• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.034 seconds

Analysis of the Threats abusing IPv6 Fragment Header

  • Zhao, Zhen;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1087-1090
    • /
    • 2007
  • The security issues related to IPv6 protocol have been focused on by many researchers and engineers. Especially, extension headers of IPv6 protocol provide various functionalities such as IP security, mobile IP, and in principle, it is said to give much more effective network services than the previous protocol, IPv4. In this paper, the cases are surveyed in which fragment header, that is one of many extension headers in IPv6 protocol, is abused and made to be the sources of threats. Prevention mechanisms are also surveyed to countermeasure the threats.

  • PDF

Design and Analysis of Home ATM Protocol : Comparison Warren Protocol with IEEE1394 (댁내 ATM망의 프로토콜 설계 및 분석 : Warren Protocol 및 IEEE1394의 특성 비교)

  • 김민경;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.11a
    • /
    • pp.488-492
    • /
    • 1998
  • 초고속 멀티미디어 서비스를 지원하기 위해서는 액세스 망의 초고속 통신망 구축과 함께 댁내망까지 멀티미디어 서비스의 제공이 필수적으로 요구되고 있다. 이러한 멀티미디어 서비스의 댁내망 수용을 위한 대표적인 방안으로 제시되고 있는 것이 'Warren Protocol'과 'IEEE1394'이다. Warren은 댁내에 ATM 스위치와 가입자 단말이 상호 연결되어 있는 메쉬형 네트워크로 Warren Controller(WC)라는 하드웨어를 따로 두어 ATM 스위치와 가입자 단말을 제어하므로 저비용으로 댁내에서 ATM 망 구현이 가능한 형태이다. 반면에, IEEE1394는 컴퓨터와 주변기기간에 디지털 정보를 고속으로 전송하기 위한 직렬 버스 인터페이스로 가정 내에 non-ATM 망을 구축하는 대표적인 인터페이스이다. 본고에서는 댁내망에 가장 적합한 새로운 프로토콜의 개발을 하기 위해 먼저 Warren과 IEEE1394 인터페이스의 장ㆍ단점을 비교 분석하고자 한다. 본고의 내용을 살펴보면, 처음에는 두 인터페이스의 기본 개념을 제시하고, 이 인터페이스가 적용된 댁내망 구조 및 프로토콜에 대해 살펴본 후, 장ㆍ단점을 알아본 다음 끝을 맺도록 하겠다.

  • PDF

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL

  • Han Dong-Hwan;Park Chul-Geun
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.501-515
    • /
    • 2006
  • The IEEE 802.11 protocol is the most mature technology for WLANs(Wireless Local Area Networks). However, as the number of stations increases, the delay and throughput performance of IEEE 802.11 MAC(Medium Access Control) degrades severely. In this paper, we present the comprehensive performance analysis of IEEE 802.11 MAC protocol by investigating the MAC layer packet service time when arrival packet sizes have a general probability distribution. We obtain the discrete probability distribution of the MAC layer service time. By using this, we analyze the system throughput and the MAC layer packet service time of IEEE 802.11 MAC protocol in wireless LAN environment. We take some numerical examples for the system throughput and the mean packet service time for several special distributions of arrival packet sizes.

A Credit Card based Secure Micro-Payment Protocol Design (신용카드기반의 안전한 소액 지불 프로토콜 설계)

  • 김석매;이현주;이충세
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.215-218
    • /
    • 2003
  • In this paper, we propose a protocol both allow a End-to-End security between user and service provider and independent in mobile Internet platform in AIP. In particular, our proposed protocol generates a session key using Weil pairing by ID-based public key system. We analysis a security and efficient of protocol when on-line certification authority participates in authentication process.

  • PDF

Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks

  • Avula, Mallikarjun;Lee, Sang-Gon;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1982-2004
    • /
    • 2014
  • Wireless Mesh Networks (WMNs) are emerging as promising, convenient next generation wireless network technology. There is a great need for a secure framework for routing in WMNs and several research studies have proposed secure versions of the default routing protocol of WMNs. In this paper, we propose a security framework for Hybrid Wireless Mesh Protocol (HWMP) in WMNs. Contrary to existing schemes, our proposed framework ensures both end-to-end and point-to-point authentication and integrity to both mutable and non-mutable fields of routing frames by adding message extension fields to the HWMP path selection frame elements. Security analysis and simulation results show that the proposed approach performs significantly well in spite of the cryptographic computations involved in routing.

The Structure and the Implementation of the IEEE 802.11 MAC Protocol (IEEE 802.11 매체 제어 프로토콜 구조 및 구현)

  • 김지훈;안동랑;이동욱
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.52 no.8
    • /
    • pp.492-499
    • /
    • 2003
  • This paper presents the analysis and the implementation of the asynchronous communication portion of the IEEE 802.11 MAC protocol. We have used PRISM2 chipsets from INTERSIL to build baseband, IF, and RF parts and PCI controller from PLX to interface LLC Layer. We have implemented DCF(Distributed Coordination Function) service using CSMA/CA(Carrier Sense Multiple Access with Collision Acoidance) with backoff algorithm and RTS/CTS protocol. Also, we have implemented TSF(Timing Synchronization Function) which can be used for power management frequency hop synchronization, and other management function. This study can be used as a reference for the MAC protocol implementation and MAC controller design in very high speed wireless LAN which complies with the IEEE 802.11 standard.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Performance Analysis of A Protocol Converter Between X. 25 and SDLC (X. 25와 SDLC간 Protocol Converter의 성능 분석에 관한 연구)

