• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.024 seconds

Design and Implementation of a QoS Signaling Protocol for Multimedia Applications in Mobile Network Environments (이동망 환경에서 멀티미디어 응용을 위한 QoS 신호 프로토콜의 설계 및 구현)

  • Kim, Hong-Tae;Jeong, Seong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.673-684
    • /
    • 2008
  • In this paper, we propose a signaling protocol which can support QoS for multimedia applications continuously after handover of a mobile node in the network environment where IP-based wireless access networks co-exist. Since existing RSVP-based signaling protocols can cause the waste of network resources due to double reservation and do not provide fast resource reservation/release, they are not suitable for mobile networks. The proposed QoS signaling protocol can support QoS for multimedia applications using the fast reservation of necessary resources after handover and avoid the waste of resources by resolving the double reservation problem. This paper presents design and implementation architectures of the proposed signaling protocol and analyzes its performance via a physical testbed. Based on the analysis results, it was shown that the proposed protocol is able to support seamless QoS for multimedia applications.

  • PDF

Adaptation and Effects of the Evidence-based IPC Nursing Protocol on Prevention of Postoperative Venous Thromboembolism (외과적 수술 후 정맥혈전색전증 예방을 위한 근거기반 IPC(Intermittent Pneumatic Compression) 간호프로토콜의 수용개작 및 효과)

  • Kim, Nam Yong;Kim, Eun A;Sim, Jae Yeun;Jung, Soon Hee;Kim, Hye Young;Jang, Eun Hee;Shin, Jee Hye
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.23 no.1
    • /
    • pp.63-75
    • /
    • 2017
  • Purpose: This study was conducted to adapt the standardized evidence-based nursing protocol using the IPC (intermittent pneumatic compression) intervention to prevent venous thromboembolism in surgical patients. Further, an investigation was done to measure knowledge on prevention of venous thromboembolism, surrogate incidence of venous thromboembolism and to assess IPC compliance in the study patients compared with those in surgical patients who underwent IPC intervention due to previous clinical experience. Methods: An analysis was done of the nine modules suggested by National Evidence-based Healthcare Collaborating Agency (NECA) in the adaptation manual of the clinical practice guideline for protocol adaptation. A nonequivalent control group post test design as a quasi-experiment was used to verify the effect of the IPC protocol. Results: There was a significant difference in knowledge of prevention of venous thromboembolism, IPC application time after intervention and the number of IPC applications between the experimental group (n=50) using the IPC nursing protocol and the control group (n=49). However, the symptoms of deep vein thrombosis and pulmonary thromboembolism were not observed in either the experimental group or the control group after the intervention. Conclusion: Results confirm that the standardized IPC nursing protocol provides effective intervention to prevent venous thromboembolism in surgical patients.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Adaptive Multi-routing Protocol for a High Mobility MANET (변동성이 높은 이동 애드 혹 네트워크를 위한 적응적 다중 라우팅 프로토콜 적용 기법)

  • Deepak, G.C.;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.103-110
    • /
    • 2008
  • When there is uncertainty in topological rate of change, motility model and terrain condition, the performance severely degrades in MANET. The concept of transition of routing protocol on the fly according to the network parameters such as coverage, connectivity and mobility etc. may counterbalance the problems stated above. The mathematical modeling of feedback parameters has been derived, and the architecture for the multi-routing protocol system providing an adaptation from one routing protocol to another is also investigated. This paper is extensively devoted on the analysis of mobility, connectivity and their effects on the network and finally transition into another routing protocol according to them.

Development of Protocol Analyzer Suited for Maintenance of LonWorks Netwo가 for Safety Management of Underground Facilities (지하시설의 안전관리를 위한 LonWorks 네트워크의 유지보수에 적합한 프로토콜 분석기의 개발)

  • Kim, Hyung-Ki;Choi, Gi-Sang;Choi, Gi-Heung
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.203-209
    • /
    • 2010
  • A compact ANSI/EIA 709.1 protocol analyzer system suited for maintenance of LonWorks network for safety management of underground facilities was developed and tested. The hardware is based on the TMS320LF2406A embedded system, and the software was designed using Visual C++6.0 under Windows XP environment. Connected to the LonWorks network the developed protocol analyzer decodes the raw packets and pass them to the master PC through USB port. Then on the PC the packets are processed and analyzed in various aspects and the key features that are essential to the maintenance of LonWorks network installed at underground facilities are displayed in a user-friendly format. Performance of the developed protocol analyzer was evaluated through a series of experiments, by measuring the speed of packet analysis and the error rate. The protocol analyzer proved to work reliably even under the increased bandwidth. However, more comprehensive tests under various underground environmental conditions are desired.

Structure Analysis of Optical Internet Network and Optical Transmission Experiments Using UNI Signaling Protocol (광인터넷망 구조 분석과 UNI 시그널링 프로토콜을 이용한 광전송 실험)

  • Lee, Sang-Wha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.47-54
    • /
    • 2013
  • In this paper, the structural design of optical Internet is analyzed and by using UNI (User Network Interface) signaling protocol an optical transmission experiment was performed. The hierarchical structure of the basic optical Internet consists of the backbone network, the service network and the access network. The necessary functions for each layer were described as follows: Control structure of the optical transport layer, network operation and management structure, internetworking technology of sub networks, routing and signaling technology. By using UNI signaling protocol from OIF (Optical Internetworking Forum), the optical transmission in the proposed structure of the optical Internet network was experimented. By the traffic generation of LSP (Label Switched Path) data packets along the route-configuration was delivered to UNI. Finally, by showing the value of TCP (Transmission Control Protocol) packets the optical transmission was completely and successfully demonstrated.

Authenticated Mobile IPv6 Binding Update Protocol for Micro/Pico Cell Environments (마이크로 및 피코 셀 환경에 적합한 인증된 모바일 IPv6 바인딩 갱신 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1519-1523
    • /
    • 2007
  • In this paper, we propose the fast and secure binding update protocol as handoff or handover in the micro and pico environment based on mobile IPv6. The nodes or routers on participating in this protocol generate their addresses from cryptographically generated addresses (CGAs) method unlike previous address generation method. The mobile node (MN) includes in home network or home link has limited power and computational abilities. So the home agent (HA) of the MN executes key agreement protocol with the correspondent node (CN) on behalf of the MN. The CN then creates a ticket on including session key, lifetime of ticket. and so on. It then transmits it to the MN via the HA of the MN. The ticket is used to communicate directly between the MN and its CN. In performance analysis, we analyze security of proposed binding update protocol under various attack scenarios and efficiency by comparing proposed protocol with prior binding update protocols. Finally we make a conclusion of this paper and present future works.

  • PDF

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.