• Title/Summary/Keyword: Data protocol

Search Result 3,891, Processing Time 0.028 seconds

The Development of Protocol for Construction of Smart Factory (스마트 팩토리 구축을 위한 프로토콜 개발)

  • Lee, Yong-Min;Lee, Won-Bog;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.1096-1099
    • /
    • 2019
  • In this paper, we propose the protocol for construction of smart factory. The proposed protocol for construction of smart factory consists of an OPC UA Server/Client, a technology of TSN realtime communication, a NTP & PTP time synchronization protocol, a FieldBus protocol and conversion module, a technology of saving data for data transmit latency and synchronization protocol. OPC UA server/client is a system integration protocol which makes interface industrial hardware device and supports standardization which allows in all around area and also in not independent from any platform. A technology of TSN realtime communication provides an high sensitive time management and control technology in a way of sharing specific time between devices in the field of high speed network. NTP & PTP time synchronization protocol supports IEEE1588 standardization. A fieldbus protocol and conversion module provide an extendable connectivity by converting industrial protocol to OPC. A technology of saving data for data transmit latency and synchronization protocol provide a resolution function for a loss and latency of data. Results from testing agencies to assess the performance of proposed protocol for construction of smart factory, response time was 0.1367ms, synchronization time was 0.404ms, quantity of concurrent access was 100ea, quantity of interacting protocol was 5ea, data saving and synchronization was 1,000 nodes. It produced the same result as the world's highest level.

Secure Data Gathering Protocol over Wireless Sensor Network (무선센서네트워크에서 안전한 데이터 수집 프로토콜)

  • Choi, Hae-Won;Ryoo, Myung-Chun;Lee, Chae-Soo;Kim, Hyun-Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.367-380
    • /
    • 2013
  • A secure data gathering in a Wireless Sensor Network(WSN) has given attention to one of security issues. In general, the process of secure data gathering causes difficulties: one process is exchanging the secured data and the other is constructing secured data path. The previous studies have been resolving the difficulties in terms of two problems: security and data gathering in WSNs. However, a WSN requires a protocol that has to guarantee a security of path between sensors and sink, or a cluster head. Thus how to gather data securely is an important issue. In this paper, we propose a secure data gathering protocol over WSNs, which consists of hierarchical key settlement and secure path construction, and aims at tackling two problems. The proposed protocol causes little overhead to sensor nodes for secured key settlement and path construction. This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation.

Performance Comparison of CDMA and TDMA protocols in radio access system for Integrated Voice/Data Services (음성 및 데이터서비스를 위한 무선접속시스템에서 CDMA와 TDMA방식의 성능비교)

  • 고종하;양영님;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.820-831
    • /
    • 1999
  • In this paper, we have compared the performance of a D-TDMA protocol with that of a CDMA protocol, in radio access system for integrated voice/data services.The D-TDMA protocol is based on a generic dynamic channel assignment approach to be followed a combination of “circuit mode” reservation for voice calls, along with dynamic first-come-first served assignment of remaining capacity for data messages. In the CDMA protocol, we have used the voice activity detection to reduce the interface power of other mobiles in internal and external cells, and analyzed the interference power ratio. Also we have computed BER(Bit Error Rate) by using this interference power ratio and evaluated voice blocking probability(voice packet loss probability) and data transmission delay, according to average data length and average data arrival rate.We have found the CDMA protocol achieves comparatively higher performance for short data length, regardless of data arrival rate. Otherwise, the data transmission delay of D-TDMA protocol is shorter than that of the CDMA protocol for long data message.

  • PDF

An Energy-efficient Data Dissemination Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이타 전달 프로토콜)

  • Yi, Seung-Hee;Lee, Sung-Ryoul;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • Data dissemination using either flooding or legacy ad-hoc routing protocol is not realistic approach in the wireless sensor networks, which are composed of sensor nodes with very weak computing power, small memory and limited battery. In this paper, we propose the ELF(Energy-efficient Localized Flooding) protocol. The ELF is energy-efficient data dissemination protocol for wireless sensor networks. In the ELF protocol, there are two data delivery phases between fixed source and mobile sink node. The first phase, before the tracking zone, sensing data are forwarded by unicasting. After that, within the tracking zone, sensing data are delivered by localized flooding. Namely, the ELF Properly combines advantages from both unicasting and flooding. According to evaluation results by simulation, the proposed ELF protocol maintains very high data delivery ratio with using a little energy. Also, the property of average delay is better than others. From our research results, the ELF is very effective data dissemination protocol for wireless sensor networks.

