• Title/Summary/Keyword: MAP protocol

Search Result 147, Processing Time 0.025 seconds

Performance evaluation of BWA protocol according to uplink frame size and contention slot (상향링크의 프레임 크기와 경쟁슬롯에 따른 BWA 프로토콜의 성능평가)

  • Oh Sung-Min;Kim Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.967-973
    • /
    • 2004
  • DOCSIS and IEEE 802.16 define the usage and element of a MAP which is uplink control message. Standards does not include the details of MAP size and the number of contention slots affecting the performance of MAC protocols for DOCSIS and IEEE 802.16. In this paper, we analyzed the performance of throughput and access delay according to the MAP size and contention slot size. Based on the analytical results, we found the optimal MAP size and the number of contention slots. We found that the protocol shows best performance when the MAP size is 2msec and the number of contention slots is 8. The simulation results can apply to the network system parameters. The simulator can be used to optimize the system parameters in cable network, BWA and WiBro.

Use of FMIPv6 and Selective handover mechanisms based on hierarchical MAP information (FMIPv6 사용과 계충적인 MAP 정보 기반의 선택적인 핸드오버 매커니즘)

  • Kim, Jae-Seung;Kim, Dong-Il;Lee, Hong-Gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.87-90
    • /
    • 2007
  • Many moderncommunication technologies are developing based on internet protocol (IP) and there is many work to archive seamless mobility service. IETF proposed MIPv6 protocol that uses IPv6 to provide mobility services to mobile node however it has some limits like sending and receiving too many messages during binding update (BU) procedure. So, now a day it makes HMIPv6(Hierarchical Mobile IPv6). HMIPv6 solves overhead and transmission delay problem in MAP(Mobile Anchor Pointer), but it can't accomplish effectively Macro handover between MAPs. This paper introduces use of FMIPv6 and Selective handover mechanisms based on hierarchical MAP information in HMIPv6 for improvement of handover efficiency.

  • PDF

The implementation of token passing bus protocol for MAP application (MAP 적용을 위한 토큰 패싱 버스 프로토콜의 구현)

  • 이창원;이강익;신기명;김용득
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.741-744
    • /
    • 1990
  • This paper deals with the implementation of the IEEE 802.4 token passing bus protocol which is the world standard for LAN protocol. We are design station adaptor using MC68824 for data link layer, MC68194 for physical layer, and implemented by IEEE 802.4 and 802.2 type 3. We made three station adaptor and its performance is experimented.

  • PDF

A study on the implementation of MAP network interface for PC (PC를 위한 MAP 망 접속기 구현에 관한 연구)

  • 임용제;김덕우;정범진;추영열;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.390-395
    • /
    • 1988
  • The implementation of MAP(Manufacturing Automation Protocol) NIU(network interface uint) is studied and presented in this paper. Hardwares and system softwares for network management, user interface, and medium access control are developed. Also LLC(Logical Link Control) protocol is implemented. Afterwards, The operations of NIU using self-test functions are tested. Compatibility between interfaces according to IEEE 802.4 standard is also tested.

  • PDF

Authentication Mechanism for Secure Binding Update and Fast Handover in the Generalized Hierarchical MIPv6 (일반화된 계층적 MIPv6 환경에서의 안전한 바인딩 업데이트 및 Fast Handover를 위한 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.107-115
    • /
    • 2008
  • In this paper, a secure and efficient binding update protocol as well as a handover protocol are proposed in the generalized hierarchical MIPv6 environment. Contrary to the conventional hierarchical MIPv6 environment where a foreign network is a small-scaled MAP domain, a large-scaled MAP domain consisting of several MAPs which are connected hierarchically is considered in the proposed protocol for the mechanism to support fast and secure mobility. It is also analyzed the security of the proposed protocol under the various attack scenarios.

Mobile Underground High-capacity 3D Spatial Information Tiling Transfer Protocol Development (모바일 지하 대용량 3D 공간정보 타일링 전송 프로토콜 개발)

