• Title/Summary/Keyword: protocol Analysis

Search Result 2,519, Processing Time 0.025 seconds

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF

A study on IoT platform for private electrical facilities management (수용가 전력설비 관리를 위한 사물인터넷 플랫폼 연구)

  • Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.103-110
    • /
    • 2019
  • In this paper, we suggested how the Internet of Things (IoT) technology could be applied to an internet platform that is used for managing the customer's power grid efficiently. For an internet platform with efficient management, analysis is done by several sections; communication method, and its protocol, and also security element. From this analysis, with currently used sensors, we have presented a development method for the sensor to server data reliable communication solution and data management server with a security solution. Moreover, this paper suggests a communication module that could be used for a power grid management platform, protocol and security algorithm and also a way to build a server for managing those systems and modules.

A Design and Analysis, Simulation of Intelligent Network Application Protocol (차세대지능망 응용 프로토콜 분석/설계 및 검증)

  • Do, Hyun-Sook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1576-1588
    • /
    • 1997
  • The AIN(Advanced Intelligent Network) employs the Intelligent Network Application Protocol(INAP) which is transparent to services and low layer telecommunication networks. In this paper, we introduce the standard structure of INAP, which has flexible structure for easy expansion as AIN evolves, and we propose a structure of INAP by defining its functional elements. Also we design, analyze the INAP for AAB(Automatic Alternative Billing) service, which is one of the target services of IN CS-1 using object-oriented methodology. We use OMT method which is modified by ObjectGEODE in the analysis phase and SDL language for design. Furthermore we simulate the INAP system to prove that the system has been correctly built and supplies the service correctly for which it was designed.

  • PDF

Network-based Mobility Control in Mobile LISP Networks (이동 LISP망에서 네트워크 기반 이동성 제어 기법)

  • Choi, Sang-Il;Kim, Ji-In;Koh, Seok-Joo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.339-342
    • /
    • 2011
  • This paper proposes a network-based mobility control scheme in wireless/mobile networks, which is based on the Locator-Identifier Separation Protocol (LISP). Compared to the existing LISP mobility scheme, the proposed scheme is featured by the following two points: 1) each LISP Tunnel Router (TR) is implemented at the first-hop access router that mobile nodes are attached to, and 2) for handover support, the LISP Routing Locator (RLOC) update operation is performed between Ingress TR and Egress TR. By numerical analysis, it is shown that the proposed scheme can reduce the handover latency much more than the other candidate schemes.

Thinking Strategies of Triage Nurses' Decision Making in the Emergency Department: Think Aloud Study (응급실 중증도 분류 간호사의 의사결정과정에 나타난 사고전략: 소리내어 생각하기)

  • Moon, Sun Hee;Park, Yeon Hwan
    • Journal of Korean Critical Care Nursing
    • /
    • v.9 no.1
    • /
    • pp.15-26
    • /
    • 2016
  • Purpose: The aim of this study was to identify thinking strategies in the complicated decision-making process based on real patient-based data of triage nurses in the emergency department (ED). Methods: This study used the 'think aloud' method to collect data from 8 triage nurses from one general hospital ED in South Korea. The data were analyzed with protocol analysis using thinking strategies. Results: The triage process was divided into three stages. The first stage consisted of 8 thinking strategies, including searching for information. They used intuition based on directly observed concepts for identifying a crisis. The second stage consisted of 17 thinking strategies related to the decision-making process. They assessed patients and generated a hypothesis to try to understand their health problems through analytic thinking. The third stage consisted of 10 thinking strategies, including qualifying. They considered the situation of the ED and properly triaged the patients. During the triage process, they frequently used judging the value and searching for information on 17 thinking strategies. Conclusions: Triage nurses demonstrated various connected thinking strategies for each stage. Based on our results, further studies should be done to develop a triage education program.

  • PDF

Throughput Analysis of R-NAD in MIL-STD-188-220 (MIL-STD-188-220의 R-NAD 처리율 분석)

  • Kim, Sangsoo;Gu, Sungmo;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.561-568
    • /
    • 2014
  • The Republic of Korea Army is using R-NAD of MIL-STD-188-220 as a Media Access Control protocol. Under urgent situations, almost all stations transmit data frames and then the network will reach a saturation state. Several articles have been devoted to the study of R-NAD performance. However, most of them focus on comparing the performance of some NADs using network simulation tools. We propose an analytical model to compute the throughput of R-NAD under the assumption of a network traffic saturation. Analytical results were verified by Monte Carlo methods. We have shown that the performance of a success probability and an average idle time remains almost unchanged as the total number of stations increases. We have also shown that Type 1/2/4 operation mode outperforms Type 3 operation mode in throughput. The results showed that the system with a squelch detection achieved a better performance than the one without it. The longer DATA time had a higher throughput.

