• Title/Summary/Keyword: protocol layer

Search Result 795, Processing Time 0.064 seconds

Conformance Testing of Multi-protocol IUTs (다중계층 프로토콜의 적합성시험 방안)

  • Park, Yong-Beom;Kim, Myeong-Cheol;Kim, Jang-Gyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3086-3096
    • /
    • 1999
  • To declare conformance of multi-protocol Implementation Under Test(IUT), every layer of the multi-protocol IUT should be tested. According to ISO9646, single-layer test method is applied to testing the highest layer of multi-protocol IUT and single-layer embedded test method is used for the layers by layer all the protocols in a multi-protocol IUT. This paper proposes a new method for testing a multi-protocol IUT. The proposed test method assumes that a multi-protocol IUT is under test and that the interfaces between the layers cannot be controlled or observed by the tester. We apply the proposed test method to TCP/IP and compare the application results with those of the existing test turns out that the proposed test method significantly reduces the number of test cases as well as the number of test events while providing the same test coverage. In addition, the proposed test method shows the capability to locate the layer that is source of failure in testing multi-protocol IUTs.

  • PDF

Develpoment of Automatic Meter Reading Program for Electronic Power Meter (전자식 전력량계용 한전 프로토콜 및 운영 프로그램 개발)

  • Yu, In-H.;Jang, Mun-J.;Hyun, Duk-H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2219-2221
    • /
    • 2001
  • A communication protocol for automatic meter reading is designed for electronic power meter. Communicational functions and data structures are standardized and data reading software is developed according to the developed protocol. The communication protocol is designed with reference specifications, IEC 62056-31 and Distributed Network Protocol(DNP). For design, communicational functions and specifications of the industrial meters were analyzed for the purpose of developing a new one for KEPCO meters. The protocol is designed with 3 layer model, physical layers, data link layer and application layer. A documentation was completed with data gathering, data classification, authentication, error detection. An emulator system was made for testing the protocol. A meter reading software was developed using the protocol. Many different protocols and meter reading softwares are integrated into one with the developed protocol and software as KEPCO's standard.

  • PDF

An NSIS based Resource Reservation Protocol for Hose model VPN Service (Hose 모델 VPN 서비스를 위한 NSIS 기반 자원 예약 프로토콜)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.559-570
    • /
    • 2007
  • In this paper, we define a Hose-NSIS-QoSM, which reserves and manages resources according to the hose based resource provisioning mechanisms for supporting the VPN QoS(Quality of Service) using the NSIS(Next Step in Signaling) signaling protocol. Specifically, we specify the NSIS message objects, the structures of QoS NSLP(NSIS Signaling Layer Protocol)/NTLP(NSIS Transport Layer Protocol)/RMF(Resource Management Function) state tables and the processing of the signaling messages in NSIS nodes. Also, we compare the Hose-NSIS-QoSM with the Hose-RSVP-TE-QoSM that supports the hose based VPN QoS in the MPLS networks using the extended RSVP-TE mechanism.

Cooperation Protocol for Security Antibody Layer (보안 항체계층을 위한 코오퍼레이션 프로토콜)

  • 김세진;구자범;박세현
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.05a
    • /
    • pp.167-170
    • /
    • 2001
  • 인터넷 보안문제 해결을 위해서 침입탐지 시스템 및 바이러스 백신 등이 연구되어 왔고, 생체면역을 응용한 보안체계가 연구되고 있으나, 컴퓨터 자원소비와 비실시간대응의 문제점을 가지고 있다. 이에 Antibody Layer[1]는 인공면역과 Host alliance를 기반으로 하여 보안문제 해결에 효율성과 정확성을 제공하였다. 본 논문에서는 Antibody Layer의 Host alliance를 위한 Cooperation Protocol에 대하여 논하였다.

