-IP 등록 프로토콜에서 공개키를 이용한 인증 방안)

  • 박상준;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.211-219
    • /
    • 2002
  • Mobile IP(RFC2002) is representative protocols that support mobility to host. In this paper, we propose a mobile IP registration protocol using public-key based certificates and CA(certification authority). Our proposed protocol authenticates the registration message of mobile node and prevents replay attack and minimal use of public key cryptography, Also, Our proposed protocol directly authenticates between agents and mobile nodes using certificates. Though the computer simulation, we prove that our proposal has better performance than the previous public-key based Mobile IP registration protocol.

A Study on the MMS Protocol for Factory Automation Network (생산자동화 네트워크를 위한 MMS 프로토콜에 관한 연구)

  • 강문식;고우곤;박민용;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.10
    • /
    • pp.774-781
    • /
    • 1991
  • A communication network protocol among programable devices built-i manufacturing field, MAP (Manufacturing Automation Protocol), has to provide the job transfer service carrying out a lot of jobs distributively, and the MMS( manufacturing message specification) defines the above application layer protocol. In this paper user software required in job transfer was implemented. So as to provide each service with compatibility and extension, each module was designed according to the functions. A method is selected in double-assigning their domain and program applicable even in complex process, which loads and proceeds several programs sequentially. In order to confirm the logical validity of the designed protocol, local applying test is accomplished for the application layer of response station. Modelling the job flow process, each serice module is verified with the I/O primitives.

  • PDF

ETRI Protocol Test Architecture and Its Application to CCS Network Service Part Protocols (ETRI 프로토콜 검증구조와 CCS망 서비스부 프로토콜에의 응용)

  • Gang, Yeong-Man;Cheon, Dae-Nyeong;Cha, Yeong-Hwan;Baek, Yeong-Sik;Choe, Yang-Hui
    • ETRI Journal
    • /
    • v.10 no.2
    • /
    • pp.3-12
    • /
    • 1988
  • Several ISDN (Integrated Services Digital Network) protocols have implemented at ETRI (Electronics and Telecommunications Research Institute) in an experimental network so that functional characteristics of the protocols under test could be certified against their protocol specifications with the help of the ETRI protocol test facilities. This paper describes ETRI protocol test architecture and its application to testing the NSP (Network Service Part) protocols : MTP (Message Transfer Part) level 3 and SCCP (Signalling Connection Control Part) of the CCITT CCS (Common Channel Signalling ) system No. 7 The test architecture presented here allows tests for two different protocol classes : peer-to-peer and multipeer protocolos. Some extensions are made to the conventional test architectures, namely the test coordination, test result transfer and network state observation method.

  • PDF

A Study of a Secure Channel Implementation on the Military Computer Network (국방망 보안채널 구현에 관한 연구)

  • Lee, Jun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.106-114
    • /
    • 2008
  • In this paper we suggest a protocol and an algorithm which connect a secure channel between a server and a client over a TCP layer. To make key exchange time the most quickly, the protocol adopts ECC Diffie Hellman(ECCDH) algorithm. And the protocol does not use Hello message for key exchanges and state changes. We also implement this protocol over an open TCP/IP program and check the secure channel connecting time over the military computer network. The suggested protocol could be practically used on the military computer network without a hardware implementation.

A Simulation of Bridge using the Spanning Tree Protocol (스패닝 트리 프로토콜을 이용한 브릿지 시뮬레이션)

  • Lee, Sook-Young;Lee, Eun-Wha;Lee, Mee-Jeong;Chae, Ki-Joon;Choi, Kil-Young;Kang, Hun
    • Journal of the Korea Society for Simulation
    • /
    • v.6 no.2
    • /
    • pp.45-57
    • /
    • 1997
  • MAC (media access control) bridge is used to interconnect separate LANs and to relay frames between the BLANs (bridged LANs). Bridge architecture consists of MAC entity, MAC relay entity and bridge protocol entity protocol entity and performs learning, filtering and forwarding functions using filtering database. In this paper, we simulate these functions of bridge and the STP (spanning tree protocol). The STP derives an active topology from an arbitrarily connected BLAN. Our simulation model assumes a BLAN consisted of three bridge forming a closed loop. In order to remove the loop, each bridge process exchanges configruation BPDU (bridge protocol data unit0 with other bridge processes connected to the bridge itself. To simulate the communication between bridges, we implement the IPC (inter-process communication) server using message queues. Our simulation results show that the assumed BLAN contains no closed loop and then there is no alternative route and no unnecessary traffic.

  • PDF

Design and Performance Analysis of a Contention-Based Reservation Protocol for a Local Area Optical Internet

  • Choi, Jin-Seek;Lee, Jang-Won;Kang, Min-Ho
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.142-152
    • /
    • 2002
  • In this paper, we propose and analyze a new multiple access protocol for a local area optical Internet based on a wavelength division multiplexing technique which uses a passive star coupler. The proposed contention-based reservation protocol can support variable-length as well as fixed-length messages for transporting Internet packets with one reservation of a minislot at the beginning of a packet transmission. The minislot is used to reserve the data channel on the basis of the slotted ALOHA protocol and the control node ensures subsequent message transmission on the same wavelength. Thus, all messages need not be broken down to many fixed-length packets, and consecutive messages are transmitted through the same wavelength. Moreover, the proposed protocol reduces the collision probability of minislots and improves wavelength utilization. We determine the maximum throughput and verify the results with simulation.

  • PDF

Security and Reliability of the 4-way Handshake Protocol in IEEE 802.11i (IEEE 802.11i 4-way 핸드쉐이크 프로토콜의 안전성과 신뢰성)

  • Park, Chang-Seop;Woo, Byung-Duk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.317-324
    • /
    • 2009
  • In this paper, a 4-way Handshake protocol in the IEEE 802.11i is analyzed in terms of both security and reliability. It is shown that the 4-way Handshake protocol breaks down under some conditions due to a MIC (message integrity code) failure, and a solution to fix it is proposed. It is also proposed that a new 2-way Handshake protocol which is more secure and efficient than the 4-way Handshake protocol.