Fixed Relays for Next Generation Wireless Systems - System Concept and Performance Evaluation

  • Pabst Ralf;Esseling Norbert;Walke Bernhard H.
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.104-114
    • /
    • 2005
  • This work presents a concept and the related analysis of the traffic performance for a wireless broadband system based on fixed relay stations acting as wireless bridges. The analysis focuses on the important performance indicators end-to-end throughput and delay, taking into account the effects of an automated repeat request protocol. An extension to a MAC frame based access protocol like IEEE 802.11e, 802.15.3, 802.16a, and HIPERLAN2 is outlined and taken as basis for the calculations. The system is intended for both dense populated areas as an overlay to cellular radio systems and to provide wide-area broad-band coverage. The two possible deployment scenarios for both dense urban and wide-area environments are introduced. Analytical and validating simulation results are shown, proving the suitability of the proposed concept for both of the mentioned scenarios. It is established that the fixed relaying concept is well suited to substantially contribute to provide high capacity cellular broad-band radio coverage in next generation (NG) cellular wireless broadband systems.

Indentifying Metaphor and Analogy Strategies for The Creative Design using Protocol Analysis (프로토콜 분석을 통한 창의적 디자인 전략으로서의 은유와 유추)

  • Choi, Han-Hee;Ju, Seo Ryeung;Kim, Mi Jeong
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.64-74
    • /
    • 2013
  • The aim of this research is to explore the potential of analogy and metaphor as design strategies for supporting the creative design thinking. For the empirical research on analogical and metaphoric process in designing, we conducted design experiments that consist of three different conditions of given items as stimulation for design inspiration: baseline, surrealist paintings, and housing design collections. The results were analyzed using a protocol analysis in order to obtain more systmatic interpretation of the design processes and strategies. As a result, it was noted that students are more apt to read visual information rather than semantic information in the given items. Instead of the representation of their senses or feelings from the paintings, they visualized the analogical images of the paintings for the design representation. However, analogical and metaphoric thinking derived from the given items seem change a designer's perspective, thus bring a novel interpretation on design problems, and eventually more creative and meaningful design ideas. An extended research using one-semester training and observation of the design studio process is introduced as a follow-up study for this paper. This research will investigate the long-term effect of the analogy and metaphor on the design thinking.

Protocol Analysis and Evaluation of the Transport Layer to Improve Security in a Public Cloud Environment (공공 클라우드 환경에서 보안성 향상을 위한 전송계층 프로토콜 분석·평가)

  • Bong, Jin Sook;Park, Sang Jin;Shin, Yongtae
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.76-85
    • /
    • 2018
  • Governments and public agencies try to use the cloud to carry out their work and provide public services. However, a public cloud is vulnerable to security side because it has a structure to support services using public networks (i.e, the internet). Thus, this paper finds the general security vulnerabilities of a network and compares and analyzes the characteristics of transport protocols (UDP, TCP, SCTP, and MPTCP) on the basis of their security vulnerabilities. This paper uses a reliability and security factor for the comparative analysis, evaluates the security exposure, and chooses a suitable protocol considering the security of the transport protocols in the cloud circumstance.

Development of a Practical Rutting Characterization Method for Bituminous Mixtures (아스팔트 콘크리트 혼합물의 소성변형시험 개발)

  • Kim, Nakseok
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • The main objective of materials testing is to simulate in-situ field conditions as closely as possible, including loading conditions, climatic conditions, etc. Also, the test method should be easy, inexpensive, simple, and efficient to conduct to become an acceptable standard laboratory testing method for many agencies. Based on these reasons, a new test method employing repetitive axial loading with confinement was developed to evaluate the rutting(permanent deformation) of asphalt concrete. The new laboratory test protocol was developed based on the study of the various structural analysis and field data. This protocol divides asphalt layer(s) into three categories depending upon the depth. Different temperatures and vertical stress levels were used in these areas.