• Title/Summary/Keyword: MAP protocol

Search Result 147, Processing Time 0.024 seconds

Development of Fuzzy Network Performance Manager for Token Bus Networks in Automated Factories (공장자동화용 토큰버스 네트워크의 퍼지 성능관리기 개발)

  • Lee, Sang-Ho;Son, Joon-Woo;Lee, Suk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.8
    • /
    • pp.2436-2448
    • /
    • 1996
  • This paper presents the development of three types of network performance manager for IEEE 802.4 token bus networks that are a part of Manufacturing Automation Protocol(MAP). The performance managers attempt to keep the average data latency below a certain level specified for each priority class. All of the three performance managers are based on a set of fuzzy rules incorporating the knowledge on the relationship between data latency and parameters of the priority mechanism. These Fuzzy Network Performance Managers(FNPMs) have been evaluated via discrete event simulation to demonstrate their efficacy.

A Ring-Based Multiprocessor System using a New Snooping Protocol (새로운 스누핑 프로토콜을 사용한 링 구조의 다중 프로세서 시스템)

  • Jeong, Seong-U;Kim, Hyeong-Ho;Jang, Seong-Tae;Jeon, Ju-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.3
    • /
    • pp.313-323
    • /
    • 1999
  • 현재 컴퓨터 시장에서는 버스에 기반한 시스템이 주류를 이루고 있다. 프로세서의 속도가 매우 빠른 속도로 증가하고 있기 때문에 버스는 병목현상을 일으키고 , 버스의 속도는 불완전한 전송선의 한계로 인해서 제한된다. 시스템 연구자들은 버스를 고속의 단방향 지점간 링크(point-to-point link)를 사용해서 대체하려고 하고 있다. 이 논문에서 새로운 링 구조의 시스템(PANDA)을 제안하고,이 시스템에 적합한 스누핑 캐쉬 일관성 프로토콜을 제사한다. 또한 제안된 시스템은 SCI 캐쉬 일관성 프로토콜을 채택하는 시스템의 네트워크 인터페이스를 수정함으로써 쉽게 구현될 수 있는 이점을 지닌다. 확률적 모델링과 program-driven simulator를 이용하여 제안된 시스템과 full map 디렉토리 프로토콜을 사용하는 시스템과 스누핑 프로토콜을 사용하는 슬롯 링 시스템(Express Ring)을 분석하였다. 실험의 결과로 제안된 시스템은 부가적 하드웨어가 필요한 full map 디렉토리 시스템에 비해서 대등한 성능을 지니고 슬롯링 시스템에 비해서는 29%까지의 성능향상을 보인다.

Paging extensions for HMIPv6: P-HMIPv6 (페이징 서비스를 위한 HMIPv6의 확장: P-HMIPv6)

  • 이준섭
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.222-225
    • /
    • 2003
  • IP-based mobility management is a core technology in the next generation network environment. MIPv6 is introduced to support for mobility in global network, and HMIPv6 is being considered as a local mobility management protocol to reduce signaling overhead for mobility management in the global network. Also, the paging technology is introduced to IP-based network to reduce signaling overhead and power consumption for mobility management. In this paper, we propose P-HMIPv6 which enables IP paging service in HMIPv6 to reduce signaling overhead for local mobility management in MAP domain of HMIPv6.

  • PDF

Construction of genetic linkage maps of Allium cepa using genotyping-by-sequencing

  • Lee, Daewoong;Chung, Yong Suk;Kim, Changsoo;Jun, Tae-Hwan
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.117-117
    • /
    • 2017
  • The onion (Allium cepa L.) is the most widely cultivated species of the genus Allium, especially it has been valued because of the pungent flavor and aroma. Allium species including onion has very large genome sizes ranging from approximately 10 to 20 Gbp, which have complicated genomic studies and precluded genome sequencing until recently. A population of 186 F2 individuals derived from a cross of 'Umjinara' ${\times}$ 'Sinsunhwang' and the two parental lines were used for this study. For the development of framework map, various types of markers including SSRs, RAPD, SNPs, and CAPS makers have been used for polymorphism test. Especially, a lot of SNP and CAPS loci were developed from the onion transcriptome sequence by RNASEQ of two parental lines. The GBS libraries have been constructed based on a modified protocol from Poland Lab using a two-enzyme system. We have been developing markers showing polymorphism between two parental lines, and genotyping for all F2 individuals were finished for a number of polymorphic markers. For the construction of GBS libraries, a set of 192 barcoded adapters were generated from complementary oligonucleotides with XhoI overhang sequence and unique barcodes of length 4-8 bp and they have been tested using two parental linesto determine the optimum conditions for GBS analysis.

