• Title/Summary/Keyword: protocol Analysis

Search Result 2,522, Processing Time 0.027 seconds

Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support

  • Song, Myungseok;Jeong, Jongpil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1344-1367
    • /
    • 2014
  • Mobile traffic is increasing a masse because of the propagation of the Internet and the development of wireless mobile technology. Accordingly, the Network Local Mobility Management (NETLMM) working group [1] of the Internet Engineering Task Force (IETF) has standardized Proxy Mobile IPv6 (PMIPv6) [2] as a protocol for accomplishing the transmissibility of mobile terminals. PMIPv6 is a network-led IP-based mobility management protocol, which can control terminal mobility without depending on the type of access system or the capability of the terminal. By combining PMIPv6 and the mobility of Session Initiation Protocol (SIP), we can establish terminal mobility and session mobility through a more effective route. The mobility function can be improved and the overlap of function reduced as compared to that in the case of independent operation. PMIPv6 is appropriate for a non-real-time service using TCP, and SIP is appropriate for a real-time service using RTP/UDP. Thus, in the case of a terminal using both services, an effective mobility management is possible only by using PMIPv6 together with SIP. In order to manage mobility in this manner, researches on PMIPv6-SIP are in progress. In line with this trend, this paper suggests a new PMIPv6-SIP architecture where when a mobile terminal conducts a handover, a network-led handover while maintaining the session without the addition of a special function or middleware is possible along with effective performance evaluation through mathematical modeling by comparing the delay and the packet loss that occur during the handover to the Pure-SIP.

Performance Analysis of the fairmess MAC protocol under the CATV/LAN network (CATV/LAN 전송망에서 공정성을 고려한 MAC프로토콜의 성능해석에 관한 연구)

  • 우상철;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.74-80
    • /
    • 2000
  • In this paper, we proposed the MAC protocol and analyzed the performance for CATV/LAN network which was based upon HFC(hybrid optic coaxial) increased abruptly as alternative method of high speed network. Upstream channel which analyzed very deeply for CATV/LAN network have the preferential access property depending upon that position and unidirectional property. To solve this fairness problem, we propose the CSMA-CD/U/P protocol that transm it as $P_i$ probability although data packets is immediately transmitted when it was occurred. As the analytic result and simulation, we obtained $P_i$ value and its average delay time. Also, we get its variance value and queue length distribution. The mean delay time and queue length increase as the load and number of stations increase in the CATV/LAN network.

  • PDF

Analysis of China's Efforts to Protect Medicinal Resources and the Intellectual Property Rights of Traditional Chinese Medicine - in light of the adoption of the Nagoya Protocol - (중국의 약물자원 및 전통의약 지식재산권 보호 동향 분석 -「나고야의정서」 채택과 관련하여-)

  • Lee, Min-Ho
    • The Korea Journal of Herbology
    • /
    • v.27 no.5
    • /
    • pp.45-53
    • /
    • 2012
  • Objectives : In recent years, the Chinese Government has been providing full support aimed at promoting the excellence of Chinese culture, including Traditional Chinese Medicine (TCM), to the world after recognizing Chinese culture and medicine as elements that can generate national wealth. Methods : In investigating China's awareness of the issues surrounding the intellectual property rights of TCM, as well as its implementation of protective measures, this study analyzed the law and platform policies of the Chinese Government, as well as the designation status of China's intangible cultural heritages and the recent research trend in the TCM field. Results : First, China is taking various protective measures based on laws and institutional devices, including the Patent Act. Second, China is protecting the intellectual property rights of traditional Chinese medicines by registering them as Chinese intangible cultural heritages or UNESCO world heritages. Third, China is seeking to promote TCM throughout the wider world through various research and academic conferences, and by strengthening ties between nations. Conclusions : With the adoption of the international regimes of the WIPO and CBD, and particularly the Nagoya Protocol in 2010, China is seeking to implement measures aimed at maximizing the national interest based on the intellectual property rights of TCM. China began to implement a system of protection of medicinal resources and the related traditional knowledge after recognizing the potential crisis that could occur if Chinese medicine-related patents were taken over by foreign countries. As such, the system now takes various forms.

