• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.03 seconds

SOC Bus Transaction Verification Using AMBA Protocol Checker

  • Lee, Kab-Joo;Kim, Si-Hyun;Hwang, Hyo-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.2
    • /
    • pp.132-140
    • /
    • 2002
  • This paper presents an ARM-based SOC bus transaction verification IP and the usage experiences in SOC designs. The verification IP is an AMBA AHB protocol checker, which captures legal AHB transactions in FSM-style signal sequence checking routines. This checker can be considered as a reusable verification IP since it does not change unless the bus protocol changes. Our AHB protocol checker is designed to be scalable to any number of AHB masters and reusable for various AMBA-based SOC designs. The keys to the scalability and the reusability are Object-Oriented Programming (OOP), virtual port, and bind operation. This paper describes how OOP, virtual port, and bind features are used to implement AHB protocol checker. Using the AHB protocol checker, an AHB simulation monitor is constructed. The monitor checks the legal bus arbitration and detects the first cycle of an AHB transaction. Then it calls AHB protocol checker to check the expected AHB signal sequences. We integrate the AHB bus monitor into Verilog simulation environment to replace time-consuming visual waveform inspection, and it allows us to find design bugs quickly. This paper also discusses AMBA AHB bus transaction coverage metrics and AHB transaction coverage analysis. Test programs for five AHB masters of an SOC, four channel DMAs and a host interface unit are executed and transaction coverage for DMA verification is collected during simulation. These coverage results can be used to determine the weak point of test programs in terms of the number of bus transactions occurred and guide to improve the quality of the test programs. Also, the coverage results can be used to obtain bus utilization statistics since the bus cycles occupied by each AHB master can be obtained.

A Study on the Radiation Exposure Dose of Brain Perfusion CT Examination a Phantom (Phantom을 이용한 뇌 관류 CT검사에서 방사선 피폭선량에 관한 연구)

  • Jung, Hong-Rynag;Kim, Ki-Jeong;Mo, Eun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.287-294
    • /
    • 2015
  • The purpose of this study, was Let's examine the exposure dose at the time of cerebral blood flow CT scan of acute ischemic stroke patients. In particular, long-term high doses of radiation sensitive organs and we Measured using phantom and a glass dosimeter. Apply the existing protocol suggested by the manufacturer (fixed time delay technique) and the proposed new convergence protocol (bolus tracking technique), reporting to measure the dose, dose reduction was to prepare the way. Results up to 39.8% as compared to the existing protocols in a new suggested convergence protocol, a minimum of 5.8% was long-term dose is reduced. Test dose of $CDTI_{vol}$ and DLP values decreased 25%, respectively, were measured at less than recommended dose. Try checking the protocol set out in the existing based on the analysis result of the above, by applying the proposed new convergence protocol by reducing the dose would have to contribute to improved public health. It is believed to be research continues to find the optimum protocol in the other tests.

Design and Implementation of an Embedded Audio Video Bridging Platform for Multichannel Multimedia Transmission (다채널 멀티미디어 전송용 임베디드 Audio Video Bridging 플랫폼 설계 및 구현)

  • Wee, Jungwook;Park, Kyoungwon;Kwon, Kiwon;Song, Byoungchul;Kang, Mingoo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.1-6
    • /
    • 2015
  • In this paper, we designed an embedded audio video bridging (AVB) platform based on IEEE 802.1BA for real-time multimedia transmission in smart-car, smart-home, smart-theater, and then evaluated a performance of the implemented platform by analysis of IEEE 802.1AS (time synchronization protocol) and IEEE 802.1Qat (stream reservation protocol). Especially, the AVB Layer-2 protocol of MRP(Multiple Registration Protocol), MMAP(Multicast Address Acquisition Protocol), IEEE 1722, 1722.1 etc. was and implemented by linux based operating system. It is shown by interoperability tests with commercial products that the implemented platform transmits real-time multichannel AV data over AVB networks for Multichannel Multimedia Transmission.

A Security Analysis of Zhao and Gu's Key Exchange Protocol (Zhao와 Gu가 제안한 키 교환 프로토콜의 안전성 분석)

  • Nam, Jung-Hyun;Paik, Ju-Ryon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.91-101
    • /
    • 2012
  • Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu's protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu's protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu's proof of security for the protocol is invalid.

