• Title/Summary/Keyword: transmission protocol

Search Result 1,862, Processing Time 0.025 seconds

Analysis of TCP packet by Protocol Analysis module Design (프로토콜 분석모듈 설계에 의한 TCP 패킷 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

A study on the design and implementation of the transport protocol for Audio/Video data transmission (음성 및 화상 데이타 전송을 위한 트랜스포트 프로토콜의 설계 및 구현에 관한 연구)

  • Kim, June;Lee, Kwang-Hui;An, Sun-Shin
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1053-1057
    • /
    • 1987
  • In this paper, we have studied a communication protocol which may provide Audio/Video data transmission in real time. Auido/Video data have its own characteristics. A new transport protocol with realtime constraint has been designed and implemented which performs dynamic error control and flow control depending on the characteristics of transmitted Audio/Video data. Since the receiving data can be predicted from the previously received data using the prediction function in Auido/Video data transmission, these functions are introduced in our transport protocol that may possibly improve the speed of data transmission and give a real time response. We have tested our transport protocol and measured the performance by the simulation. We assume that our transport protocol would be used in LAN environment. Our prime purpose is to provide a reliable and real time Auido/Video data transmission service.

  • PDF

PER Analysis for Cooperative Multi-Hop Transmission Protocol over Nakagami-m Fading Channels

  • Duy, Tran Trung;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2012
  • In this paper, we propose a novel protocol called a Multi-hop Diversity Transmission protocol in which the retransmission is realized by a relay that is Nearest to a current Source (MDTNS). We derive the mathematical expressions of the packet error rate (PER) and the average number of transmissions over Nakagami-m fading channels, and verify them by Monte Carlo simulations. The simulation results show that the MDTNS protocol improves the performance of the network in terms of PER when compared to the Multi-hop Diversity Transmission protocol in which the retransmission is done by a relay that is Nearest to Destination (MDTND) and to the conventional multi-hop transmission (CMT) protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Safety Characteristics Analysis of Korean Standard Communication Protocol for Railway Signalling (열차제어용 표준 통신 프로토콜의 안전 특성 분석 및 평가)

  • Hwang, Jong-Gyu;Jo, Hyun-Jeong;Lee, Jae-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.3 s.40
    • /
    • pp.365-371
    • /
    • 2007
  • The communication protocol for interface among railway signalling systems is designed and established as national standard in Korean from a few years ago. So the communication link for information transmission among railway signalling system can be a good example of application of this standard. Communication protocol which is standardized among Korean railway signalling is considered to apply information transmission. And we confirmed there is no the states of deadlock of livelock in std. protocol which is applied formal verification which is one of the analytic method for inspection of safety characteristics in the design course of protocol. But the safety of protocol has to necessarily accomplish this normal analysis approach about satisfying requirement matters with such this analytic approach. In this paper we analyzed the safety characteristics of standard protocol for Korean Railway signalling through the requirement matters for safety transmission of railway transmission system which is required in international standard. So through this study we confirm whether it satisfies safety requirement matters of the level which require in international standard and tried to confirm whether standard protocol has enough safety character in the real railway field.

Urgency-Aware Adaptive Routing Protocol for Energy-Harvesting Wireless Sensor Networks

  • Kang, Min-Seung;Park, Hyung-Kun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.25-33
    • /
    • 2021
  • Energy-harvesting wireless sensor networks(EH-WSNs) can collect energy from the environment and overcome the technical limitations of existing power. Since the transmission distance in a wireless sensor network is limited, the data are delivered to the destination node through multi-hop routing. In EH-WSNs, the routing protocol should consider the power situations of nodes, which is determined by the remaining power and energy-harvesting rate. In addition, in applications such as environmental monitoring, when there are urgent data, the routing protocol should be able to transmit it stably and quickly. This paper proposes an adaptive routing protocol that satisfies different requirements of normal and urgent data. To extend network lifetime, the proposed routing protocol reduces power imbalance for normal data and also minimizes transmission latency by controlling the transmission power for urgent data. Simulation results show that the proposed adaptive routing can improve network lifetime by mitigating the power imbalance and greatly reduce the transmission delay of urgent data.

