• Title/Summary/Keyword: Load control protocol

Search Result 150, Processing Time 0.027 seconds

Development and Experimental Evaluation of the Wireless Illumination Controller with Demand Response for the Smart Grid (스마트 그리드를 위한 무선 기반의 수요 반응 기능을 가지는 조명 제어용 장치 개발 및 실험적 평가)

  • Choi, In-Ho;Lee, Joung-Han;Hong, Seung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.6
    • /
    • pp.1215-1224
    • /
    • 2011
  • Recently, a lot of research for the smart grid technology have been carried out to achieve energy efficiency for the electronic products. In order to practically apply this study, smart instruments which are capable of the AMI (Advanced Metering Infrastructure) and DR (Demand Response) function are necessary. However, it is difficult to apply the function of the smart grid to the electronic product that cannot support the smart grid. Accordingly, the efficient use of electric energy is impossible. In order to solve this problem, the electronic product has to be changed into the exclusive electronic product supporting smart grid technology or the smart controller has to be attached the outside of the device. In this study, we developed the smart controller for connecting the electric appliances to the smart grid system. It can be attached to the illumination and the smart grid-based lamp control system at home. We additionally designed the message frame and the protocol to operate the smart controller with the AMI based EMS (Energy Management Server). We developed an experimental system to practically verify functions of the smart controller which is attached to the lighting device. From the system, we showed that the electric source of the illumination can be controlled according to the load change and saved energy effectively. We also confirmed the structural benefit and the energy-efficient effect through the verification of the smart controller.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Tier-based Proactive Path Selection Mode for Wireless Mesh Networks

  • Fu-Quan, Zhang;Joe, In-Whee;Park, Yong-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1303-1315
    • /
    • 2012
  • In the draft of the IEEE 802.11s standard, a tree topology is established by the proactive tree-building mode of the Hybrid Wireless Mesh Protocol (HWMP). It is used for cases in which the root station (e.g., gateway) is an end point of the majority of the data connections. In the tree topology, the root or central stations (e.g., parent stations) are connected to the other stations (e.g., leaves) that are one level lower than the central station. Such mesh stations are likely to suffer heavily from contention in bottleneck links when the network has a high traffic load. Moreover, the dependence of the network on such stations is a point of vulnerability. A failure of the central station (e.g., a crash or simply going into sleep mode to save energy) can cripple the whole network in the tree topology. This causes performance degradation for end-to-end transmissions. In a connected mesh topology where the stations having two or more radio links between them are connected in such a way that if a failure subsists in any of the links, the other link could provide the redundancy to the network. We propose a scheme to utilize this characteristic by organizing the network into concentric tiers around the root mesh station. The tier structure facilitates path recovery and congestion control. The resulting mode is referred to as Tier-based Proactive Path Selection Mode (TPPSM). The performance of TPPSM is compared with the proactive tree mode of HWMP. Simulation results show that TPPSM has better performance.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

A Multi-Dimensional Node Pairing Scheme for NOMA in Underwater Acoustic Sensor Networks (수중 음향 센서 네트워크에서 비직교 다중 접속을 위한 다차원 노드 페어링 기법)

  • Cheon, Jinyong;Cho, Ho-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.1-10
    • /
    • 2021
  • The interest in underwater acoustic sensor networks (UWASNs), along with the rapid development of underwater industries, has increased. To operate UWASNs efficiently, it is important to adopt well-designed medium access control (MAC) protocols that prevent collisions and allow the sharing of resources between nodes efficiently. On the other hand, underwater channels suffer from a narrow bandwidth, long propagation delay, and low data rate, so existing terrestrial node pairing schemes for non orthogonal multiple access (NOMA) cannot be applied directly to underwater environments. Therefore, a multi-dimensional node pairing scheme is proposed to consider the unique underwater channel in UWASNs. Conventional NOMA schemes have considered the channel quality only in node pairing. Unlike previous schemes, the proposed scheme considers the channel gain and many other features, such as node fairness, traffic load, and the age of data packets to find the best node-pair. In addition, the sender employs a list of candidates for node-pairs rather than path loss to reduce the computational complexity. The simulation results showed that the proposed scheme outperforms the conventional scheme by considering the fairness factor with 23.8% increases in throughput, 28% decreases in latency, and 5.7% improvements in fairness at best.