  • Lee, Tae Hyung;Jo, Won Je;Kim, Hyun Woo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.491-496
    • /
    • 2021
  • In line with the modern era in which the safety of underground facilities and the use of underground information are increasingly emphasized, the state is pushing for more precise and accurate underground spatial information to be secured and utilized. Therefore, we need to pay more attention to subsurface geospatial data. In the future, the Ministry of Land, Infrastructure and Transport will actively utilize the 15 types of Integrated Underground Geospatial Information Map(6 types of underground facilities, 6 types of underground structures, 3 types of ground) that the Ministry of Land, Infrastructure and Transport is building as three-dimensional underground spatial information, and contribute greatly to improving national safety and convenience in underground construction. expected to do However, when a site manager requests an Integrated Underground Geospatial Information Map with a mobile device, if the large-capacity integrated underground space map is not quickly transmitted over the wireless section and is not serviced, it causes inconvenience to the site manager and delays work. In this paper, the goal of this paper is to enable field managers to quickly receive a tiled Integrated Underground Geospatial Information Map with minimal information exchange. Therefore, the tiling system is configured according to the dataset for high-speed Mobile Integrated Underground Geospatial Information Map transmission. In addition, a transmission system for the Mobile Integrated Underground Geospatial Information Map is established, and a TCP/IP (Transmission Control Protocol/Internet Protocol)-based spatial information tiling transmission protocol dedicated to the on-site Integrated Underground Geospatial Information Map is developed.

A Study on the Implemention of a Mini-MAP Network Interface Module for CIM (CIM을 위한 Mini-MAP 네트워크 접속장치의 구현에 관한 연구)

  • 김현기;이전우;하정현;정하재;채영도
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.10
    • /
    • pp.59-68
    • /
    • 1993
  • This paper describes implemation of 'General-purpose ETRI MAP interface module' (GEM) for Mini-MAP network. GEM operates as a Mini-MAP node in our FA system. To communicate between GEM and programmable devices(PD) such as PLC and CNC, serial communication is used. Application programs of a MiNi-MAP host system control and monitor programmable devices via GEM. GEM is implemented and tested on the basis of the MAP 3.0. TBC in the Nini-MAP board performs the function of the MAC sublayer. The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation class MAP3. All the softwares are implemented under the real-time multitask OS for real-time application of the Mini-MAP and they are loaded into PROMs at the network board of GEM. We tested the LLC functions to make use of a protocol analyzer for the token-passing protocol. Also the MMS conformance test was carried out by exchanging primitives between GEM and a MMS product that had already passed the conformance test. Therefore GEM is proposed as a network tool of Computer Integrated Manufacturing (CIM) to integrate PDs which don't support MAP functions.

  • PDF

A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol (다중 컨텍스트 RFID 상호 인증 프로토콜의 보안 취약점 분석)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kim, Soo-Yong;Yun, Tae-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.71-80
    • /
    • 2013
  • In this paper, we analyze the security vulnerability through the several attack scenarios for the MCR-MAP(Multi-Context RFID Mutual Authentication Protocol) proposed by Ahn et al. And we propose the secure mutual authentication protocol that improved a prior MCR-MAP. The suggested protocol uses the ID of the legal tag and the timestamp generated by the server, when the tag tries to authenticate. And when the tag creates the credential, we create the new secret key computing the XOR operation between the secret key shared with the server and the tag timestamp generated by the server. As a result, the proposed protocol provides the secure mutual authentication and then is safe to spoofing attack. Also it provides forward-secrecy and then is safe to offline brute-burst attack. In this paper, we compare and verify the security vulnerability of the prior and the proposed protocol through the security analysis.

Implementation and analysis of the LLC class3 protocol (LLC class 3 프로토콜의 구현 및 분석)

  • 김경신;이준호;강문식;박민용;이상배
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.352-354
    • /
    • 1991
  • MAP is a standard communication protocol for manufactoring automation. In this paper we implemented IEEE 802.2 LLC class 3 protocol, which consist of type l(unacknowledged connecionless data transfer) mode and type 3 (acknowledged connectionless data transfer) mode. This implemented protocol is verified by the test.

  • PDF

Implementation of the LLC Class 3 Protocol for Mini-MAP Network (Mini-Map 네트워크의 LLC Class 3 프로토콜 구현)

  • 강문식;이길흥;안기중;박민용;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.10
    • /
    • pp.782-790
    • /
    • 1991
  • In this paper, we implement the function of the IEEE802.2LLC(logical link control) sublayer one of the 7layers in MAP(manufacturing automation protocol), a standard communication protocol for manufacturing automation. With the assembly language we designed the class 3 function based on the IEEE standards and verified on the network adaptor hardware. In this experiment, we tested the function using the simplified variables considering that the retransmission value was chosen to be 1 and the life-time of the transmission variable infinite. According to the result of the service procedures, we confirmed that user data were transmitted to the corresponding station without any error.

  • PDF