A Study on the USN Zigbee Sensor Node for Transmission to Harmful Gas(CO, CO2) Sensing Data (유해가스(CO, CO2) 감지정보 전송을 위한 USN 지그비센서노드 구현)

  • Cheon, Dong-Jin;Park, Young-Jik;Lee, Seung-Ho;Kim, Jeong-Seop;Kwak, Dong-Kurl;Jung, Do-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.7
    • /
    • pp.1302-1308
    • /
    • 2010
  • In this study, Zigbee Sensor Node to transmit harmful gases CO and $CO_2$ information using wireless communication within the ground and underground structures were developed. Wireless communication protocol was used Zigbee Stack included IEEE 802. 15.4 MAC protocol. For wireless transmission of detected harmful gas signal from ADC of MCU was implemented Zigbee Sensor Node that was developed protocol using Serial-Port-Profile(SPP) here. The proposed Zigbee Sensor Node was verified transmission distance from experiments. Transmission distance was into 90m in experiments. Distance experiments were measured at 10m intervals using sine & pulse wave input signal at indoors. The proposed Route Sensor Node was applied mesh routing protocol. When built up USN(Ubiquitous Sensor Network)using Route Sensor Node, transmission distance was not limited. On the experimental results, harmful gas values between direct measurements and USN measurements were consistent. The semiconductor CO sensor and N-DIR $CO_2$ sensor module as a harmful sensor was used. Therefore, the proposed Zigbee Sensor Node was verified about reliability and validity to build USN for transmission of harmful gas information.

A Comparative Study on Interference-Limited Two-Way Transmission Protocols

  • Xia, Xiaochen;Zhang, Dongmei;Xu, Kui;Xu, Youyun
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.351-363
    • /
    • 2016
  • This paper investigates the performance of interference-limited two-way transmission protocols in the Rayleigh fading channels. New lower bound of outage probability and approximate expression of bit error rate (BER) for three-phase two-way relaying (3P-TWR) protocol are derived in closed-form. These expressions are valid for arbitrary signal-to-noise ratio values, numbers of co-channel interferers and amajority of modulation formats employed in the practical system. Then a comparative study is developed for the performance of three two-way transmission protocols, i.e., direct transmission (DT) protocol, two-phase two-way relaying (2P-TWR) protocol and 3P-TWR protocol based on the asymptotic expressions of outage probability and BER. On the basis of the theoretical results, the thresholds on the strength (variance) of direct channel and target rate for the relative performance of different protocols are obtained and the effect of interferences at the terminal and relay on the relative performance is analyzed. The results present key insights on how to choose proper two-way transmission protocol with the knowledge of fading channels, required date rate and modulation format to optimize the system performance in the practical interference-limited scenarios. Simulation results are presented to validate the theoretical analysis.

ECDH based authentication protocol for the Apple Bonjour protocol (애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜)

  • Kwon, Soonhong;Lee, Jong-Hyouk
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.9-16
    • /
    • 2019
  • Apple provides its own protocol, the Bonjour protocol, for convenient file transmission and reception between device. Airdrop is a Bonjour-based, representative service that is widely used as a simple data transmission/reception protocol for Apple's desktops, laptops and smartphones. However, it was demonstrated in Black Hat, a hacking security conference in 2016, that it is possible to commence a Man-in-the-Middle attack by exploiting the Bonjour protocol's weak points. In this paper, we explain the Bonjour protocol's such vulnerability for secure file transmission/reception between devices and propose an ECDH (Elliptic Curve Diffie-Hellman) based authentication protocol to enhance the protocol's security. The proposed protocol is described along with detailed operational procedures, demonstrating that it is possible to reduce the possibility of Man-in-the-Middle attack and its masquerade variant.