• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.027 seconds

A Study on the Performance Analysis of the transition mechanism for Evolving into Next Generation Internet (차세대 인터넷 도입을 위한 전이 메커니즘의 성능 분석에 관한 연구)

  • 황성호;이수욱;임해진
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.289-294
    • /
    • 2004
  • The IPv6(Internet Protocol version 6), a next generation Internet protocol. was standardized to solve the problems of the IPv4(Internet Protocol version 4). However, the IPv4 could not be actually converted to the IPv6 at one time. Therefore, the transition mechanism is thought to be very much important to be compatible with the IPv4 naturally and convert to the IPv6 network gradually. Despite of the development of various kinds of the transition mechanism, the IPv6 network was not expanded. The research was mainly made not for current system environment but for technical purposes. This paper investigated the performances through the transition mechanism and examined proper ways being applicable to current environment.

The Construction of the Vessel Monitoring System and the Protocol Analysis for the Calling of Location Requirement Using VHF-DSC (VHF-DSC 위치요청 프로토콜 분석과 선박관제시스템 구축)

  • Kim, Jeong-Nyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2800-2805
    • /
    • 2013
  • In preperation for the compulsory installation of VHF(Very High Frequency) wireless equipment and fishing vessel automatic identification system according to the revision of "The Ships Safety Act" and "Fishing Vessel act", Fishery Information & Communication Department of National Federation of Fisheries Cooperatives is building VHF communication network and automatic identification system for fishing vessel monitoring. This study suggests the protocol analysis for the calling of location requirement using DSC(Digital Selective Calling) function and show best way for fishing vessel automatic identification system. Also, it suggest way to realize fishing vessel monitoring system.

A New Dynamic Bandwidth Assigmnent Algorithm for Ethernet-PON (Ethernet-PON을 위한 새로운 동적 대역 할당 알고리즘)

  • Jang, Seong-Ho;Jang, Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.441-446
    • /
    • 2003
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. The PON architecture is very simple but it requires a MAC protocol for control of upstream traffic. The MAC protocol must support QoS (Quality of Service) administration function by various traffic class, efficient dynamic bandwidth assignment function, CDV (Ceil Delay Variation) minimization function etc. This paper proposes a dynamic bandwidth assignment algorithm of the MAC protocol for a broadband access network using an Ethernet Passive Optical Network supporting various traffic class. We compare our proposed with MDRR algorithm using simulation, and confirmed that our proposed Request-Counter algorithm produces shorter average cell delay.

The Propose of Optimal Flow Data Acquisition by Error Rate Analysis of Flow Data (유량 데이터 오차율 분석을 통한 최적의 유량데이터 취득방안 제안)

  • Kim, Yunha;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.3
    • /
    • pp.249-256
    • /
    • 2017
  • Recently, application areas based on M2M (Machine-to-Machine communications) and IoT (Internet of Things) technologies are expanding rapidly. Accordingly, water flow and water quality management improvements are being pursued by applying this technology to water and sewage facilities. Especially, water management will collect and store accurate data based on various ICT technologies, and then will expand its service range to remote meter-reading service using smart metering system. For this, the error in flow rate data transmitting should be minimized to obtain credibility on related additional service system such as real time water flow rate analysis and billing. In this study, we have identified the structural problems in transmitting process and protocol to minimize errors in flow rate data transmission and its handling process which is essential to water supply pipeline management. The result confirmed that data acquisition via communication system is better than via analogue current values and pulse, and for communication method case, applying the industrial standard protocol is better for minimizing errors during data acquisition versus applying user assigned method.

A Study on Design of Real-time Big Data Collection and Analysis System based on OPC-UA for Smart Manufacturing of Machine Working

  • Kim, Jaepyo;Kim, Youngjoo;Kim, Seungcheon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.121-128
    • /
    • 2021
  • In order to design a real time big data collection and analysis system of manufacturing data in a smart factory, it is important to establish an appropriate wired/wireless communication system and protocol. This paper introduces the latest communication protocol, OPC-UA (Open Platform Communication Unified Architecture) based client/server function, applied user interface technology to configure a network for real-time data collection through IoT Integration. Then, Database is designed in MES (Manufacturing Execution System) based on the analysis table that reflects the user's requirements among the data extracted from the new cutting process automation process, bush inner diameter indentation measurement system and tool monitoring/inspection system. In summary, big data analysis system introduced in this paper performs SPC (statistical Process Control) analysis and visualization analysis with interface of OPC-UA-based wired/wireless communication. Through AI learning modeling with XGBoost (eXtream Gradient Boosting) and LR (Linear Regression) algorithm, quality and visualization analysis is carried out the storage and connection to the cloud.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.149-165
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

Design & analysis of transmission protocol for exploiting cooperative MIMO in broadband wireless networks (광대역 무선 네트워크의 성능 향상을 위한 분산 다중 안테나 기반 전송 프로토콜의 설계 및 분석)

  • Ryu, Hyun-Seok;Kang, Chung-G.
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.15-18
    • /
    • 2005
  • Cooperative diversity is a transmission technique, in which multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we propose a new type of cooperative transmission protocol with a full rate and show that its BER performance is improved by 8dB over the existing protocol under the AF (amplify-and-forward) mode of relaying.

  • PDF

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.