• 제목/요약/키워드: protocol Analysis

검색결과 2,510건 처리시간 0.031초

차세대 인터넷 도입을 위한 전이 메커니즘의 성능 분석에 관한 연구 (A Study on the Performance Analysis of the transition mechanism for Evolving into Next Generation Internet)

  • 황성호;이수욱;임해진
    • 한국정보통신학회논문지
    • /
    • 제8권2호
    • /
    • pp.289-294
    • /
    • 2004
  • IPv4가 가지고 있는 문제점의 해결방안으로 차세대 인터넷 프로토콜인 IPv6가 표준화되었지만, 현실적으로 일시에 IPv6로 변환되는 것은 불가능하다. IPv4와 자연스럽게 호환되면서 점진적으로 IPv6망으로 변환될 수 있는 전이 메커니즘이 매우 중요하게 인식되고 있다. 현재 다양한 전이 메커니즘들이 개발되어진 상태이지만, 아직까지 IPv6망이 확산되지 못하고 있다. 이유는 주로 기술적인 측면에서만 연구가 되어왔고, 실제로 현재의 시스템 환경에 맞는 연구는 거의 되지 않았기 때문이다. 따라서, 본 논문에서는 이미 제안된 전이 메커니즘에 대하여 실험을 통하여 그 성능을 분석하고, 이를 통하여 현재 환경에 적용가능한 적절한 방법을 찾고자 한다.

VHF-DSC 위치요청 프로토콜 분석과 선박관제시스템 구축 (The Construction of the Vessel Monitoring System and the Protocol Analysis for the Calling of Location Requirement Using VHF-DSC)

  • 김정년
    • 한국정보통신학회논문지
    • /
    • 제17권12호
    • /
    • pp.2800-2805
    • /
    • 2013
  • 선박안전법과 어선법 개정에 따른 어선의 VHF(Very High Frequency) 무선설비와 위치자동발신장치 설치 의무화에 대비하여 수협중앙회 어업정보통신국에서는 VHF통신망과 어선관제를 위한 위치자동발신장치 시스템을 구축하고 있다. 본 연구에서는 DSC(Digital Selective Calling) 기능을 이용한 위치요청 호출의 프로토콜 분석과 선박위치 추적에 대한 최적의 방안을 제시한다. 또한 이를 바탕으로 어선관제시스템 구현과 모니터링 방법에 대한 기술을 제시한다.

Ethernet-PON을 위한 새로운 동적 대역 할당 알고리즘 (A New Dynamic Bandwidth Assigmnent Algorithm for Ethernet-PON)

  • 장성호;장종욱
    • 정보처리학회논문지C
    • /
    • 제10C권4호
    • /
    • pp.441-446
    • /
    • 2003
  • 광대역 액세스 망에서 합류, 분배 지점에서의 효율을 고려한 PON(Passive Optical Network)의 설계는 중요한 관심거리가 되고 있다. PON 구조는 매우 간단하지만, 가입자들에서 발생하는 상향 트래픽 제어를 위해서는 매체 접근 제어 프로토콜이 필요하다. 이러한 매체 접근 제어 프로토콜은 트래픽 클래스별 QoS(Quality of Service) 관리 기능, 효율적인 동적 대역 할당(Dynamic Bandwidth Assignment) 기능, CDV(Cell Delay Variation) 최소화 기능 등이 포함되어야 한다. 본 논문에서는 Ethernet-PON(EPON)을 사용하는 광대역 액세스 망에서 여러 트래픽 클래스를 지원하는 매체 접근 제어 프로토콜의 동적 대역 할당 안고리즘을 제시한다. 제안된 알고리즘의 성능 분석을 위해 MDRR 알고리즘과 성능을 비교, 분석하였고, 실험 결과 본 논문에서 제시한 Request-Counter 알고리즘이 보다 더 나은 서비스 품질을 보장받을 수 있음을 확인할 수 있었다.

유량 데이터 오차율 분석을 통한 최적의 유량데이터 취득방안 제안 (The Propose of Optimal Flow Data Acquisition by Error Rate Analysis of Flow Data)

  • 김윤하;최현주
    • 상하수도학회지
    • /
    • 제31권3호
    • /
    • pp.249-256
    • /
    • 2017
  • Recently, application areas based on M2M (Machine-to-Machine communications) and IoT (Internet of Things) technologies are expanding rapidly. Accordingly, water flow and water quality management improvements are being pursued by applying this technology to water and sewage facilities. Especially, water management will collect and store accurate data based on various ICT technologies, and then will expand its service range to remote meter-reading service using smart metering system. For this, the error in flow rate data transmitting should be minimized to obtain credibility on related additional service system such as real time water flow rate analysis and billing. In this study, we have identified the structural problems in transmitting process and protocol to minimize errors in flow rate data transmission and its handling process which is essential to water supply pipeline management. The result confirmed that data acquisition via communication system is better than via analogue current values and pulse, and for communication method case, applying the industrial standard protocol is better for minimizing errors during data acquisition versus applying user assigned method.

A Study on Design of Real-time Big Data Collection and Analysis System based on OPC-UA for Smart Manufacturing of Machine Working

  • Kim, Jaepyo;Kim, Youngjoo;Kim, Seungcheon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권4호
    • /
    • pp.121-128
    • /
    • 2021
  • In order to design a real time big data collection and analysis system of manufacturing data in a smart factory, it is important to establish an appropriate wired/wireless communication system and protocol. This paper introduces the latest communication protocol, OPC-UA (Open Platform Communication Unified Architecture) based client/server function, applied user interface technology to configure a network for real-time data collection through IoT Integration. Then, Database is designed in MES (Manufacturing Execution System) based on the analysis table that reflects the user's requirements among the data extracted from the new cutting process automation process, bush inner diameter indentation measurement system and tool monitoring/inspection system. In summary, big data analysis system introduced in this paper performs SPC (statistical Process Control) analysis and visualization analysis with interface of OPC-UA-based wired/wireless communication. Through AI learning modeling with XGBoost (eXtream Gradient Boosting) and LR (Linear Regression) algorithm, quality and visualization analysis is carried out the storage and connection to the cloud.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.149-165
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

광대역 무선 네트워크의 성능 향상을 위한 분산 다중 안테나 기반 전송 프로토콜의 설계 및 분석 (Design & analysis of transmission protocol for exploiting cooperative MIMO in broadband wireless networks)

  • 류현석;강충구
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.15-18
    • /
    • 2005
  • Cooperative diversity is a transmission technique, in which multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we propose a new type of cooperative transmission protocol with a full rate and show that its BER performance is improved by 8dB over the existing protocol under the AF (amplify-and-forward) mode of relaying.

  • PDF

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.