• 제목/요약/키워드: transmission protocol

검색결과 1,856건 처리시간 0.024초

프로토콜 분석모듈 설계에 의한 TCP 패킷 분석 (Analysis of TCP packet by Protocol Analysis module Design)

  • 엄금용
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

음성 및 화상 데이타 전송을 위한 트랜스포트 프로토콜의 설계 및 구현에 관한 연구 (A study on the design and implementation of the transport protocol for Audio/Video data transmission)

  • 김준;이광휘;안순신
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1987년도 전기.전자공학 학술대회 논문집(II)
    • /
    • pp.1053-1057
    • /
    • 1987
  • In this paper, we have studied a communication protocol which may provide Audio/Video data transmission in real time. Auido/Video data have its own characteristics. A new transport protocol with realtime constraint has been designed and implemented which performs dynamic error control and flow control depending on the characteristics of transmitted Audio/Video data. Since the receiving data can be predicted from the previously received data using the prediction function in Auido/Video data transmission, these functions are introduced in our transport protocol that may possibly improve the speed of data transmission and give a real time response. We have tested our transport protocol and measured the performance by the simulation. We assume that our transport protocol would be used in LAN environment. Our prime purpose is to provide a reliable and real time Auido/Video data transmission service.

  • PDF

PER Analysis for Cooperative Multi-Hop Transmission Protocol over Nakagami-m Fading Channels

  • Duy, Tran Trung;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • 제12권3호
    • /
    • pp.189-195
    • /
    • 2012
  • In this paper, we propose a novel protocol called a Multi-hop Diversity Transmission protocol in which the retransmission is realized by a relay that is Nearest to a current Source (MDTNS). We derive the mathematical expressions of the packet error rate (PER) and the average number of transmissions over Nakagami-m fading channels, and verify them by Monte Carlo simulations. The simulation results show that the MDTNS protocol improves the performance of the network in terms of PER when compared to the Multi-hop Diversity Transmission protocol in which the retransmission is done by a relay that is Nearest to Destination (MDTND) and to the conventional multi-hop transmission (CMT) protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • 제8권3호
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • 제8권1호
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

열차제어용 표준 통신 프로토콜의 안전 특성 분석 및 평가 (Safety Characteristics Analysis of Korean Standard Communication Protocol for Railway Signalling)

  • 황종규;조현정;이재호
    • 한국철도학회논문집
    • /
    • 제10권3호
    • /
    • pp.365-371
    • /
    • 2007
  • The communication protocol for interface among railway signalling systems is designed and established as national standard in Korean from a few years ago. So the communication link for information transmission among railway signalling system can be a good example of application of this standard. Communication protocol which is standardized among Korean railway signalling is considered to apply information transmission. And we confirmed there is no the states of deadlock of livelock in std. protocol which is applied formal verification which is one of the analytic method for inspection of safety characteristics in the design course of protocol. But the safety of protocol has to necessarily accomplish this normal analysis approach about satisfying requirement matters with such this analytic approach. In this paper we analyzed the safety characteristics of standard protocol for Korean Railway signalling through the requirement matters for safety transmission of railway transmission system which is required in international standard. So through this study we confirm whether it satisfies safety requirement matters of the level which require in international standard and tried to confirm whether standard protocol has enough safety character in the real railway field.

Urgency-Aware Adaptive Routing Protocol for Energy-Harvesting Wireless Sensor Networks

  • Kang, Min-Seung;Park, Hyung-Kun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.25-33
    • /
    • 2021
  • Energy-harvesting wireless sensor networks(EH-WSNs) can collect energy from the environment and overcome the technical limitations of existing power. Since the transmission distance in a wireless sensor network is limited, the data are delivered to the destination node through multi-hop routing. In EH-WSNs, the routing protocol should consider the power situations of nodes, which is determined by the remaining power and energy-harvesting rate. In addition, in applications such as environmental monitoring, when there are urgent data, the routing protocol should be able to transmit it stably and quickly. This paper proposes an adaptive routing protocol that satisfies different requirements of normal and urgent data. To extend network lifetime, the proposed routing protocol reduces power imbalance for normal data and also minimizes transmission latency by controlling the transmission power for urgent data. Simulation results show that the proposed adaptive routing can improve network lifetime by mitigating the power imbalance and greatly reduce the transmission delay of urgent data.

