• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.031 seconds

A Research on Gender Analysis of BGP Security (BGP의 보안성에 대한 기존 연구 분석)

  • Sun, Jae-Hoon;Kim, Yong-Ho;Sun, Yong-Bin
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an security to threat information are analyzed.

  • PDF

Implementation of a Link-State Protocol considering QoS on NS and Analysis on Performance (NS simulator상에서 QoS를 고려한 Link-State Protocol 구현 및 성능 분석)

  • 김현석;안개일;전우직
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.331-333
    • /
    • 2001
  • 현재 사용되고 있는 라우팅 프로토콜들은 정적인 인자를 사용하여 최단 거리 경로를 설정하기 때문에 혼잡(Congestion)이 자주 발생 할 뿐 아니라 최단 거리 경로를 설정하는 이들 라우팅 프로토콜로는 혼잡상황을 해결하기 어렵다. 이를 해결하기 위해서 트래픽 엔지니어링 기법이 등장하게 되었다. 트랙픽 엔지니어링을 위해서는 네트워크의 동적인 상태를 반영하는 정보를 저장하는 트래픽 엔지니어링 데이터베이스가 필요하다. 현대 NS-2에는 프래픽 엔지니어링에 필요한 정보를 제공하고, 네트워크의 상태에 따라 동적으로 경로를 설정하는 라우팅 프로토콜이 구현되어 있지 않다. 본 논문에서는 NS-2에 구현되어 있는 rtProtoLS라는 Link-State Protocol을 수정하여 플러딩(Flooding) 하는 정보에 동적인 인자의 하나인 가용 대역폭을 정보를 실어서 트래픽 엔지니어링 데이터베이스에 제공 할 수 있도록 하고, 가용 대역폭 정보를 기반으로 하여 동적으로 새로운 경로를 계산 할 수 있는 기능을 추가한 QoS를 고려한 Link-State Protocol(QLS)을 구현하였다. 그리고 본 논문에서는 기존의 라우팅 기법 중 거리 백터 프로토콜(Distance Vector Protocol) 라우팅과 QLS 라우팅의 성능을 Throughput 측면에서 비교, 분석했다.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Design and implementation of simulator for fault coverage analysis of commuication protocol test case (통신 프로토콜 시험항목의 오류 발견 능력 분석을 위한 시뮬레이터의 설계 및 구현)

  • 김광현;허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1823-1832
    • /
    • 1997
  • In this ppaer, fault coverage analysis of a conformance test case for communication protocols, specified as a deterministic finite state machine(DFSM) is presented. The fault coverage analysis of a test case is defined by measuring the extent of the faults detected using a generated test case. The method that evaluates fault coverage analysis for a test case, has been researched by arithmetic analysis and simulation. In this paper, we designed and implemented a simulator for fault coverage analysis of a communication protocol teat case. With this result for Inres protocol, output fault and state merge and split fault have a high fault coverage of 100%. This simulator can be widely used with new fault coverage analysis tools by applying it to various protocols.

  • PDF

Design and Performance Analysis of Multi-hop Routing Protocol for WiMedia (WiMedia를 위한 멀티홉 라우팅 프로토콜 개발 및 성능분석)

  • Jung, Jin-Uk;Lee, Seung-Jin;Jin, Kyo-Hong;Hwang, Min-Tae;Jeon, Young-Ae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1406-1415
    • /
    • 2012
  • Though WiMedia supports the higher data rates than other WPAN technologies, a WiMedia device cannot reach other devices which are apart from it more than 10 meter; the limited transmission range of the WiMedia protocol. In this paper, we propose a multi-hop QoS routing protocol to enable WiMedia devices to transmit real-time data to devices that is located out of transmission range. The proposed routing protocol is a hybrid routing protocol, which is the mixed protocol of table-driven and on-demand routing algorithm. In the proposed protocol, a route for a device within 2-hop is established by using the table-driven routing algorithm and a route for the device beyond 2-hop is established by using the on-demand routing algorithm. We perform ns-2 simulation to investigate the performance of the proposed routing protocol with AODV and DSDV. The simulation results show that the proposed protocol's performance is better than AODV and DSDV in terms of the throughput and delay.

