• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.026 seconds

Analysis of Average Waiting Time and Average Turnaround Time in Web Environment (웹 환경에서의 평균 대기 시간 및 평균 반환 시간의 분석)

  • Lee, Yong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.865-874
    • /
    • 2002
  • HTTP (HyperText Transfer Protocol) is a transfer protocol used by the World Wide Web distributed hypermedia system to retrieve the objects. Because HTTP is a connection oriented protocol, it uses TCP (Transmission control Protocol) as a transport layer. But it is known that HTTP interacts with TCP badly. it is discussed about factors affecting the performance or HTTP over TCP, the transaction time obtained by the per-transaction TCP connections for HTTP access and the TCP slow-start overheads, and the transaction time for T-TCP (Transaction TCP) which is one or methods improving the performance or HTTP over TCP. Average waiting time and average turnaround time are important parameters to satisfy QoS (Quality of Service) of end users. Formulas for calculating two parameters are derived. Such formulas can be used for the environment in which each TCP or T-TCP transaction time is same or different. Some experiments and computational experiences indicate that the proposed formulas are well acted, can be applied to the environment which the extension of bandwidth is necessary, and time characteristics of T-TCP are superior to that of TCP. Also, the load distribution method of web server based on the combination of bandwidths is discussed to reduce average waiting time and average turnaround time.

Design Mobility Agent Module for Healthcare Application Service (헬스케어 응용 서비스를 위한 Mobility Agent 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.378-384
    • /
    • 2008
  • The sensor network for the health care application service has the man or movable object as the main sensing object. In order to support inter-node interaction by the movement of such sensing objects, the node's dynamic function modification, dynamic self-configuration and energy efficiency must be considered. In this paper, the Agilla model which supports the dynamic function modification through the agent migration between nodes and LEACH protocol which guarantees the dynamic self-configuration and energy efficiency through the configuration of inter-node hierarchical cluster configuration are analyzed. Based on the results of the analysis, the Mobility Agent Middleware which supports the dynamic function modification between nodes is designed, and LEACH_Mobile protocol which guarantees the node nobility as the weakness of the existing LEACH protocol is suggested. Also, the routing module which supports the LEACH_Mobile protocol is designed and the interface for conjunction with Mobility Agent Middleware is designed. Then, it is definitely increase performance which un mobility node of transfer data rate through LEACH_Mobile protocol of simulation result.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Link Cost based Routing Protocol for Improving Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율 향상을 위한 링크 비용 기반 라우팅 프로토콜)

  • Lee, Dae-hee;Cho, Kyoung-woo;Kang, Chul-gyu;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.574-580
    • /
    • 2019
  • Conventional energy efficient routing protocols apply high weight to energy among routing metrics, causing nodes to concentrate on energy efficient paths and quickly exhaust energy on those paths. The unbalanced energy consumption of these wireless sensor networks causes network division and malfunction, and reduces network lifetime. Therefore, in this paper, it proposes a link cost based routing protocol to solve the unbalanced energy consumption of wireless sensor networks. The proposed routing protocol calculates the link cost by applying the weight of the routing metric differently according to the network problem situation and selects the path with the lowest value. As a result of the performance analysis, it confirmed that the proposed routing protocol has 22% longer network life, 2% energy consumption standard deviation and 2% higher data reception rate than the existing AODV protocol.

A Design of Multi-hop Network Protocol based on LoRaWAN Gateway

  • Kim, Minyoung;Jang, Jongwook
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.109-115
    • /
    • 2019
  • Currently, LPWA(Low Power Wide Area) communication technology is widely used due to the development of IoT(Internet of Things) technology. Among the LPWA technologies, LoRaWAN(Long Range Wide Area Network) is widely used in many fields due to its wide coverage, stable communication speed, and low-cost modem module prices. In particular, LoRa(Long Range) can easily construct LoRaWAN with a dedicated gateway. So many organizations are building their own LoRaWAN-based networks. The LoRaWAN Gateway receives the LoRa packet transmitted from an End-device installed in the adjacent location, converts it into the Internet protocol, and sends the packet to the final destination server. Current LoRa Gateway uses a single-hop method, and each gateway must include a communication network capable of the Internet. If it is the mobile communication(i.e., WCDMA, LTE, etc.) network, it is required to pay the internet usage fee which is installed in each gateway. If the LoRa communication is frequent, the user has to spend a lot of money. We propose an idea on how to design a multi-hop protocol which enables packet routing between gateways by analyzing the LoRaWAN communication method implemented in its existing single-hop way in this paper. For this purpose, this paper provides an analysis of the standard specification of LoRaWAN and explains what was considered when such protocol was designed. In this paper, two gateways have been placed based on the functional role so as to make the multi-hop protocol realized: (i) hopping gateway which receives packets from the end-device and forwards them to another gateway; and (ii) main gateway which finally transmits packets forwarded from the hopping gateway to the server via internet. Moreover, taking into account that LoRaWAN is wireless mobile communication, a level-based routing method is also included. If the protocol proposed by this paper is applied to the LoRaWAN network, the monthly internet fee incurred for the gateway will be reduced and the reliability of data transmission will be increased.

Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol

  • Shin, Seong-Han;Kazukuni Kobara;Hideki Imai
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.75-90
    • /
    • 2004
  • At Asiacrypt 2003, Shin et al., have proposed a new class for Authenticated Key Establishment (AKE) protocol named Leakage-Resilient AKE ${(LR-AKE)}^{[1]}$. The authenticity of LR-AKE is based on a user's password and his/her stored secrets in both client side and server side. In their LR-AKE protocol, no TRM(Tamper Resistant Modules) is required and leakage of the stored secrets from $.$my side does not reveal my critical information on the password. This property is useful when the following situation is considered :(1) Stored secrets may leak out ;(2) A user communicates with a lot of servers ;(3) A user remembers only one password. The other AKE protocols, such as SSL/TLS and SSH (based or PKI), Password-Authenticated Key Exchange (PAKE) and Threshold-PAKE (T-PAKE), do not satisfy that property under the above-mentioned situation since their stored secrets (or, verification data on password) in either the client or the servers contain enough information to succeed in retrieving the relatively short password with off-line exhaustive search. As of now, the LR-AKE protocol is the currently horn solution. In this paper, we prove its security of the LR-AKE protocol in the standard model. Our security analysis shows that the LR-AKE Protocol is provably secure under the assumptions that DDH (Decisional Diffie-Hellman) problem is hard and MACs are selectively unforgeable against partially chosen message attacks (which is a weaker notion than being existentially unforgeable against chosen message attacks).

Attribute-base Authenticated Key Agreement Protocol over Home Network (홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜)

  • Lee, Won-Jin;Jeon, Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.49-57
    • /
    • 2008
  • User authentication and key agreement are very important components to provide secure home network service. Although the TTA adopted the EEAP-PW protocol as a user authentication and key transmission standard, it has some problems including not to provide forward secrecy. This paper first provides an analysis of the problems in EEAP-PW and then proposes a new attribute-based authenticated key agreement protocol, denoted by EEAP-AK. to solve the problems. The proposed protocol supports the different level of security by diversifying network accessibility for the user attribute after the user attribute-based authentication and key agreement protocol steps. It efficiently solves the security problems in the EEAP-PW and we could support more secure home network service than the EEAP-AK.

Analysis and Prospect of Stream Control Transmission Protocol (SCTP 표준기술 분석 및 전망)

  • Koh, S.J.;Jung, H.Y.;Min, J.H.;Park, K.S.
    • Electronics and Telecommunications Trends
    • /
    • v.18 no.3 s.81
    • /
    • pp.11-20
    • /
    • 2003
  • 최근 SCTP(Stream Control Transmission Protocol)는 TCP/UDP 이후의 차세대 수송계층 프로토콜로서 주목 받고 있다. SCTP는 기존 TCP 및 UDP의 문제점을 극복하도록 설계되었으며 특히 multi-streaming 및 multi-homing 특성을 제공한다. 본 고에서는 SCTP 프로토콜의 기본 특징에 대하여 알아보고, 현재 논의중인 확장작업의 주요 골자를 살펴본다.

Analysis of an SIP System and Implementation of an User Agent Module (SIP 시스템 분석 및 사용자 에이전트 모듈 구현)

  • 이종열;노강래;김준일;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.283-285
    • /
    • 2002
  • 본 논문에서는 현재 VOIP(Voice Over IP)기술고서 ITU-T의 H.323에 대응되는 텍스트 기반 프로토콜인 SIP(Session Initiation Protocol)를 구현한 오픈 소스인 VOCAL(Vovida Open Communication Application Library) 시스템의 구조를 분석하고 SIP의 시스템을 구성하는 여러 모듈들을 테스트를 통하여 검증하였다. VOCAL의 사용자 에이전트에 RTP(Real-time Transport Protocol ) 포맷의 데이터를 전송/수신할 수 있는 모듈을 구현하고 검증하여, SIP 시스템에서 사용할 수 있는 사용자 에이전트의 활용에 대한 방안을 제시하였다.

  • PDF