A State Management MAC Protocol for Vehicle to Vehicle Communication Using Directional Antenna (차량 간 통신 환경에 적합한 방향성 안테나를 이용한 상태관리 MAC Protocol)

  • Park, Sang-Wook;Jung, Sung-Dae;Jung, Jong-In;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.526-535
    • /
    • 2008
  • Recently, several MAC protocols using the directional antennas have been proposed for wireless mobile ad hoc networks. In the theory, it can improve spatial reuse and communication throughput in the Mobile Ad-hoc networks. But, or However even though direction transmissions using the Directional MAC protocol(D-MAC) are expected to provide significant improvements, they causes other problems such as deafness problem and fairness problem. In this paper, we analyze the D-MAC protocol in Mobile Ad-hoc network for Vehicle to vehicle(V2V) communication. Through the results of the analysis, We the fundamental problem of D-MAC protocol and finally we suggest new D-MAC protocol for V2V networks.

Development of an intentional rounding protocol for nursing undergraduates to apply in clinical practice (간호대학생의 임상실습 적용을 위한 의도적 간호순회 프로토콜 개발)

  • Kim, Sueun;Ok, Jong Sun;Choi, Jin Yi;Choi, Heejung
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.29 no.4
    • /
    • pp.381-394
    • /
    • 2023
  • Purpose: This study aimed to develop an intentional rounding protocol to enhance the clinical competence of nursing students. Methods: An intentional rounding protocol for nursing students' clinical practice was developed following the ADDIE (Analysis, Design, Development, Implementation, and Evaluation) model. A convenient sampling method was used to select 23 junior year university nursing students during their clinical practice in adult nursing. The program evaluation included a quantitative assessment (communication and relationship efficacy, empathy, and patient safety competency) and focus group interviews. Results: The intentional rounding protocol focused on the 4Ps (pain, position, potty, and possessions) and encompassed aspects such as level of consciousness, pain management, personal care needs, intravenous injection, oxygen administration, nasogastric/nasoenteric tube care, maintenance of urine collection bags, and the identification of environmental fall risks. Nursing students performed intentional rounding at least twice a day. Following the implementation of this protocol, nursing students demonstrated a significant improvement in communication and interpersonal efficacy. The focus group interviews revealed four main themes: growth of human relationships, acquiring knowledge in and about the clinical field, becoming a nurse, and barriers in reality. Conclusion: The intentional rounding protocol has the potential to enhance nursing students' communication and interpersonal skills during clinical practice and to provide them with positive experiences in nursing clinical education. Therefore, it is recommended that this protocol be incorporated into nursing clinical practice education.

Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure (TPM 명령어 인가 프로토콜에 대한 내부자 공격 취약점 분석 및 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Oh, Soo-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1356-1366
    • /
    • 2011
  • The TPM(Trusted Platform Module) is a hardware chip to support a trusted computing environment. A rightful user needs a command authorization process in order to use principal TPM commands. To get command authorization from TPM chip, the user should perform the OIAP(Object-Independent Authorization Protocol) or OSAP(Object-Specific Authorization Protocol). Recently, Chen and Ryan alerted the vulnerability of insider attack on TPM command authorization protocol in multi-user environment and presented a countermeasure protocol SKAP(Session Key Authorization Protocol). In this paper, we simulated the possibility of insider attack on OSAP authorization protocol in real PC environment adopted a TPM chip. Furthermore, we proposed a novel countermeasure to defeat this insider attack and improve SKAP's disadvantages such as change of command suructures and need of symmetric key encryption algorithm. Our proposed protocol can prevent from insider attack by modifying of only OSAP command structure and adding of RSA encryption on user and decryption on TPM.

Performance Analysis of the Multicasting Protocol Using Division of the Control Channel in WDM Networks (파장분할 다중화 통신망에서 제어채널 분할을 이용한 멀티캐스팅 프로토콜의 성능분석)

  • 정길현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.842-849
    • /
    • 2000
  • In this paper, We analyzed the protocol to improve the performance of the multicast traffic processing in WDM networks. In the protocol, control channels are devided into contention-less minislots and contention minislots. And the packets which fail to have successful reservation in the present time slot have priority to have successful reservation in the contention-less minislots of the next time slot. Therefore, control channel contentions and destination conflicts can be reduced with the use of contention-less minislots. For the multicast traffic processing, the theoretical analysis and computer simulation are important to estimate the network performance and to calculate the optimized number of contention-less minislots. In this paper, the state transition probability of the number of contention-less minislots and arrival packets are calculated using 4-dimension matrix. The maximum number of contention-less minislots is equal to the number of channels for maximum performance improvement of the system. It is theoretical analysis and prove to computer simulation the performance of the protocol.

