• 제목/요약/키워드: Internet Protocol

검색결과 2,437건 처리시간 0.033초

Fuzzy를 적용한 LEACH Protocol 기반 무선 센서 네트워크 프로토콜 (Wireless Sensor Network Protocol based on LEACH Protocol using Fuzzy)

  • 이종용
    • 한국인터넷방송통신학회논문지
    • /
    • 제17권4호
    • /
    • pp.115-121
    • /
    • 2017
  • 무선 센서 네트워크는 현실로부터 데이터 수집이 가능한 센서가 장착된 노드들이 무선으로 구성된 네트워크이다. 센서 노드들이 무선으로 구성되었기 때문에 배터리와 같은 제한된 전원을 가지게 된다. 센서 노드의 배터리가 모두 소모되어 버리면 해당 노드는 더 이상 사용할 수 없게 되며, 일정 이상의 노드가 죽으면 네트워크는 제 역할을 못하게 된다. 에너지 효율을 높이기 위한 무선 센서 네트워크 프로토콜은 여러 가지가 있으며, 그 중 LEACH Protocol이 대표적이다. LEACH protocol은 클러스터 기반 프로토콜로 센서 공간을 클러스터로 나누어 노드 간 송수신을 한다. 그렇기 때문에 클러스터가 어떻게 구성되었느냐에 따라 에너지의 소모양이 줄어들기도 늘어나기도 한다. 클러스터 선정하는 방법을 Fuzzy를 이용하여 개선한 세 종류 프로토콜과 기존 LEACH Protocol의 네트워크 수명을 비교해보고자 한다.

차세대 광 패킷 인터넷을 위한 통합 네트워크 제어 구조 (An Integrated Network Control Framework for the Next-Generation Optical Internet)

  • 박성용
    • 제어로봇시스템학회논문지
    • /
    • 제6권8호
    • /
    • pp.666-671
    • /
    • 2000
  • With the current advances in optical WDM (Wavelength Division Multiplexing) networking technologies and the increasing demand for network bandwidth the Next Generation Internet is expected to be a network that runs IP(Internet Protocol) directly over WDM-based optical networks. The network control architecture for the IP over WDM networks is different from that of traditional Internet since the underlying WDM devices have more constraints than electronic IP routers such as the lack of optical buffers and wavelength continuity property etc. In this paper we introduce several architectural models for implementing IP over WDM networks and propose an integrated network control framework for the IP over WDM networks. This framework leverages the traffic engineering control architecture for the MPLS (Multi-Protocol Label Switching) networks and is mainly developed for the IP over packet-switched WDM networks. We also report several preliminary simulation results of contention resolution schemes in the packet-switched WDM networks.

  • PDF

A Study on VoIP Information Security for Vocie Security based on SIP

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제6권1호
    • /
    • pp.68-72
    • /
    • 2008
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

음성 전화를 위한 Internet-ISDN 연동 게이트웨이 신호 프로토콜 검증 (Signalling Protocol Validation of Internet-ISDN Interworking Gateway for Voice Telephony)

  • 유상신
    • 한국정보처리학회논문지
    • /
    • 제6권10호
    • /
    • pp.2740-2751
    • /
    • 1999
  • Critical to more widespread use of Internet telephony are the smooth interoperability with the existing telephone network and the improved quality of voice connections. Of these requirements, this interoperability comes through the use of Internet Telephony Gateway's which perform protocol translation between an IP network and the Public Switched Telephone Network. In this paper, we have focused on the necessity and possibility of interoperability, and furthermore derives the necessary requirements for interoperability between IP networks and PSTN. For this purpose, we have analyzed the signaling protocols for gateway system. Then, we have modelled the inter-working part using the Petri-Net model. Through reachability trees of the Petri-Net model, we have confirmed that interoperability is possible, and that characteristics of deadlock, liveness, and boundness are satisfied.

