• Title/Summary/Keyword: CAN 프로토콜

Search Result 2,509, Processing Time 0.027 seconds

Coded Cooperation Communication over Two-Way Relay Network (양 방향 중계 네트워크에서의 부호화 협력 통신)

  • Park, Ji-Hwan;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.1
    • /
    • pp.24-29
    • /
    • 2011
  • Comparing conventional one-way relaying, two-way relaying scheme with network coding can achieve high throughput by reducing the transmission time. Coded cooperation protocol, which is a algorithm that uses coding on physical layer, can achieve high reliability. In this paper, we propose coded cooperation protocol over two-way relay network. Simulation results show proposed protocol has better performance in terms of reliability and throughput compare with conventional amplify and forward protocol. Also, with same throughput, proposed protocol has better performance in terms of reliability compare with the conventional hybrid decoded and forward protocol.

Starvation Free Protocol in CAN

  • Choi, Jun-Hyuck;Chung, Gi-Hyun;Choi, Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1515-1518
    • /
    • 2005
  • 이 논문은 Controller Area Network(CAN)에서 우선 순위를 가지는 메시지 전송 시 낮은 우선 순위 메시지 들의 starvation 방지 프로토콜을 제안한다. CAN 버스는 많은 부하가 걸리게 되면, 낮은 우선순위를 가지는 메시지는 전송될 기회를 잃어 버리게 되는 문제점을 안고 있다. 본 논문에서는 이러한 문제점을 해결하기 위해서 Starvation Free 프로토콜을 제안하고, 제안된 프로토콜을 verification tool 로 검증한다.

  • PDF

Implementation of LAN-based TCP/IP Protocol Analyzer using the object-oriented programming (객체지향형 언어를 사용한 LAN 기반의 TCP/IP 프로토콜 분석기 구현)

  • 이시현;강정진;장학신;조병순;최규민;정중수
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.86-92
    • /
    • 2000
  • In this paper, we develop protocol analyzer that can analyze and monitor LAN(Local Area Network)-based TCP/IP protocol using the OOP(object-oriented programming) in Windows98/NT environment. TCP/IP(Transmission Control Protocol/Internet Protocol) protocol analyzer is consist of interface hardware, protocol analysis software and GUI(Graphic User Interface). It is designed for the real-time analysis using the real-time object. In results of Performance test, TCP/IP Protocol analyzer is showed that it can analyze and monitor without frame error in LAN-based. Also, developed protocol analyser operates better than conventional protocol analyzer in performance. It can be used in maintenance fields of communication and network.

  • PDF

Design of Embedded Inter-ORB Protocol for CAN Network (CAN 네트워크를 위한 내장형 ORB 프로토콜의 설계)

  • 김기문;김선일;김태형;전광일;홍성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.194-196
    • /
    • 1999
  • 많은 내장형 시스템이 분산 제어 방식을 채용하고 있는 현재, 소프트웨어 개발자들은 이기종으로 구성된 시스템의 설계 및 관리에 많은 어려움을 겪고 있다. 이에 따라 범용 통신 미들웨어인 CORBA, DCOM 등을 내장형 시스템에 사용하고자 하는 요구가 높아지고 있으나 이들은 분산 내장형 시스템의 고유한 제약 조건을 만족하지 못해 내장형 시스템에 사용된 전례가 드물다. 본 논문은 표준 CORBA의 ORB 프로토콜인 GIOP가 CAN 네트워크와 같은 내장형 시스템에 사용된 전례가 드물다. 본 논문은 표준 CORBA의 ORB 프로토콜인 GIOP가 CAN 네트워크와 같은 내장형 콘트롤러 네크워크에 적용되었을 때 드러나는 문제점을 살펴보고, 이러한 고찰의 결과에 근거해 내장형 시스템 환경에 최적화된 새로운 ORB 프로토콜, EIOP (Embedded Inter-ORB Protocol)을 제안한다.

