• 제목/요약/키워드: protocol design

검색결과 2,589건 처리시간 0.026초

프로토콜 검증시스템의 설계 및 구현 (DESIGN AND IMPLEMENTATION OF A PROTOCOL VERIFICATION SYSTEM)

  • 김용진
    • ETRI Journal
    • /
    • 제11권4호
    • /
    • pp.22-36
    • /
    • 1989
  • In this paper, a design and implementation of an efficient protocol verification system named LOVE has been described. The LOVE has been developed specifically for LOTOS. It performs not only protocol syntax validation (PSV) but also protocol functional verification(PFV). The PSV is a test to check if a protocol is free from protocol syntax errors such as deadlocks and livelocks. The PFV confirms whether or not a protocol achieves its functional objectives. For the PSV, the reachability analysis is employed, and the observational equivalence test is used for the PFV. For protocol verification using the LOVE, a schematic protocol verification methodology has been outlined.

  • PDF

시각적 프로토콜 분석법을 이용한 건축디자인의 시각정보처리 과정 및 행위 특성 분석 (The Visual Information Processing and the Characteristics of Behaviour of the Architectural design Process Using Visual Protocol Analysis)

  • 김용일
    • 한국실내디자인학회논문집
    • /
    • 제19호
    • /
    • pp.53-58
    • /
    • 1999
  • The goal of this paper is to understand the visual information process and the characteristics of behaviour of the architectural design process using visual protocol analysis through the actual experiment by the architect. The visual protocol analysis is developed on the basis of the theories of the visual information processing model and visual mental image, which can explain visual representation in architectural design process. A protocol study is reported in which the experimental data by architect is analyzed through the protocol analysis method. The whole design process is divided into the stage of 9 tasks which are classified into 18 visual representatiov. The results about visual cognition in cognitive science are reviewed and summarized, and these findings will help understand the architectural design nature.

  • PDF

ISDN Basic Access를 위한 LAPD 프로토콜의 설계 및 구현 (The design and implementation of LAPD protocol for ISDN Basic Access)

  • 한운영;서창진;정희창;임주환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1987년도 전기.전자공학 학술대회 논문집(II)
    • /
    • pp.921-923
    • /
    • 1987
  • This paper describes the design and implementation of LAPD protocol for ISDN Basic Access. In protocol design, Software module is divided according to function and interfaces between modules arc defined. After that, Software structure is defined. LAPD protocol is designed by state machine design technique and implemented by SDL.

  • PDF

CFSM을 이용한 통신 프로토콜의 합성 (Synthesizing of Communication Protocol using CFSM)

  • 이철희;이상호;김성열
    • 한국통신학회논문지
    • /
    • 제15권4호
    • /
    • pp.331-340
    • /
    • 1990
  • 통신 프로토콜의 설계에 있어 설계 과정의 단순화와 설계된 프로토콜의 논리적 정당성 입증은 중요한 과제이다. 본 논문에서는 FSM을 이용한 통신 프로토콜 설계 과정 효율화를 위한 합성방법을 제안한다. 통신 프로토콜의 속성 정보를 묵시적으로 표현하여 설계 과정이 단순화되도록 기존의 FSM을 확장시켜 CFSM 을 저의한다. 통신 프로토콜의 설계자는 FSM을 이용하여 오류를 고려하지 않은 한 통신 기계 M 만을 기술하며, 동기화를 보장받는 두 통신 기계 M'과 N'이 합성되며 M'과 N'이 오류 회복 기능을 갖도록 오류 회복용 변환 규칙을 적용하여 최종 프로토콜 EM'과 EN'을 얻는다.

  • PDF

Identity-Based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design

  • Shen, Jian;Moh, Sangman;Chung, Ilyong
    • Journal of Communications and Networks
    • /
    • 제14권6호
    • /
    • pp.682-691
    • /
    • 2012
  • Key agreement protocol is a fundamental protocol in cryptography whereby two or more participants can agree on a common conference key in order to communicate securely among themselves. In this situation, the participants can securely send and receive messages with each other. An adversary not having access to the conference key will not be able to decrypt the messages. In this paper, we propose a novel identity-based authenticated multi user key agreement protocol employing a symmetric balanced incomplete block design. Our protocol is built on elliptic curve cryptography and takes advantage of a kind of bilinear map called Weil pairing. The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks. Furthermore, our protocol is efficient and needs only two rounds for generating a common conference key. It is worth noting that the communication cost for generating a conference key in our protocol is only O($\sqrt{n}$) and the computation cost is only O($nm^2$), where $n$ implies the number of participants and m denotes the extension degree of the finite field $F_{p^m}$. In addition, in order to resist the different key attack from malicious participants, our protocol can be further extended to provide the fault tolerant property.