A Study on the Deperm of Ferromagnetic Material using Preisach Model (Preisach 모델을 이용한 강자성체의 탈자기법 연구)

  • Ju, Hye Sun;Park, Gwan Soo;Won, Hyuk
    • Journal of the Korean Magnetics Society
    • /
    • v.23 no.2
    • /
    • pp.54-61
    • /
    • 2013
  • Ferromagnetic material's residual magnetization is remained because of the interaction between domains from external apply field, so the electrical and electronic industry and area of defense development request deperm protocol which makes the residual magnetization to 0. But the deperm protocols which are used theses days are developed by using only experience and experiment, so we have to develop deperm protocol considering hysteresis curve. In this paper, Anhysteretic Deperm, Deperm-ME, Flash-Deperm were analyzed using two dimensional finite element method and Preisach model that was formulated by property of magnetic materials. From that analysis, the relations between hysteresis curve and deperm variable are compared by analyzing the trace of Preisach plane. Also, an efficient current ratio of deperm protocol, is proposed.

EMQT : A Study on Enhanced M-ary Query Tree Algorithm for Sequential Tag IDs (연속적인 태그 ID들을 위한 M-ary 쿼리 트리 알고리즘의 향상에 관한 연구)

  • Yang, Dongmin;Shin, Jongmin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.435-445
    • /
    • 2013
  • One of the most challenging issues in radio frequency identification (RFID) and near field communications (NFC) is to correctly and quickly recognize a number of tag IDs in the reader's field. Unlike the probabilistic anti-collision schemes, a query tree based protocol guarantees to identify all the tags, where the distribution of tag IDs is assumed to be uniform. However, in real implements, the prefix of tag ID is uniquely assigned by the EPCglobal and the remaining part is sequentially given by a company or manufacturer. In this paper, we propose an enhanced M-ary query tree protocol (EMQT), which effectively reduces unnecessary query-response cycles between similar tag IDs using m-bit arbitration and tag expectation. The theoretical analysis and simulation results show that the EMQT significantly outperforms other schemes in terms of identification time, identification efficiency and communications overhead.

An Imbedded System for Time Synchronization in Distributed Environment based on the Internet (인터넷 기반 분산 환경에서 시각 동기를 위한 임베디드 시스템)

  • Hwang So-Young;Yu Dong-Hui;Li Ki-Joune
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.216-223
    • /
    • 2005
  • A computer clock has limits in accuracy and precision affected by its inherent instability, the environment elements, the modification of users, and errors of the system. So the computer clock needs to be synchronized with a standard clock if the computer system requires the precise time processing. The purpose of synchronizing clocks is to provide a global time base throughout a distributed system. Once this time base exists, transactions among members of distributed system can be controlled based on time. This paper discusses the integrated approach to clock synchronization. An embedded system is considered for time synchronization based on the GPS(Global Positioning System) referenced time distribution model. The system uses GPS as standard reference time source and offers UTC(Universal Time Coordinated) through NTP(Network Time Protocol). A clock model is designed and adapted to keep stable time and to provide accurate standard time with precise resolution. Private MIB(Management Information Base) is defined for network management. Implementation results and performance analysis are also presented.

Scalable Cluster Overlay Source Routing Protocol (확장성을 갖는 클러스터 기반의 라우팅 프로토콜)

  • Jang, Kwang-Soo;Yang, Hyo-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.83-89
    • /
    • 2010
  • Scalable routing is one of the key challenges in designing and operating large scale MANETs. Performance of routing protocols proposed so far is only guaranteed under various limitation, i.e., dependent of the number of nodes in the network or needs the location information of destination node. Due to the dependency to the number of nodes in the network, as the number of nodes increases the performance of previous routing protocols degrade dramatically. We propose Cluster Overlay Dynamic Source Routing (CODSR) protocol. We conduct performance analysis by means of computer simulation under various conditions - diameter scaling and density scaling. Developed algorithm outperforms the DSR algorithm, e.g., more than 90% improvement as for the normalized routing load. Operation of CODSR is very simple and we show that the message and time complexity of CODSR is independent of the number of nodes in the network which makes CODSR highly scalable.

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

A study on implementation of software development environment for SDL (통신 프로토콜 명세 언어 SDL을 위한 소프트웨어 개발 환경 구현)

  • Choe, Yeong-Han;Kim, Seong-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1522-1533
    • /
    • 1996
  • This paper presents a programming environment for the edition and verification of specification language SDL. It is implemented in the Concerto software factory, which has been as a support for the development of real size software. Concerto is a software factory designed for application development in the fields of computer communication protocols or real time system. It offers various kinds of tools to produce software, organize this production and automate it. Concerto allows a smooth integration of various formalism such as the C and $C^{++}$, languages, structured documentation, HOOD methodology (Hierarchical Object Orient Design). In this paper, as an important tools in the process of communication protocol software development, we describe fist describe the principles of this environment, then we illustrate its application by means of a simple example, the Inres protocol. Moreover, we study how hypertext mechanism of Concert to create logical links between a protocol and its asscoiated service.

  • PDF