• Title/Summary/Keyword: 제어 네트워크

Search Result 3,847, Processing Time 0.037 seconds

Communication Management Architecture for Supporting Flexible Control in Multimedia Multicast Environment (멀티미디어 멀티캐스트 환경에서 유연한 제어를 지원하기 위한 통신 관리 구조)

  • 노원종;김상경;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.451-453
    • /
    • 1999
  • 멀티미디어 멀티캐스트에서의 통신 관리를 위한 기존의 많은 방법들은 인터넷이나 ATM망 같은 특정 전송환경에 의존적이었고, 효율적인 통신 관리 메카니즘이 부족했다. 본 논문에서는 다양한 멀티미디어 멀티캐스트 어플리케이션에 적용될 수 있는 유연하고 확장 가능한 통신 관리 구조를 정의한다. 이 구조는 제어와 터미널의 분리를 통해 원격제어 및 이동 제어가 가능하게 함으로서 다양한 방법으로 서비스를 이용할 수 있는 환경을 제공하며, 호 제어와 연결 제어를 분리하여 연결자원의 효율적인 사용을 가능케 했으며, 연결제어를 위해 기존의 프로토콜의 접합을 사용함으로서 네트워크 환경에 독립적인 환경을 제공할 수 있고, 기존 전송 네트워크의 최소한의 수정 및 구조의 실용성 증가를 기대할 수 있다.

  • PDF

전력 제어시스템에서 안전한 보안 인증을 위한 메커니즘 소개

  • Park, Jun Yong;Min, Nam-Hong;Ha, Gi-Ung;Yu, Ki-Soon;Song, Kyoung-Young
    • Review of KIISC
    • /
    • v.24 no.3
    • /
    • pp.44-53
    • /
    • 2014
  • 최근 전력 제어시스템의 자동화 효율(Automation Efficiency)과 상호운용성(Interoperability)을 높이기 위해 공개된 표준 프로토콜과 상용 시스템을 사용하게 되었고 외부망과의 연결 필요성이 증가됨에 따라 SCADA 시스템에 대한 공격 위협성이 증가하고 있다. 그러나 전력 제어시스템의 중앙제어장치(Master)와 현장 운영장치(Outstation) 간 데이터를 교환하기 위한 통신 규격인 DNP(Distributed Network Protocol) 프로토콜은 보안을 고려하지 않고 개발되어 통신규격 자체에 보안 취약점을 가지고 있었고, 제어시스템에 대한 사이버 위협 요소도 크게 증가하고 있다. 정보통신 기술의 발전과 개방형 망이 갖는 장점을 취하기 위하여 DNP3 프로토콜은 TCP/IP 네트워크를 지원하게 되었고, TCP/IP 네트워크가 가지고 있는 기존의 보안 취약점(Vulnerability)이 전력 제어시스템 및 통신망에 그대로 이전되고 있어 중앙제어장치와 현장운영장치 간에 DNP3 표준에서 제시한 사항 외에 추가적인 보안 메커니즘이 요구된다. 본 논문에서는 SCADA 시스템이 보안성을 갖고 안전하게 운용되기 위한 IEEE DNP3 표준과 ISO/IEC TC57 WG15에서 권고하고 있는 IEC 62351 표준의 인증 및 암호화 메커니즘을 소개한다.

Distributed Control Framework for Demand-Response Service based on Mobile Agent (이동에이전트 기반의 수요반응 서비스를 위한 분산제어 프레임워크)

  • Baek, Seunghyun;Jang, Minseok;Lee, Yonsik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.571-573
    • /
    • 2020
  • 현재의 센서네트워크 환경은 자원사용의 효율화를 위한 제어시스템의 지원이 필수적으로 요구된다. 본 논문은 이동에이전트 기반의 데이터 획득기능, Zigbee 기반 데이터 통신기능, 연산 및 능동규칙 처리기능 등을 지원하는 분산제어 프레임워크를 제안함으로써, 센서네트워크 환경에서 무선방식의 분산된 장치들의 자율제어를 통한 효율적 분산제어시스템 구축에 적용하도록 한다. 제안 프레임워크는 환경 변화, 사용자의 행동 변화 및 이상 패턴 탐지 등에 따른 최적 제어를 기반으로 하는 스마트 전력서비스 개발과 수요자의 요구에 자율적 지능적으로 반응하는 수요반응 서비스 개발에 적용이 가능하다.

  • PDF

Implementation of Small-Scale Wind Turbine Monitoring and Control System Based on Wireless Sensor Network (무선 센서 네트워크 기반 소규모 풍력발전기 모니터링 및 제어 시스템 구현)

  • Kim, Do-Young;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1808-1818
    • /
    • 2015
  • Recently, the wind power has experienced great attentions and growths among many renewable energy sources. To increase the power generation performance and economic feasibility, the size of wind turbine (WT) is getting bigger and most of wind power plants are being constructed on offshore. Therefore, the maintenance cost is relatively high because boats or helicopters are needed operators to reach the WT. In order to combat this kind of problem, remote monitoring and control system for the WT is needed. In this paper, the small-scale WT monitoring and control system is implemented using wireless sensor network technologies. To do this, sensor devices are installed to measure and send the WT status and control device is installed to receive control message for specific operation. The WT is managed by control center through graphic user interface (GUI) based monitoring and control software. Also, smart device based web-program is implemented to make the remote monitoring of the WT possible even though operators are not in control room.

A Best-Effort Control Scheme on FDDI-Based Real-Time Data Collection Networks (FDDI 기반 실시간 데이타 수집 네트워크에서의 최선노력 오류제어 기법)

  • Lee, Jung-Hoon;Kim, Ho-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.347-354
    • /
    • 2001
  • This paper proposes and analyzes an error control scheme which tries to recover the transmission error within the deadline of a message on FDDI networks. The error control procedure does not interfere other normal message transmissions by delivering retransmission request via asynchronous traffic as well as by delivering retarnsmitted message via overallocated bandwidth which is inevitably produced by the bandwidth allocation scheme for hard real-time guarantee. The receiver counts the number of tokens which it meets, determines the completion of message transmission, and finally sends error report. The analysis results along with simulation performed via SMPL show that the proposed scheme is able to enhance the deadline meet ratio of messages by overcoming the network errors. Using the proposed error control scheme, the hard real-time network can be built at cost lower than, but performacne comparable to the dual link network.

  • PDF

Game Algorithm for Power Control in Cognitive Radio Networks (전파 인지 네트워크에서 전력 제어를 위한 게임 알고리즘)

  • Rho, Chang-Bae;Halder, N.;Song, Ju-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.201-207
    • /
    • 2009
  • Recently effective spectrum resource technologies have been studied using a game theorectical approach for cognitive radio networks. Radio resource management is required an effective scheme because the performance of a radio communication system much depends on it's effectiveness. In this paper, we suggest a game theoretical algorithm for adaptive power control which is required an effect scheme in cognitive radio networks. It will be a distributed network. In the network distributed cognitive radio secondary users require an adaptive power control. There are many results which are suggested some possibility of game theoretical approaches for communication resource sharing. However, we suggest a practical game algorithm to achieve Nash equilibrium of all secondary users using a Nash equilibrium theorem in this paper. Particularly, a game model was analyzed for adaptive power control of a cognitive radio network, which is involved in DSSS (Direct Sequence Spread Spectrum) techniques. In case of K=63 and N=12 in the DSSS network, the number of iteration was less than maximum 200 using the suggested algorithm.

  • PDF

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Topology Control Scheme Providing Throughput Requirement of a Service in Wireless Sensor Networks (무선 센서 네트워크에서 서비스에 필요한 데이터 전송량을 확보하기 위한 토폴로지 관리 방법)

  • Youn, Myungjune;Kim, Seog-gyu;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1767-1775
    • /
    • 2015
  • There are various kinds of applications for wireless sensor network, and each application has difference requirements such as throughput. Topology control is the key issue to minimize energy consumption by solving communication collision and radio interference. However, existing topology control algorithms cannot support application requirement because communication efficiency and network connectivity are the main issues of topology control. In this paper, we propose a topology control algorithm that support throughput requirement of an application.

Implementation of Home Gateway System using Cellular Phone and Sensor Network on Ubiquitous Environment (유비쿼터스 환경에서 휴대폰과 센서를 이용한 홈 게이트웨어 시스템 구현)

  • Choi, Seong-Kyou;Lee, Hei-Kyung;Kim, Jun-Kyu;Lee, Jong-Kee;Jung, Heon-Man;Lee, Se-Hoon
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.123-127
    • /
    • 2006
  • In this paper, we designed and implemented home gateway system for remote control of home appliances and devices using cellular phone. The system communicate home devices through Zigbee protocol and home server based on Linux operating system communicate cellular phone through external networks. We expect that the system apply various fields as home automations, home network, smart offices, and ubiquious environments.

  • PDF

TCP Congestion Control Using EWLN in Wireless Networks (무선환경에서 EWLN을 이용한 TCP 혼잡제어)

  • Joh, Hang-Ki;Choi, Seung-Jun;Kim, Seok-Hoon;Ryoo, In-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.241-247
    • /
    • 2011
  • Most of network congestions are caused by TCP packet losses in the wired network ecosystems. On the contrary, high BER (Bit Error Rate), which is characteristic of the wireless networks, is a main factor in wireless network environments. Many wireless networks carry out the congestion control mechanisms frequently because they estimate that packet losses are not due to the wireless signal qualities but the congestion controls in their networks. To solve this problem, we propose the improved EWLN (Explicit Wireless Loss Notification) algorithm that more efficiently utilize the congestion window size to increase the wireless network throughput than legacy EWLN algorithm.