• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.031 seconds

Scalability Analysis of MANET IPv6 Address Auto-configuration Protocols based on Link Error Modeling (링크 에러 모델링을 이용한 MANET 환경에서의 IPv6 자동주소 설정 방식의 확장성 분석)

  • Kim, Sang-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.282-291
    • /
    • 2008
  • This paper focuses on message complexity performance analysis of MANET AAPs in reference to link errors generated by the mobile wireless nodes. To obtain the message complexity performance of AAPs in reference to the link error probability ($P_e$), an enhancement was made by proposing the retransmission limit (S) to be computed for error recovery (based on the link error probability), and then for each of the AAPs the control procedures for the retransmission limit have been properly included. The O-notation has been applied in analyzing the upper bound of the number of messages generated by a MANET group of N nodes. Based on a link error probability range of $P_e=0$ to 0.8, the AAPs investigated in this paper are Strong DAD, Weak DAD with proactive routing protocol (WDP), Weak DAD with on-demand routing protocol (WDO), and MANETconf. Based on the simulation results and analysis of the message complexity, for nominal situations, the message complexity of WDP was lowest, closely followed by WDO. The message complexity of MANETconf is higher than that of WDO, and Strong DAD results to be most complex among the four AAPs.

A systemic review of literature in clinical practice research for nursing students

  • Kim, Jungae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.39-46
    • /
    • 2022
  • This study is an attempted content analysis study to analyze recent studies on clinical practice of nursing college students to identify problems with clinical practice and provide evidence for desirable clinical practice. For data collection, a total of 14 papers published in academic journals between 2017 and 2021 were selected. The analysis method was performed according to the systematic review reporting guidelines presented by Cochrane Collaboration and the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) group. As a result of the analysis, two themes, Four sub-themes, and seventeen concepts were derived, and the clinical practice study of nursing college students showed the necessity of standardized clinical practice protocol regulations for nursing college students and respect for patient human rights. Based on the above research results, it is proposed to prepare a nursing and clinical practice protocol that can clearly present the role of nursing college students during clinical practice.

Performance Analysis of Multi-Link Switching Method with Concurrent Processing Function (병행처리 기능을 갖는 멀티링크 스위칭기법의 성능 분석)

  • 유동관
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.84-89
    • /
    • 2001
  • In this paper, an improved protocol of Multi-Link Switching Method is proposed by supplementing a concurrent processing function. This protocol is proposed to complement the shortcomings of the conventional Multi-Link Switching Method which is used for the medium access in LAN. We analyzed the improved protocol in channel utilization viewpoint and compared the result with that of the conventional protocol From this result, we showed that the channel utilization of the improved protocol is superior to that of the conventional protocol when the maximum normalized propagation delay is increased.

KEY EXCHANGE PROTOCOL USING MATRIX ALGEBRAS AND ITS ANALYSIS

  • CHO SOOJIN;HA KIL-CHAN;KIM YOUNG-ONE;MOON DONGHO
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.6
    • /
    • pp.1287-1309
    • /
    • 2005
  • A key exchange protocol using commutative subalge-bras of a full matrix algebra is considered. The security of the protocol depends on the difficulty of solving matrix equations XRY = T, with given matrices R and T. We give a polynomial time algorithm to solve XRY = T for the choice of certain types of subalgebras. We also compare the efficiency of the protocol with the Diffie-Hellman key exchange protocol on the key computation time and the key size.

The medium access control protocol of virtual token bus network for real time communication (실시간 통신을 위한 가상토큰버스 통신망의 매체접근제어 프로토콜)

  • 정연괘
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.76-91
    • /
    • 1996
  • In this paper, we proposed the new medium access control protocol for the virtual token bus netowrk. The network is applied to inter-processor communication network of large capacity digital switching system and digital mobile system with distributed control architecture. in the virtual token bus netowrk, the existing medium access control protocols hav ea switchove rtime overhead when traffic load is light or asymmetric according ot arbitration address of node that has message to send. The proposed protocol optimized average message delay using cyclic bus access chain to exclude switchover time of node that do not have message to send. Therefore it enhanced bus tuilization and average message delay that degrades the performance of real time communication netowrks. It showed that the proposed protocol is more enhacned than virtual token medium access control protocol and virtual token medium access control protocol iwth reservation through performance analysis.

  • PDF

Design of Multiple-Purpose Protocol Test System (다기능 프로토콜 시험시스템 설계)

  • 최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.5
    • /
    • pp.434-445
    • /
    • 1990
  • Protocol testing techniques are expanded from the traditional simple function- testing based on the OSI model, to sophisticated performance testing, conformance testing and interoperability testing. In addition, both point-to-point and point-to-multipoint protocols are to be covered. This paper presents a new multiple-purpose protocol test system where the common platform includes the test sequence generation and test result analysis, and the modular test execution part is selectively adjusted according to the test purposes and protocols under test. This paper describes test system for network routing protocol and test system for transport protocol, designed upon the ideas of the multiple-purpose protocol test system.

  • PDF

PER Analysis for Cooperative Multi-Hop Transmission Protocol over Nakagami-m Fading Channels

  • Duy, Tran Trung;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2012
  • In this paper, we propose a novel protocol called a Multi-hop Diversity Transmission protocol in which the retransmission is realized by a relay that is Nearest to a current Source (MDTNS). We derive the mathematical expressions of the packet error rate (PER) and the average number of transmissions over Nakagami-m fading channels, and verify them by Monte Carlo simulations. The simulation results show that the MDTNS protocol improves the performance of the network in terms of PER when compared to the Multi-hop Diversity Transmission protocol in which the retransmission is done by a relay that is Nearest to Destination (MDTND) and to the conventional multi-hop transmission (CMT) protocol.

An Authentication Scheme against Various Attacks including DoS Attack in RFID System (RFID 시스템에서 DoS 공격을 포함한 다양한 공격에 대처하는 인증 기법)

  • Lee, Kyu-Hwan;Kim, Jae-Hyun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.146-149
    • /
    • 2008
  • The RFID system is very useful in various fields such as the distribution industry and the management of the material, etc. However, the RFID system suffers from various attacks since it does not have a complete authentication protocol. Therefore, this paper propose the authentication protocol that used key server to resist various attacks including DoS(Denial of Service) attack. For easy implementation, the proposed protocol also uses CRC, RN16 generation function existing in EPCglobal class 1 gen2 protocol. This paper performed security analysis to prove that the proposed protocol is resistant to various attacks. The analytical results showed that the proposed protocol offered a secure RFID system.

  • PDF