• Title/Summary/Keyword: protocol model

Search Result 1,388, Processing Time 0.029 seconds

Delay Performance Analysis of the NAK-based SR-ARQ Protocol with the Reverse Acknowledgment (RA) Scheme

  • Han, Je-Chan;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.989-997
    • /
    • 2008
  • The reverse acknowledgment (RA) scheme supports a fast loss recovery for negative acknowledgment (NAK)-based selective repeat automatic repeat request (SR-ARQ) by detecting a retransmission failure quickly before a retransmission timer expires. In this paper, we evaluate the performance of a NAK-based SR-ARQ protocol with the RA scheme and compare it with the conventional NAK-based SR-ARQ protocol. Particularly, we propose a simple analysis model for the transport delay of the NAK-based SR-ARQ protocol considering the traffic condition, the retransmission persistence, the timer-based retransmissions and the RA scheme's behavior. Both NAK-based SR-ARQ protocols with and without the RA scheme are implemented by using the OPNET simulator. We verified the analysis model's accuracy through the simulation results. Also, we evaluate the performance of the NAK-based SR-ARQ protocol with the RA scheme based on analysis and simulation results.

Performance Analysis of Key Distribution Protocol in Satellite Network (위성 통신망에서 키 분배 프로토콜의 성능분석)

  • 진상민;조동호;이상한;강건우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.955-963
    • /
    • 1999
  • In this paper, in other to analyze the performance of efficient key distribution protocol, we evaluate the key distribution processing method of push model like the Kerberos and pull model such as X.9.17 used in wired network. Also, we evaluate the procedure of key distribution protocol in satellite network. Besides, we analyze the performance of key distribution protocol procedure in view of delay and throughput in the case that key distribution protocol is processed based on Inband/Outband channel.

  • PDF

Packet Delay and Energy Consumption of S-MAC Protocol in Single-Hop Wireless Sensor Network (단일 홉 무선 센서 네트워크에서 S-MAC 프로토콜의 패킷 지연 및 에너지 소비)

  • Sung, Seok-Jin;Woo, Seok;Kim, Chung-San;Kim, Ki-Seon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.53-54
    • /
    • 2006
  • In this paper, we analytically evaluate packet delay and energy consumption of S-MAC protocol with a modified Markov chain model. Although some models, based on IEEE 802.11 MAC protocol, to analyze the S-MAC protocol in wireless sensor network (WSN) have been proposed, they fail to consider the differences in architecture between the S-MAC and the 802.11 MAC. Therefore, by reflecting the significant features in the S-MAC function, we model the operation of S-MAC protocol, and derive its packet delay and energy consumption in single-hop WSN. Numerical results show the delay and the dissipated energy at various duty cycle values according to offered load, where a practical mote is used.

  • PDF

Delay Analysis of the ISDN D-channel Access Protocol (ISDN D-채널 Access Protocol의 Delay 분석)

  • 이구연;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.98-111
    • /
    • 1990
  • In this paper a queneing model for the D channel access protocal recommeded by CCITT is developed, and delays of the signalling and packet messages are analyzed using the model, Behaviors of packet and signalling messages in the D-channel access system are also investigated. The analytical results have been verified by simulation.

  • PDF

Performance Evaluation of AODV and OLSR Routing Protocol According to Node's Mobility Model (노드 이동성 모델에 따른 AODV와 OLSR 라우팅 프로토콜의 성능 분석)

  • Kang, Mi-Seon;Kum, Dong-Won;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7A
    • /
    • pp.662-668
    • /
    • 2011
  • This paper analyzes the performance of the Ad hoc On-demand Distance Vector (AODV) routing protocol and Optimized Link State Routing (OLSR) for Mobile Ad hoc Networks (MANETs) using node mobility models. Mobility affects the performance of a routing protocol as it causes changes to network topology. Thus, evaluating the performance of a MANET routing protocol requires mobility models that can accurately represent the movements of mobile nodes. Therefore, this paper evaluates the performance of the AODV and OLSR routing protocols using the random way point model and the Levy walk model by the ns-2 simulations.

Verification Test of Communication Protocol for Interface between EIS and LDTS (철도신호설비 상호간 정보전송을 위한 통신 프로토콜 검증시험)

  • 황종규;이재호;윤용기;신덕호
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.2
    • /
    • pp.114-119
    • /
    • 2004
  • According to the computerization of railway signalling systems. the communication protocol for interface between these systems are required. Therefore the new communication protocol for railway signaling system is required. Generally, there are two verification method for new designed protocol in the industrial and academic fields. One is the laboratory testing method which is very popular and general technique. In our research the comparison between existing and new designed protocol for signaling is described and the verification test results are also represented. From these laboratory test, we are verified the conformance of new designed protocol. Another method is verified by formal method. The format verification method is widely used at safety-critical system design but this approach is nor popular at verification communication protocol. However it is very important to verify the safety of new designed protocol for railway signaling system because signaling systems are very safety-critical systems. So, the methodology for formal verification of designed protocol is also reviews in this paper.

Performance Analysis and Validation of Railway Signalling Communication Protocol (철도신호용 통신 프로토콜 성능해석 및 검증)

  • Hwang Jong-Gyu;Lee Jae-Ho;Shin Duk-Ho
    • Proceedings of the KSR Conference
    • /
    • 2003.05a
    • /
    • pp.462-467
    • /
    • 2003
  • According to the computerization of railway signalling system, necessity of communication protocol for interface between these equipments is increasing. Therefore the research on communication protocol structure that is required according to computerization trend of these signalling goes. In our research the existed protocol currently used was analyzed, and the simulation modeling for performance analysis is deduced. Based on this simulation model the performance analysis and comparison is carried out, and also validation test is executed about new suggested protocol.

  • PDF

Performance Analysis and Testing of Railway Signalling Communication Protocol (열차제어용 통신프로토콜 구조분석 및 성능검증 시험)

  • Hwang, Jong-Gyu;Lee, Jae-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2003.07b
    • /
    • pp.1318-1320
    • /
    • 2003
  • According to the computerization of railway signalling system, necessity of communication protocol for interface between these equipments is increasing. Therefore the research on communication protocol structure that is required according to computerization trend of these signalling goes. In our research the existed protocol currently used was analyzed, and the simulation modeling for performance analysis is deduced. Based on this simulation model the performance analysis and comparison is carried out, and also validation test is executed about new designed protocol.

  • PDF

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

A Study on Key Information Service Protocol for Secure XML Web Service (안전한 XML 웹 서비스를 위한 키 정보 서비스 프로토콜에 관한 연구)

  • Park, Nam-Je;Moon, Ki-Young;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.769-778
    • /
    • 2003
  • XKMS(XML Key Management Specification), one of XML Security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XML Key Information protocol service model and implements reference model of protocol component based on standard specification. Also describes the analysis and security method of Key Information Service(XKIS) for Secure XML Web Service,paying attention to the features of XML based security service. This protocol component supported includes public key location by given identifier information, the binding of such keys to edentifier information. This reference model offers the security construction guideline for future domestric e-Business Frameworks.