유해가스(CO, CO2) 감지정보 전송을 위한 USN 지그비센서노드 구현 (A Study on the USN Zigbee Sensor Node for Transmission to Harmful Gas(CO, CO2) Sensing Data)

  • 천동진;박영직;이승호;김정섭;곽동걸;정도영
    • 전기학회논문지
    • /
    • 제59권7호
    • /
    • pp.1302-1308
    • /
    • 2010
  • In this study, Zigbee Sensor Node to transmit harmful gases CO and $CO_2$ information using wireless communication within the ground and underground structures were developed. Wireless communication protocol was used Zigbee Stack included IEEE 802. 15.4 MAC protocol. For wireless transmission of detected harmful gas signal from ADC of MCU was implemented Zigbee Sensor Node that was developed protocol using Serial-Port-Profile(SPP) here. The proposed Zigbee Sensor Node was verified transmission distance from experiments. Transmission distance was into 90m in experiments. Distance experiments were measured at 10m intervals using sine & pulse wave input signal at indoors. The proposed Route Sensor Node was applied mesh routing protocol. When built up USN(Ubiquitous Sensor Network)using Route Sensor Node, transmission distance was not limited. On the experimental results, harmful gas values between direct measurements and USN measurements were consistent. The semiconductor CO sensor and N-DIR $CO_2$ sensor module as a harmful sensor was used. Therefore, the proposed Zigbee Sensor Node was verified about reliability and validity to build USN for transmission of harmful gas information.

A Comparative Study on Interference-Limited Two-Way Transmission Protocols

  • Xia, Xiaochen;Zhang, Dongmei;Xu, Kui;Xu, Youyun
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.351-363
    • /
    • 2016
  • This paper investigates the performance of interference-limited two-way transmission protocols in the Rayleigh fading channels. New lower bound of outage probability and approximate expression of bit error rate (BER) for three-phase two-way relaying (3P-TWR) protocol are derived in closed-form. These expressions are valid for arbitrary signal-to-noise ratio values, numbers of co-channel interferers and amajority of modulation formats employed in the practical system. Then a comparative study is developed for the performance of three two-way transmission protocols, i.e., direct transmission (DT) protocol, two-phase two-way relaying (2P-TWR) protocol and 3P-TWR protocol based on the asymptotic expressions of outage probability and BER. On the basis of the theoretical results, the thresholds on the strength (variance) of direct channel and target rate for the relative performance of different protocols are obtained and the effect of interferences at the terminal and relay on the relative performance is analyzed. The results present key insights on how to choose proper two-way transmission protocol with the knowledge of fading channels, required date rate and modulation format to optimize the system performance in the practical interference-limited scenarios. Simulation results are presented to validate the theoretical analysis.

애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜 (ECDH based authentication protocol for the Apple Bonjour protocol)

  • 권순홍;이종혁
    • 스마트미디어저널
    • /
    • 제8권3호
    • /
    • pp.9-16
    • /
    • 2019
  • 애플사는 장비 간 간편한 파일 송수신을 위해 자체적인 프로토콜인 Bonjour 프로토콜을 제공한다. 대표 서비스로는 Airdrop이 있으며, 애플사의 데스크탑, 노트북, 스마트폰 간에 간편한 데이터 송수신 프로토콜로 널리 사용되고 있다. 하지만, 2016년 해킹 보안 컨퍼런스인 Black Hat에서 Bonjour 프로토콜 취약점을 통해 중간자 공격이 가능함을 보였다. 본 논문은 장비 간 안전한 파일 송수신을 위해 Bonjour 프로토콜의 알려진 취약점을 설명하고, Bonjour 프로토콜의 안전성을 높이기 위해 ECDH(Elliptic Curve Diffie-Hellman) 기반 인증 프로토콜을 제안한다. 제안된 프로토콜을 상세한 동작 프로시저와 함께 설명하며, 중간자 공격과 신분위장 공격 가능성을 줄일 수 있음을 증명한다.