  • PDF

Design and Performance Analysis of Security Network Management Architecture for Auto-managing Security Systems (보안 시스템의 자동 관리를 위한 보안 네트워크 관리 구조의 설계 및 성능 분석)

  • Ahn Gae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.525-534
    • /
    • 2005
  • This paper proposes the architecture and the methods of security network management for auto-configuration of security systems by extending the existing policy-based network management architecture. The architecture and the methods proposed in this paper enable a security management sewer to automatically decide the best-suited security policy to apply to a security system and the most effective and efficient security system to perform security policy rule, based on the role and capability information of security systems and the role and time information of security policy. For integrated control of network system and security system, this paper also proposes SNMP protocol based security network topology map generator. To show the excellence of the proposed architecture and methods, we simulate and evaluate the automatic response against attacks.

Performance Improvement of the HMIPv6 Macro Handover using the Address Insurance with Selective Buffering (주소보장과 선택적 버퍼링을 이용한 HMIPv6의 매크로 핸드오버에 대한성능 개선)

  • Ahn, Chi-Hyun;Woo, Jong-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.556-563
    • /
    • 2009
  • HMIP, an extending version of MIP, makes the signaling traffic low, thereby reducing the packet losses and delay. However, it still has the same problem in MIPv6 in the case of macro mobility, though it can reduce the out-signaling in the case of a micro mobility, a regional mobility with the MAP protocol. To overcome this problem, this paper proposes a handover which exploits an address insurance with selective buffering for the HMIP macro handover. This scheme can decrease the lost packets and the delay time and provide better performance for high QoS traffic and real-time multimedia transmission. The simulation result shows that the proposed scheme makes the transmission delay time and the lost packets smaller than the existing schemes.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

TPEG Application as a Protocol of Traffic Information for DMB in Korea (TPEG의 국내 DMB 교통정보 전송형식 적용 가능성 연구)

  • Hyun Cheol-Seung;Han Won-Sub;Kim Dong-Hyo;Hong You-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.128-134
    • /
    • 2006
  • Traffic information protocol in DMB is very different from existing analog broadcasting and wireless communication network. In this paper, we examined whether traffic information protocol of Europe Broadcasting Union(TPEG) is applicable to domestic DMB. Also, we proposed a division of classification on kinds of franc information, and related data that it is required to transmit traffic information of TPEG form. We composed of experiment equipment and studied whether is expressed traffic informations as like accident, event, traffic condition and CCTV image on car navigation system. The results obtained it can be given expression to phrases from TPEG streaming data and to link with electronics map by decoding TPEG straming data. Also it can be expressed CCTV and graphic image which is composed of TPEG form.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

Mobility Management Scheme for the Wireless Mesh Network using Mobility Anchor Point (MAP를 적용한 무선 매쉬 네트워크에서의 이동성 관리방법)

  • Jang, Sung-Hwan;Cho, Kyu-Seob
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.101-110
    • /
    • 2011
  • WMN is highlighted as a next generation network technology due to relatively reasonable cost to be built, compared with the pre-existing wireless network. It also enables same kind of network or even other kind of network to be integrated. Some WMN researches support mobility using router protocol such as AODV and DSR because WMN has the similar features with Ad-hoc network in terms of operation. However, WMN has got different operations with additional functions of multi-interface and internet connect, it can't be a good method to manage efficient mobility any more. This study suggests method to apply MAP function of HMIPv6 to WMN as a way to manage WMN mobility. Through simulation, operation was verified and function was appreciated. Through the results of evaluation, the suggest mobility management had shorter handover delay and packet loss reduced, which improved whole network throughput rate, compared with mobility management using AODV.