An Efficient Hybrid Replication Protocol for High Available Distributed System (고 가용성 분산 시스템을 위한 효율적인 하이브리드 복제 프로토콜)

  • Youn Hee Yong;Choi Sung Chune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.171-180
    • /
    • 2005
  • In distributed systems data are replicated and stored at several nodes to increase the availability and overall performance. Here Quorum protocol doffing a certain set of replicas required for read/write operation exists for global concurrency control. One of the representative replication Protocols - the Tree Quorum protocol - has a drawback of rapidly growing number of replicas as the level increases, while the Grid protocol requires the same operation cost even without any failure. In this paper, thus, we propose a new replication protocol called hybrid protocol which capitalizes the merits of the existing protocols and solves the problems of them at the same time. The proposed hybrid protocol has very low operation cost in the absence of failure like the tree quorum protocol, and has relatively lower operation cost and higher availability than existing protocols when failure occurs by employing tree architecture as the overall organization while each level of the tree is organized as a row of a grid architecture. It is thus effective to be applied to survival storage system. We conduct cost and availability analysis of the proposed protocol through mathematical modeling, and response time and throughput are compared with those of the Tree Quorum protocol through computer simulation.

Economic Evaluation of Gemcitabine-cisplatin Chemotherapy for Non Small-Cell Lung Cancer Patient in an Outpatient Setting (비용-효과 분석 기법을 이용한 Gemcitabine 외래 항암 치료의 경제성 평가)

  • Min, Su-Hyun;Ko, Su-Kyoung;Lim, Ji-Young
    • Journal of Korean Academy of Nursing
    • /
    • v.38 no.3
    • /
    • pp.363-371
    • /
    • 2008
  • Purpose: This analysis was conducted to evaluate the cost-effectiveness of gemcitabine-cisplatin chemotherapy for non small-cell lung cancer patients in an outpatient setting compared with the traditional inpatient setting. Methods: A cost-effective analysis was conducted from a societal perspective. The effects of treatment, which was measured as an adverse event rate, were abstracted from a published literature search and empirical data from one university hospital. The costs included both direct and indirect costs. Direct costs included hospitalizations, outpatient visits, and lab tests. Pharmaceutical costs were excluded in analysis because they were same for both options. Indirect costs included productivity loss of patients as well as care-givers. In order to determine the robustness of the results, sensitivity analysis on treatment protocol was conducted. Results: Literature search showed no difference in adverse effect rates between inpatient treatment protocol and outpatient treatment protocol. Therefore, this analysis is a cost-minimization analysis. Cost-savings in the outpatient setting was 555,936 won for one treatment cycle. Our sensitivity analysis indicated that the outpatient chemotherapy still showed cost-savings, regardless of changes in treatment protocol. Conclusion: The outpatient gemcitabine-cisplatin chemotherapy for non small-cell lung cancer resulted in cost savings compared to inpatient chemotherapy. More importantly, outpatient chemotherapy could improve the utilization of health service resources in terms of available beds.

Path Authorization Technique in Diameter Base Protocol

  • Yu Hui Jong;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.585-587
    • /
    • 2004
  • Diameter base protocol is intended to provide an AAA framework for applications such as IP mobility. Currently Diameter base protocol is standardized to RFC 3588, but there are some problems. One of them, path authorization is already argued at IETF WG Mailing List. According to RFC 3588, path authorization function causes inefficient data traffic and conflicts with RFC 3588 itself. In this paper, we analysis these problems about path authorization function and propose more improved solution.

  • PDF

Packet Processing Analysis of OSPF Routing Protocol (OSPF라우팅 프로토콜의 패킷 처리 분석)

  • 최승한;주성순
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.477-480
    • /
    • 2000
  • Open Shortest Path First(OSPF) is a dynamic, hierarchical routing protocol designed to support routing in TCP/IP networks. Currently, OSPF is used as Interior Gateway Protocol(IGP) in many routers. In this paper, we analyze the variation of number of OSPF routing packets in case of changing the network configuration. The results show that the number of packets in case of adding new link increase five times than one in case of normal operation.

  • PDF

Modified IPRMA protocol using priority scheme in wireless LAN (무선 LAN에서 우선 순위 방식을 이용한 수정된 IPRMA 프로토콜에 관한 연구)

  • 김동식;안준기;김태중;황금찬;신재민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.250-258
    • /
    • 1997
  • A modified IPRMA protocol using priority scheme is proposed to increase the number of maximum users, which prevents the collision between the voice and data traffic. A simple decentralized traffic control scheme is presented for the proposed protocol. The improvement in performance over conventional IPRMA is shown through simulation, and EPA(Equilibrium Point Analysis) is used to evaluate system performance.

  • PDF