Ergonomic Evaluation of Refrigerator Design (냉장고 디자인의 인간공학적 평가)

  • 박재희;황민철;박세진;김명석
    • Archives of design research
    • /
    • v.14
    • /
    • pp.1-7
    • /
    • 1996
  • Designers often hesitate to decide the shape, size, and layout of a product. Though ergonomic principles and data are absolutely needed in this process, they don have enough guidelines to refer. For the refrigerator designers, they also are not convinced of their decision: the vertical position of the freezing and refrigerating rooms, the height of shelves, the shape of door-handle, etc. To support the refrigerator design, we applied several ergonomic methods to the evaluation of refrigerator. EMG was measured to evaluate the load of users lumbar muscle. Based upon the experimental EMG data, we developed a model to estimate the relative load corresponding to the height of refrigerator shelves. Two different layouts of a refrigerator, R/F and F/R styles, were compared with the model. A three-dimensional motion analysis method was used to evaluate the users motion of using a refrigerator. Ten door-handles with the different shapes and positions were evaluated by tracking the rotations of the users arm. Video protocol analysis was used to evaluate the user interface of a control panel in a refrigerator. Finally, we suggested several ergonomic design guidelines based on the facts found in this research and the anthropometric data of the Korean adults. The results of this study can be applied to the ergonomic design of refrigerators

  • PDF

Design and Implementation of collaborative system for mobile devices (모바일 기기를 위한 협동작업 시스템의 구현)

  • 이은령;김지용;김두현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.512-521
    • /
    • 2003
  • In this paper, we introduce our experience of the design and implementation of mobile collaboration system(MCS) that support people using mobile devices to participate in cooperative session. There are considerable differences between desktop PC and mobile devices like PDA in processing ability, resolution of display and color degree. In the case of mobile devices, they use different processors and different operating system and they have even differences in ability of executing application. The mobile collaborative system based on T.120 protocol of ITU-T standard compromised of mobile collaboration server, mobile collaboration client, session node and application. We also define the session node in desktop PC in which session control block and communication block runs. This node provide functions of session control block and communication block to mobile collaboration clients and so lighten load of clients. The mobile collaboration server provides information of candidates for session node, session and user to mobile collaboration client. And this server support clients to configure their own session node and manage sessions. Only the mobile collaboration client module and applications including APE are executed in a mobile device when user using mobile devices would like to participate in cooperative session. We implemented mobile collaboration client and applications with JAVA to support platform independency.

One-stop Evaluation Protocol of Ischemic Heart Disease: Myocardial Fusion PET Study (허혈성 심장 질환의 One-stop Evaluation Protocol: Myocardial Fusion PET Study)

  • Kim, Kyong-Mok;Lee, Byung-Wook;Lee, Dong-Wook;Kim, Jeong-Su;Jang, Yeong-Do;Bang, Chan-Seok;Baek, Jong-Hun;Lee, In-Su
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.33-37
    • /
    • 2010
  • Purpose: In the early stage of using PET/CT, it was used to damper revision but recently shows that CT with MDCT is commonly used and works well for an anatomical diagnosis. This hospital makes the accuracy and convenience more higher in the diagnosis and evaluate of coronary heart disease through concurrently running myocardial perfusion SPECT examination, myocardial PET examination with FDG, and CT coronary artery CT angiography(coronary CTA) used PET/CT with 64-slice. This report shows protocol and image based on results from about 400 coronary heart disease examinations since having 64 channels PET/CT in July 2007. Materials and Methods: An Equipment for this examination is 64-slice CT and Discovery VCT (DVCT) that is consisted of PET with BGO ($Bi_4Ge_3O_{12}$) scintillation crystal by GE health care. First myocardial perfusion SPECT with pharmacologic stress test to reduce waiting time of a patient and get a quick diagnosis and evaluation, and right after it, myocardial FDG PET examination and coronary CTA run without a break. One-stop evaluation protocol of ischemic heart disease is as follows. 1)Myocardial perfusion SPECT with pharmacologic stress: A patient is injected with $^{99m}Tc$-MIBI 10 mCi and does not have any fatty food for myocardial PET examination and drink natural water with ursodeoxcholic acid 100 mg and we get SPECT image in an hour. 2)Myocardial FDG PET: To reduce blood fatty content and to increase uptake of FDG, we used creative oral glucose load using insulin and Acipimox to according to blood acid content. A patient is injected with $^{18}F$-FDG 5 mCi for reduction of his radiation exposure and we get a gated image an hour later and get delay image when we need. 3) Coronary CTA: The most important point is to control heart rate and to get cooperation of patient's breath. In order to reduce a heart rate of him or her below 65 beats, let him or her take beta blocker 50 mg ~ 200 mg after a consultation with a doctor about it and have breath-practices then have the examination. Right before the examination, we spray isosorbide dinitrate 3 to 5 times to lower tension of bessel wall and to extension a blood wall of a patient. It makes to get better the shape of an anatomy. At filming, a patient is injected CT contrast with high pressure and have enough practices before the examination in order to have no problem. For reduction of his radiation exposure, we have to do ECG-triggered X-ray tube modulation exposure. Results: We evaluate coronary artery stenosis through coronary CTA and study correlation (culprit vessel check) of a decline between stenosis and perfusion from the myocardial perfusion SPECT with pharmacologic stress, coronary CTA, and can check viability of infarction or hibernating myocardium by FDG PET. Conclusion: The examination makes us to set up a direction of remedy (drug treatment, PCI, CABG) because we can estimate of effect from remedy, lesion site and severity. In addition, we have an advantage that it takes just 3 hours and one-stop in that all of process of examinations run in succession and at the same time. Therefore it shows that the method is useful in one stop evaluation of ischemic heart disease.

  • PDF

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.