광 LAN을 적용한 765kV변전소 감시제어 시범시스템 설계 (Prototype design of fiber optics based 765kV substation control system)

  • 송인호;박종화;최종협
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 한국자동제어학술회의논문집(국내학술편); 포항공과대학교, 포항; 24-26 Oct. 1996
    • /
    • pp.996-999
    • /
    • 1996
  • This paper introduces prototype design of 765kV Substation control system based on fiber optics LAN and distributed network protocol. Two major important facts, immunity of any surge which frequently occurs in Ultra High Voltage Substation and the most suitable communication protocol for substation control system, are considered on the system design conception. To meet the first fact, use of fiber optics cable and isolation transformer are considered, and to satisfy the second fact, DNP3.0(Distributed Network Protocol) which is IEC870-5 compatible is adopted.

  • PDF

노인 간호 요양시설에서의 치매환자 통증관리 프로토콜 개발 및 효과 (Development and Effect of Pain Management Protocol for Nursing Home Patients with Dementia)

  • 장성옥
    • 기본간호학회지
    • /
    • 제14권1호
    • /
    • pp.29-43
    • /
    • 2007
  • Purpose: This study was done to develop a pain management protocol for nursing home patients with dementia and to examine effects of the protocol on pain assessments and interventions by the nurses and on pain relief signs in the patients. Method: The six steps in the protocol development and the examination of effect are outlined. Three rounds using the Delphi technique and one group pretest-posttest design experiment were developed. Design issues, such as sample selection and sample size, are addressed in relation to the study protocol. Results: After implementation of the pain management protocol, there were significant changes nursing actions including frequency of number of physical examinations, utilization of pain assessment tools, and request to doctors for discomfort management and there were significant changes in frequency in the number of verbal and physical expressions of pain, and emotional patterns. Conclusion: This is the first pain management protocol for patients with dementia in Korea. However, more study will be needed to determine the methodological strength and necessary revisions for the protocol.

  • PDF

제품디자인과제에 대한 디자인 정보와 프로세스에 기반한 프로토콜분석 사례연구 (Protocol Analysis of Product Design Assignment based on Design Information and Design Process : A Case Study)

  • 진선태;김용세
    • 디자인학연구
    • /
    • 제19권1호
    • /
    • pp.109-118
    • /
    • 2006
  • 이 연구는 4명의 경력을 가진 산업디자이너를 대상으로 프로토콜 분석을 통해 디자인행위를 탐색하기 위한 사례연구이다. 본 연구에서는 디자인정보양상, 프로세스의 패턴, 해결안의 질적 평가간의 관계를 디자인정보와 디자인프로세스에 기반한 상호보완적 코딩스킴 (Coding Scheme)을 사용하여 분석하였다. 또한 개인창의성모드 (Personal Creativity Mode)와 디자인 행위와의 관계들도 함께 분석하였다. 디자인프로세스에서는 각 디자인전략행위들이 균등하게 분배되어야 좋은 디자인결과물을 얻기 위한 선결조건으로 작용한다는 사실이 발견되었다. 또한 정황과 외부적 지식, GF(General Feathers)에 관한 디자인정보가 많을수록 독창적 디자인 컨셉이 만들어 지는데에 기여하는 것으로 보인다. PCMT에 관해서는 디자인창의성과의 차이성은 나타나지 않았고, 디자이너의 개인성향과 디자인행위간에만 작은 관련성이 드러났다. 이 사실은 실험에 참가한 디자이너들이 경험 이 많은 디자이너라는 것으로 설명될 수 있다. 향후 초보디자이너와 전문디자이너간 디자인정보와 프로세스에 기반한 프로토콜데이터를 통해 나타나는 차이성에 관한 연구와, 개인 디자인 프로세스패턴들이 디자인팀 구성에 있어 어떻게 활용될지에 대한 연구가 진행될 수 있을 것이다.

  • PDF

효율적 전자상거래를 위한 유한체 서브그룹 기반의 사용자 인증 프로토콜 설계 (Design of GE subgroup based User Authentication Protocol For efficient Electric Commerce)

  • 정경숙;홍석미;정태충
    • 한국전자거래학회지
    • /
    • 제9권1호
    • /
    • pp.209-220
    • /
    • 2004
  • If protocol has fast operations and short key length, it can be efficient user authentication protocol. Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF(p/sup 6/) that is existent finite field, and uses GF(p²) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol with y/sub i/ = g/sup b.p/sup 2(i-1)//ㆍv mol q, 1(equation omitted) 3 that is required to do user authentication.

  • PDF