A Modified DCF Protocol for Real-Time Multimedia Data (Real-Time MultiMedia Data 전송을 위한 새로운 방식의 DCF 프로토콜)

  • 신세영;심승섭;조경익;윤석진
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.157-163
    • /
    • 2003
  • IEEE 802.11a Distributed Coordination Function(DCF) Protocol을 사용하여 Real-Time MultiMedia Data의 전송을 수행할 경우, DCF Protocol의 적합하지 못한 Mechanism에 의하여, Data 전송의 극대화를 이루지 못한다. Retransmission이 반복되는 경우, Binary Slotted Exponential Backoff Mechanism은 거대한 Packet Delay와 Jitter의 원인이 되며 Automatic Repeat Request(ARQ) 방식의 Ack Mechanism은 MultiMedia Data를 전송하기에 적합하지 못하다. 본 논문은 위와 같은 문제점을 해결하기 위하여 Real-Time MultiMedia Data을 주로 전송하는 STA에 따른 Real-Time/Non-Real-Time(RT/NRT) Station(STA)의 구분과 보내고자 하는 Real-Time MultiMedia Data의 Network Traffic Load(The Required Bandwidth)를 고려하여, Modified DCF(mDCF) Protocol의 Modified Backoff(mBackOff), Modified BlockAck(mBlockAck) Mechanism을 제시함으로서, Data 전송의 극대화를 제공하며, 또한 IEEE 802.11a와의 호환성을 제공한다.

  • PDF

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

A Study on the Voice/Data Integrated PRMA Protocol With the Minimum Reservation Slot Assured (최소 예약슬롯 보증 음성/데이타 집적 PRMA 프로토콜에 관한 연구)

  • 김태규;조동호;윤용중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.250-260
    • /
    • 1993
  • Packet Reservation Multiple Access(PRMA) protocol provides a very efficient mechanism for many number of voice and data terminals with bursty traffic characteristics to share efficiently a common transmission channel. This protocol, however, cannot operate in high load conditions. That is, there occurs a instability problem, since the reservation channel is allowed to shrink to zero. In this paper, a more stable PRMA protocol which can avoid such problems and integrates voice and data traffic efficiently is proposed. Also, the performance of the proposed protocol is analyzed by a computer simulation. According to the simulation results, it can be shown that the proposed protocol provides a more efficient mechanism for voice/data integration and ensures a more stable operation than conventional PRMA protocol in high load conditions.

  • PDF

Design of the SD Protocol Analyzer (SD 프로토콜 분석기 설계)

  • Moon, Ji-Hoon;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1697-1706
    • /
    • 2013
  • Protocol analyzer is being used to analyze proper processing of CMD & data when developing SD slave IP. In this thesis, a protocol analyzer was developed for analyzing SD protocol in Windows environment using Visual C++. SD protocol analyzer consists of embedded Linux software for storing SD memory data and MFC program for analyzing this. As for protocol analysis, it has been designed to collect data transmitted from SD memory card to host by Linux software for its analysis by MFC. It was found through the experiment that the CMD type could be confirmed that occurs when reading and writing data to SD memory card using the developed board, and debugging the problems that occur was possible.

Performance Analysis of Data Link Protocol for Interface between EIS and LDTS (전자연동장치와 역정보전송장치간 인터페이스를 위한 데이터링크 프로토콜 성능해석)

  • Hwang, Jong-Gyu;Lee, Jae-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.6 no.2
    • /
    • pp.135-141
    • /
    • 2003
  • According to the computerization of railway signaling systems, the interface link between these signaling equipment is also replaced by digital communication channel, expecially communication link for interface between EIS and LDTS, but there are some problems in the present state of railway signaling. First of all, different communication protocol is applied to interface between above two signaling equipment although they have same functions. The other is that the communication protocol currently used in railway field has some unreasonable points such as structure, formation of byte, error correction scheme and etc. To solve these problems, the standard communication protocol for railway signaling is designed. The structure of designed communication protocol and the results of performance analyses are represented in this paper. It will be expected the increase of safety, reliability and efficiency of maintenance of signaling system by using of the designed communication protocol for railway signaling.

A MAC Protocol for the Integrated Voice/Data Services in Packet CDMA Network (패킷 CDMA 망에서 음성/데이타 통합 서비스를 위한 MAC 프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.68-75
    • /
    • 2000
  • In this paper, a media access control protocol is proposed for voice/data integrated services in the packet CDMA network, and the performance of the proposed protocol is analyzed. The proposed protocol uses the spreading code sensing and the reservation schemes. This protocol gives higher priority to the delay-sensitive voice traffic than to the data traffic. A voice terminal can reserve an available spreading code during a talkspurt to transmit multiple voice packets. On the other hand, whenever a data packet is generated, the data terminal transmits the packet through one of the available spreading codes that are not used by the voice terminals. In this protocol, the voice packets do not come into collision with the data packets. The numerical results show that this protocol can increase the maximum number of voice terminals. The performance for the data traffic degrades by increasing the voice traffic load because of the low priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF