• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.023 seconds

Study of Bluetooth Scatternet Formation (Bluetooth Scatternet Formation에 관한 연구)

  • 안호성;황진옥;민성기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.592-594
    • /
    • 2004
  • Bluetooth 칩셋의 생산량을 보면, 보이지 않는 곳에서 Bluetooth의 성장은 계속 되고 있다. [1] 그리고 Bluetooth는 Scatternet을 구성하여 Personal Area Network의 영역을 넘어 Senssor network에 적용하는 것이 가능하다. 그러나 Bluetooth specification[2]에서는 Scatternet Formation 방법에 대해 제안하지 않는다. 이를 개선하기 위해 BTCP (Bleutooth Topology Construction Protocol)[3], Bluetree[4], Bluenet[5], TPSF(Two-Phase Scatternet Formation) protocol[6]이 제안되었다. 본 논문에서는 이러한 protocol들을 개략적으로 설명하고 그에 대한 장단점을 알아보겠다.

  • PDF

Picture archiving and communications systems development and performance results

  • Nam, Ji-Seung;Ralph Martinez
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1796-1800
    • /
    • 1991
  • Picture Archiving and Communication Systems(PACS) provide an integration of digital imaging information in a hospital, which encompasses various imaging equipment, viewing workstations, database archive systems, and a high speed fiber optic network. One of the most important requirements for integration is the standardization of communication protocols to connect devices from different vendors. Since 1985, the ACR-NEMA standard provides a hardware interface, a set of software commands, and a consistent set of data formats for point-to-point interconnection of medical equipment. However, it has been shown to be inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks has been suggested to the ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS's capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization / Open Systems Interconnection (ISO/OSI) protocols and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the proposed PACS protocol into network node. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The implementation has natural extentions to Global PACS environments. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance evaluation are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is performed on the PACS prototype node.

  • PDF

A Specification-based Intrusion Detection Mechanism for LEACH Protocol (LEACH 프로토콜에 적합한 명세기반 침입탐지 기법)

  • Lee, Yun-Ho;Kang, Jung-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.138-147
    • /
    • 2012
  • With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.

Implementation of Image Transmission System in Ad-Hoc Network Using AODV Routing Protocol (Ad hoc 네트워크에서 AODV 라우팅 프로토콜을 이용한 영상 전송 시스템 구현)

  • Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.92-100
    • /
    • 2008
  • Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base stations. Recently, Ad-hoc networks are evolving to support multimedia contents according to expansion of ad hoc multi-hop communication system. Wireless ad-hoc network is different from the conventional wired network by frequent changes in network topology, number of routers and resources, there are a number of problems in applying conventional routing protocol to ad-hoc network. The AODV routing protocol is proposed for mobile node in ad-hoc networks. AODV protocol that provides to guarantee QoS for data transmission in ad hoc networks that link break frequently occurs. In this paper, AODV routing protocol based NDIS(Network Driver Interface Specification) is implemented. We design high performance image transmission that can operate with software(AODV) for ad-hoc networks without degradation. and verify operation of AODV routing protocol on the test bed.

  • PDF

Implementation of Communication Protocol between Control Centers using ICCP (ICCP를 사용한 전력센터간의 통신 프로토콜 구현)

  • Jang, Kyung-Soo;Chang, Byung-Wook;Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3910-3922
    • /
    • 2000
  • Current power systems are distributed geographically and operated in the form of Energy Management System(EMS)/ Supervision Control and Data Acquisition(SCADA) with the aid of computers and communications. Recently a variety of utilities have had interests in using inforrration technology to bring the efficiency and low operational costs. There is also a trend to integrdte the production, transmission, distribution and management/control of power into one and unified distributed system. To this end, Electric Power Hesearch Institute(EPRI) announced a new standard communication protocol called Inter-Control Center Protocol(ICCP).ICCP specifies the use of Manufacturing Message Specification(MMS) for services required by rccr in application layer and supports the communications between heterogeneous control centers. This paper presents the characteristics of MMS,ICCP and their relationship. Futherrnore, we implement the basic functional blocks of ICCP using MMS services under TCI/IP environments. Finally, we model a simple power system and apply the rccp protocol to this system in a window-based scheme, and finally show the operation and validation of this protocol.

  • PDF

Description of Abstract Test Suite using TTCN (TTCN을 사용한 추상시험스위트 작성 방안)

  • Park, Yong-Bum;Chin, Byoung-Moon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.128-136
    • /
    • 1998
  • TTCN(Tree and Tabular Combined Notation), as an international standard, provides a concept and notation to describe a protocol test specification. In this paper, we explain some considerations on each components of Abstract Test Suite and propose naming conventions for Constraints and Test Cases based on the experience of describing Test Suite for real protocol. We also analyze some problems on real application of Test Suite and propose an approach to avoiding such problems in the stage of Test Suite specification. In this paper, we use the SSCOP(Service Specific Connection Oriented Protocol) protocol, that is a sub-layer of ATM Forum UNI 3.1 protocol stack, as an example to proposals on naming conventions on Constraints and Test Cases.

  • PDF

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

A Research of FS-VDSL Adaptation in Home Network (홈네트워크에서 FS-VDSL 적용방안에 관한 연구)

  • Lee Sang-Jae;Jun Yong-Il;Lee Hyoung-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.349-352
    • /
    • 2003
  • In this paper, we introduce the concept, architecture, and service areas of FS-VDSL specification. We mainly focused on FS-VDSL CPE architecture, which consists of two different types, concentrated architecture and distributed one. We also provide the possibility of CPE adaptation in domestic in-home environment. As a result of our study, distributed CPE architecture is a better candidate to our in-home environment. Another important point of consideration in FS-VDSL adaptation in Korea is the protocol stack of FS-VDSL. Recently, Ethernet-based VDSL technology is more populated than ATM-based VDSL, which is originally adopted in FS-VDSL specification. So, we must deeply think about the modification of protocol stack of FS-VDSL when deploying it in Korea.

  • PDF

A study on interoperability and applicability of the Korean Radio based Train Control System(KRTCS) (무선기반 도시철도용 열차제어시스템(KRTCS)의 상호운영성 및 적용성 연구)

  • Kang, Yong-Sam
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.6
    • /
    • pp.1095-1102
    • /
    • 2016
  • A TCS(Train Control System) is the core facility to ensure the safety and efficiency of train operations, it is difficult to have interoperability between the TCS suppliers. To ensure the interoperability between TCSs, there is a need for definition, validation and standardization on the system configuration, the functions of subsystems, the interface between subsystems an the system protocol. In this paper, we analyzed the completeness of the KRTCS(Korean Radio based Train Control System) specification, derived supplements what you need to apply the KRTCS specification to new urban lines.