  • PDF

Resistance to sliding in orthodontics: misconception or method error? A systematic review and a proposal of a test protocol

  • Savoldi, Fabio;Papoutsi, Aggeliki;Dianiskova, Simona;Dalessandri, Domenico;Bonetti, Stefano;Tsoi, James K.H.;Matinlinna, Jukka P.;Paganelli, Corrado
    • The korean journal of orthodontics
    • /
    • v.48 no.4
    • /
    • pp.268-280
    • /
    • 2018
  • Resistance to sliding (RS) between the bracket, wire, and ligature has been largely debated in orthodontics. Despite the extensive number of published studies, the lack of discussion of the methods used has led to little understanding of this phenomenon. The aim of this study was to discuss variables affecting RS in orthodontics and to suggest an operative protocol. The search included $PubMed^{(c)}$, $Medline^{(c)}$, and the Cochrane $Library^{(c)}$. References of full-text articles were manually analyzed. English-language articles published between January 2007 and January 2017 that performed an in vitro analysis of RS between the bracket, wire, and ligature were included. Study methods were analyzed based on the study design, description of materials, and experimental setup, and a protocol to standardize the testing methods was proposed. From 404 articles identified from the database search and 242 records selected from published references, 101 were eligible for the qualitative analysis, and six for the quantitative synthesis. One or more experimental parameters were incompatible and a meta-analysis was not performed. Major factors regarding the study design, materials, and experimental setup were not clearly described by most studies. The normal force, that is the force perpendicular to the sliding of the wire and one of the most relevant variable in RS, was not considered by most studies. Different variables were introduced, often acting as confounding factors. A protocol was suggested to standardize testing procedures and enhance the understanding of in vitro findings.

Parallel Interworking Model and Performance Analysis of a Connection Control Protocol for Broadband Access Network (광대역 액세스 망을 위한 연결 제어 프로토콜의 병렬형 연동 모델과 성능 분석)

  • Kim, Chun-Hui;Cha, Yeong-Uk;Kim, Jae-Geun;Han, Gi-Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1529-1538
    • /
    • 1999
  • 광대역 액세스 망은 B-ISDN 환경에서 다양한 유형의 가입자들을 서비스 노드로 집선하는 기능을 수행한다. ITU-T의 SG13에서는 광대역 액세스 망과 서비스 노드 사이에서 ATM 자원의 동적인 할당 및 해제를 위하여 연결 제어 프로토콜의 표준화를 수행하고 있다. ATM 연결의 설정을 위한 연결 제어 프로토콜과 신호 프로토콜의 연동 기능은 서비스 노드에서 수행되며, ITU-T에서는 순차적 연동 모델을 채택하고 있다. 순차적 연동 모델은 SN에서 각 프로토콜의 절차가 순차적 방식으로 연동되므로 연결 지연이 크다. 본 논문에서는 광대역 액세스 망의 도입으로 인한 연결 설정 지연을 최소화하기 위하여 병렬형으로 수행되는 연동 모델을 제시하였다. 그리고 본 논문에서 제안한 병렬형 연동 모델의 성능 분석을 통하여 순차적 연동 모델과의 연결 설정 지연 및 완료비에 대한 비교, 분석을 수행하였다. 성능 분석에서 사용된 워크로드 파라미터는 RACE MAGIC 프로젝트의 결과를 적용하였다. Abstract In B-ISDN environment, various subscribers are concentrated into a service node via a broadband access network. The SG13 of ITU-T is standardizing a connection control protocol which provides dynamic allocation of ATM resources between an access network and a service node. To establish an ATM connection, interworking functions between the connection control protocol and the signaling protocol are performed at the service node. ITU-T adopts the sequential interworking model. In this paper, we propose the parallel interworking model which minimizes the overall connection setup delay by introducing the access network. Using the performance analysis, we compare our proposed parallel model with the existing sequential model in terms of connection setup delay and completion ratio. The workload parameters of RACE MAGIC project are applied to the analysis and simulation.