  • PDF

Li100A Study on the Usability of WAP Interface in the Philippines

  • Chong, Jazmin N.;Ponio V, Amelia S.
    • Industrial Engineering and Management Systems
    • /
    • 제7권1호
    • /
    • pp.66-77
    • /
    • 2008
  • The existence of Internet revolutionized the computer and communications world. With the rising demand for accessing the Internet, the mobile technology has incorporated the use of Internet in mobile phones. Wireless Application Protocol (WAP) has combined two of the widest utilized technology today: mobile phones and Internet. This study aims to assess the existing WAP pages offered by the top service providers in the Philippines through usability testing experiments. The paper also aims to identify existing problems in WAP interface by focusing on the errors committed by the users. From the usability study, it was found out that common usability problems are wrong selection of links, unclear grouping of categories, wrong feedback, and redundant links. The type of service provider used is significant in determining the performance of users while experience in accessing WAP is insignificant.

산업용 유도전동기의 네트워크 운전을 위한 인터넷과 CAN을 이용한 원격분산 Embedded System 설계 (Design of a Remote Distributed Embedded System Using Internet and CAN for multi-induction motor of Building and Industrial fields)

  • 홍원표;김중곤
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2006년도 춘계학술대회 논문집
    • /
    • pp.302-308
    • /
    • 2006
  • We introduce the concept of a remote distributed embedded system to integrated fieldbus based control systems in internet/Intranet. As a result fieldbus systems are opened up for remote monitoring, remote maintenance, and remote control applications using state of the art Web-technology. This paper addresses the design of a remote distributed embedded system using Internet and CAN for multi-Induction motor of Building and Industrial field. The fieldbus used the CAN based networked intelligent multi-motor control system using DSP2812 microprocessor. To build such a system, the TCP/IP-CAN Gateway which convert a CAN protocol to TCP/IP protocol and vice verse, was designed. A experimental simulation system consists of a TCP/IP-CAN Gateway in remote place and a command PC ti be connected ti Ethernet.

  • PDF

Design and Implementation of Internal-based Teleopeartion Control System

  • Park, Jin-Woo;Lee, Jang-Myung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.82.2-82
    • /
    • 2001
  • In this paper, when we design and implement an internet-based teleoperation control, some important points that should be considered (e.g., transmission characteristics, time delay prediction and transmission protocol are inspected and simulated. First, we will investigate data transmission characteristics at the Internet, and build a model for the transmission delay and packet loss through the characteristics of that effect. And then, we inspect how to predict transmission delay, and examine transmission protocols which are proper for the control-oriented Internet protocol. Finally, we apply it to a force-reflective teleoperation control system that consists of a six d.o.f haptic interface and a five d.o.f manipulator via the Internet.

  • PDF

사물 인터넷망을 위한 RFID 보안 프레임워크와 프로토콜 분석 (Analyses of RFID Security Framework and Protocol Supporting Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.373-374
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces amd surveyed the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

DWDM 기반의 차세대 광 인터넷 구조에 관한 연구 (A Study on Network Architecture for Next Generation Optical Internet based DWDM)

  • 배정현;송현수;이재동;김성운
    • 한국멀티미디어학회논문지
    • /
    • 제6권3호
    • /
    • pp.496-507
    • /
    • 2003
  • 인터넷 트래픽 양의 급격한 증가는 우수한 네트워킹 기술을 가지는 IP 프로토콜을 요구한다. 그러므로, 인터넷은 다양한 새로운 어플리케이션에 필수적으로 요구되는 QoS를 위해 최선형 서비스에서 차등화 서비스 프레임워크로 전개되고 있다. 또한 QoS 기반의 높은 대역폭의 인터넷 요구는, 몇 년 내에 DWDM기반의 광 인터넷으로 전송망이 재편되리라 예상된다. 본 논문에서는 차세대 인터넷을 위한 DWDM광 인터넷 망에 대한 QoS 제공 측면, 제어 프로토콜 측면, 백본망 구조 측면 및 교환기술 측면에 대해 효과적인 구현 방안을 제시한다.

  • PDF

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.