  • PDF

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

Design and Verification of a CAN Protocol Controller for VLSI Implementation (VLSI 구현을 위한 CAN 프로토콜 컨트롤러의 설계 및 검증)

  • Kim, Nam-Sub;Cho, Won-Kyung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.2 s.344
    • /
    • pp.96-104
    • /
    • 2006
  • This paper presents design methodology, encient verification and implementation of a CAN protocol controller. The design methodology uses a heuristic technique to make the design flexible and cost effective. Using the design methodology, we created architecture for a CAN controller which has flexible and low cost features. For faster time-to-market and reliable operation of the designed CAN protocol controller, we p개posed a three-step verification process which uses three different kinds of verification techniques. The goal of this three-step verification is to reduce the number of test sequences in order to rapidly implement the design without loss of reliability for faster time-to-market. The designed CAN protocol controller was fabricated using a 0.35 micrometer CMOS technology.

A Coordinator-based RFID Protocol to Avoid Reader Collision (코디네이터 기반 RFID 리더 충돌 회피 프로토콜)

  • Yang, Hoon-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.321-328
    • /
    • 2010
  • This paper presents a coordinator-based TDMA reader protocol that can avoid the reader collision in a passive RFID system. In the proposed protocol, the coordinator can not only minimize the number of empty slots by efficiently allocating slots to readers incoming in Poisson distribution, but reduce latency time through the limited frame size. The proposed protocol can be implemented in either mobile or fixed mode through the slot structure to be described in the context. The simulation results show it works as suggested and the frame size limitation as well as the statistical distribution of incoming readers has a great impact on the overall slots and the average latency time.

Efficient Message Scheduling Protocol for Variable-sized Messages in a WDM-based Local Network with Nonzero Tuning Time (WDM 기반의 근거리 망에서 변조시간을 고려한 효율적인 가변 길이 메시지 예약 프로토콜)

    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1238-1246
    • /
    • 2000
  • In a multi-channel network based on wavelength division multiplexing (WDM), an efficient protocol is needed for transmitter and receiver to be tuned to same wavelength during message transmission time. This paper proposes a message scheduling protocol that can efficiently support variable-sized messages, where tunable transceiver has nonzero tuning time. In this protocol, once a node reserves one data channel, it can persistently use the reserved channel till message transmission is finished. Therefore, overhead due to tuning time of the tunable transceiver can be reduced. Moreover, the protocol does not require any global information. Therefore, it can operate independently of the change of the number of nodes, and any new node can join the network at anytime without requiring network initialization. With this protocol, one can avoid data channel and destination conflicts. The protocol is analyzed with a finite population model and the throughput-delay characteristics are investigated as performance measures.

  • PDF

Design and Implementation of NMEA2000 Protocol Application for Marine Monitoring System (NMEA2000 프로토콜을 적용한 선박 모니터링 시스템 설계 및 구현)

  • Kim, Chang Young;Lee, Imgeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.317-322
    • /
    • 2015
  • Recently, due to the variety and complexity of marine electronics communication devices, much research has been done to adopt the novel communication protocol. Among them, NMEA2000 protocol, is adopted as standardized protocol to the next generation ship. In this paper, we design and implement the conversion algorithm for sensor protocol based on NMEA2000, and analog data module which convert data format between NMEA2000, CAN, Ethernet, RS232. The present study was designed to implement user-based data monitoring system by supporting various communication protocols through the development and application of key technologies through NMEA2000.

Design of Shared Memory-based Inter-ORB Protocol for Communication Systems (통신시스템을 위한 공유메모리 기반 ORB 연동 프로토콜의 설계)

  • Jang, Ik-Hyeon;Cho, Young-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.59-70
    • /
    • 2006
  • Since communication systems software is very large and complex, it requires component based architecture for software reusability, hardware transparency, high performance, and easy software reconstruction in different applications. In order to meet these requirements, we analyze performance and inter-process communication techniques of existing CORBA IIOP, and designed a shared memory-based CORBA inter-ORB protocol that would best fit for communication systems software. The designed protocol supports the same interface and can minimize the message transfer overhead in the same host environment. The test results of our protocol compared with other protocols show that the performance is increased by about 15%-200%. We are thus assumed that our protocol can be used in developing CORBA-based component software architecture for communication systems.

  • PDF