  • PDF

A study on implementation of MAP-MMS protocol (MAP-MMS 프로토콜의 구현에 관한 연구)

  • 고우곤;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.520-523
    • /
    • 1989
  • MAP(Manufacturing Automation Protocol), Network Protocol for FA has 7 Layer Structure of OSI. Being an Application Layer Protocol for Communication Interfaced with the Actual Programmable Devices, MMS(Manufacturing Message Specification) Consists of Three Factors of Services, Interfaces, and Protocol. For Details, It Classifies with the Followings ; Connection/Context Management, Remote Variable Access, Semaphore Management, File transfer and Management, Program UP/DOWN Load, Remote Program Fxecution. In this Paper Designing MAP Network Station of Programmable Device, we Analyze the Protocol of MMS, and Realize the State Diagram of each Services and Propose the Model of MMS Function Call Instructions.

  • PDF

MPLS Traffic Engineering of standard skill (MPLS Traffic Engineering의 표준 기술)

  • Kim, Kang;Jeon, Jong-Sik;Kim, Ha-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.68-73
    • /
    • 2001
  • MPLS(Multi protocol Label Switching) is standard skill for added to speed and control the Network Traffic. MPLS concerned the routing protocol to relative Pack line, Each Pack composed label and node, saved the time to seek the address of node. MPLS worked IP, ATM and Network protocol of flame rely. MPLS is Network OSI suport model, 2Layer send to most of Packinsted of 3Layer Switching. MPLS is added speed Traffic of QoS and effective controled the Network.

  • PDF

The Design and Implementation of the Motorized Valve Control System using CANopen Protocol (CANopen 프로토콜을 이용한 전동밸브 제어시스템 설계 및 구현)

  • Lee, Myung-Eui;Shin, Keun-Soo;Yang, Sung-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.321-327
    • /
    • 2010
  • This paper deals with the design and development of the motorized valve control system using CANopen protocol. The CAN network protocol is used in the physical layer(layer 1) and data link layer(layer 2), and other upper network layer above that layer 1 and 2 utilize the CANopen protocol in this paper. The motorized valve controller is implemented by a PIC microprocessor, and the server application software for the control system user is written in C# language. In particular the CANopen protocol is widely used int the area such as ship automation systems and marine transportation systems. The experimental result of the proposed control system implemented in this paper is evaluated via real-time experiments, which works well as designed.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Implementation of a Fieldbus System Based on EIA-709.1 Control Network Protocol (EIA-709.1 Control Network Protocol을 이용한 필드버스 시스템 구현)

  • Park, Byoung-Wook;Kim, Jung-Sub;Lee, Chang-Hee;Kim, Jong-Bae;Lim, Kye-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.7
    • /
    • pp.594-601
    • /
    • 2000
  • EIA-709.1 Control Network Protocol is the basic protocol of LonWorks systems that is emerg-ing as a fieldbus device. In this paper the protocol is implemented by using VHDL with FPGA and C program on an Intel 8051 processor. The protocol from the physical layer to the network layer of EIA-709.1 is im-plemented in a hardware level,. So it decreases the load of the CPU for implementing the protocol. We verify the commercial feasibility of the hardware through the communication test with Neuron Chip. based on EIA-709.1 protocol which is used in industrial fields. The developed protocol based on FPGA becomes one of IP can be applicable to various industrial field because it is implemented by VHDL.

  • PDF

Realization and Test of the Transport Layer Protocol (전달 계층 프로토콜 구현 및 시험에 관한 연구)

  • 전동근;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.650-662
    • /
    • 1993
  • The thesis describes the realization and test of the transport layer operating on the CLNS (Connection Less Network Service) which is specified by ISO 8073 and ADDENDUM 2 protocol. For realization of the transport layer, five modules and interface primitives were definde. This protocol was formally described by SDL (Specification and Description Language) and was programmed in C-language. For verification of the software, protocol tester was implemented and test scenarios were defined. The verification was accomplished based on the test scenarios. Transport Layer software presented in this thesis may be utilized in a real situation with some modifications. Protocol tester presented in this thesis can also be used for verification of other protocol softwares.

  • PDF