  • Chung, Hae;Un, Chong-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.9
    • /
    • pp.828-837
    • /
    • 1991
  • 본 논문에서는 CCITT에서 채택된 X.2.5 network과 IBM이 채택한 System network architecture(SNA)의 synchronous data link control(SDLC)간의 protocol converter의 성능 분석을 한다. 여기서 protocol converter의 link level map-ping method를 사용하여 구현 되었다고 가정한다. 성능 분석을 통하여 각종 parameter에 대한 throughput과 mean waiting time을 구하며, 다양한 paramerter에 대하여 최적의 값을 조사한다. 특히 converter가 추정한 SDLC frame이 X.25. network packetizing과 규정한 최대 data packet size 보다 더 클 경우에 frame을 분할하게 되는데. 분할방식에 있어서 full and remainder packetzing과 equal packetizing 도입하여 서로간의 성능을 비교한다. message를 분할 할 때 조격으로 나누는 것이 frame의 오류를 줄일 수 있기 때문에 전자보다 후자가 성능면에서 우수함을 알 수 있다.

  • PDF

The Comparison of Clinical Outcomes between GnRH Agonist Long Protocol and GnRH Antagonist Short Protocol in Oocyte Donation Cycles (난자공여를 통한 체외수정 시술에서 성선자극호르몬 유리호르몬 효능제 장기요법과 길항제 단기요법 사이의 임상 결과 비교)

  • Rhee, Jeong-Ho;Park, Joon-Chul;Kim, Jong-In
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.30 no.1
    • /
    • pp.95-103
    • /
    • 2003
  • Objective : To assess and compare the clinical outcomes between GnRH agonist long protocol and GnRH antagonist short protocol in oocyte donation program. Materials and Methods: Of total 18 oocyte donation cycles, controlled ovarian hyperstimulation (COH) were performed with GnRH agonist long protocol and GnRH antagonist short protocol in initial 9 cycles and later 9 cycles, respectively. Oral estradiol valerate and progesterone in oil we re administrated to all recipients for endometrial preparation. Oral estradiol administration was started from donor cycle day 1 after full shut down of gonadal axis with GnRH agonist in patients with ovarian function. Progesterone was injected from oocyte retrieval day of donor initially, then continuously till pregnancy 12 weeks if pregnancy was ongoing. We compared the parameters of clinical outcomes, such as number of the retrieved oocytes, fertilization rate, high grade embryo production rate, clinical pregnancy rate, implantation rate, ongoing pregnancy rate, COH duration, total gonadotropin dose for COH between GnRH agonist long protocol group and GnRH antagonist group. Statistical analysis was performed using Mann-Whitney test, p<0.05 was considered as statistically significant. Results: The number of retrieved oocytes, fertilization rate, high grade embryo production rate, clinical pregnancy rate, implantation rate, ongoing pregnancy rate were $14.89{\pm}7.83$, 81%, 64%, 78%, 31%, 78%, respectively in GnRHa long protocol group and $11.22{\pm}8.50$, 79%, 64%, 67%, 34%, 56%, respectively in GnRH antagonist group. There was no significant differences in parameters of clinical outcomes between 2 groups (all p value >0.05). Duration and total gonadotropin dose for COH were $10.94{\pm}1.70$ days and $43.78{\pm}6.8$ vials in 18 cycles, $12.00{\pm}1.73$ days and $48.00{\pm}6.93$ vials in agonist group, $9.88{\pm}0.78$ days and $39.55{\pm}3.13$ vials in antagonist group, respectively. In GnRH agonist long protocol group, significantly longer duration and higher gonadotropin dose for COH were needed (p=0.012). Conclusion: In oocyte donation program, clinical outcomes from controlled ovarian hyperstimulation with GnRH antagonist were comparable to those from GnRH agonist long protocol group, so controlled ovarian hyperstimulation with GnRH antagonist may be effective as GnRH agonist long protocol. At least there may not be harmful effects of GnRH antagonist on oocyte development and quality.

An Enhanced WLAN MAC Protocol for Directional Broadcast (지향성 브로드캐스트를 위한 무선 LAN MAC 프로토콜)

  • Cha, Woo-Suk;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.16-27
    • /
    • 2006
  • The wireless transmission medium inherently broadcasts a signal to all neighbor nodes in the transmission range. Existing asynchronous MAC protocols do not provide a concrete solution for reliable broadcast in link layer. This mainly comes from that an omni-directional broadcasting causes to reduce the network performance due to the explosive collisions and contentions. This paper proposes a reliable broadcast protocol in link taller based on directional antennas, named MDB(MAC protocol for Directional Broadcasting). This protocol makes use of DAST(Directional Antennas Statement Table) information and D-MACA(Directional Multiple Access and Collision Avoidance) scheme through 4-way handshake to resolve the many collision problem wit]1 omni-directional antenna. To analyze its performance, MDB protocol is compared with IEEE 802.11 DCF protocol [9] and the protocol 2 of reference [3], in terms of the success rate of broadcast and the collision rate. As a result of performance analysis through simulation, it was confirmed that the collision rate of the MDB protocol is lower than those of IEEE 802.11 and the protocol 2 of reference [3], and that the completion rate of broadcast of MDB protocol is higher than those of IEEE 802.11 and the protocol 2 of reference [3].