• Title/Summary/Keyword: Packet Communication System

Search Result 535, Processing Time 0.023 seconds

A Study on the Performance of Home Embedded System Using a Wireless Mesh Network (무선 메쉬 네트워크를 이용한 홈 임베디드 시스템의 성능에 대한 연구)

  • Roh, Jae-Sung;Ye, Hwi-Jin
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.323-328
    • /
    • 2007
  • Communication systems beyond 3G should provide more than 100 Mbps for wireless access. In addition to smart antennas, wireless multi-hop networks are proposed to increase the cell size and throughput. For example, Zigbee technology is expected to provide low cost and low power connectivity and can be implemented in wireless mesh networks larger than is possible with Bluetooth. Also, home embedded system using wireless mesh network is one of the key market areas for Zigbee applications. If the line-of-sight path is shadowed by home obstacles, a direct connection between the access point (AP) and the node is not possible at high frequencies. Therefore, by using multi-hop relay scheme the end node can be reached to AP. In this paper, the relaying of data between the AP and the end node is investigated and the throughput and PER(Packet Error Rate) are evaluated in multi-hop wireless mesh networks by using DSSS/BPSK system.

  • PDF

The Design of Remote Control System using Bluetooth Wireless Technology (블루투스 무선기술을 응용한 원격제어 시스템의 설계)

  • 전형준;이창희
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.547-552
    • /
    • 2003
  • In this thesis, interference phenomena of bluetooth networks requiring Security were minimized; strengthened security of piconet by assigning an identical PIN code to bluetooth devices, which was establishing a specific piconet during authentication stage. To establish a bluetooth piconet system. an unique ID was assigned to each bluetooth device, communication algorithms having different data formats between devices was designed, and an embedded hardware module using ARM processor and uCOS-II RTOS was implemented. About 30% of CPU efficiency in the module was increased by modifying functions including block parameters to work as nonblocking; by the increased efficiency of total piconet, the module could be used as an access point. The module could transmit maximum 10 frames of image and also audio signal by switching the packet effectively according to channel condition. By above-mentioned process, video, audio, and data could be well transmitted by the bluetooth managing program and the possibility of a commercial remote control system using bluetooth technology was suggested.

  • PDF

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

Deadline-Aware Routing: Quality of Service Enhancement in Cyber-Physical Systems (사이버물리시스템 서비스 품질 향상을 위한 데드라인 인지 라우팅)

  • Son, Sunghwa;Jang, Byeong-Hoon;Park, Kyung-Joon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.9
    • /
    • pp.227-234
    • /
    • 2018
  • Guaranteeing the end-to-end delay deadline is an important issue for quality of service (QoS) of delay sensitive systems, such as real-time system, networked control system (NCS), and cyber-physical system (CPS). Most routing algorithms typically use the mean end-to-end delay as a performance metric and select a routing path that minimizes it to improve average performance. However, minimum mean delay is an insufficient routing metric to reflect the characteristics of the unpredictable wireless channel condition because it only represents average value. In this paper, we proposes a deadline-aware routing algorithm that maximizes the probability of packet arrival within a pre-specified deadline for CPS by considering the delay distribution rather than the mean delay. The proposed routing algorithm constructs the end-to-end delay distribution in a given network topology under the assumption of the single hop delay follows an exponential distribution. The simulation results show that the proposed routing algorithm can enhance QoS and improve networked control performance in CPS by providing a routing path which maximizes the probability of meeting the deadline.

Performance Analysis of Call Admission Control Scheme with Bandwidth Borrowing and Bandwidth Reservation in GEO based Integrated Satellite Network (GEO 기반 위성 네트워크에서의 대역폭 빌림 방법과 대역폭 예약 방법을 이용한 호 수락 제어 성능 분석)

  • Hong, Tae-Cheol;Gang, Gun-Seok;An, Do-Seop;Lee, Ho-Jin
    • Journal of Satellite, Information and Communications
    • /
    • v.1 no.1
    • /
    • pp.12-19
    • /
    • 2006
  • In this paper, we propose the bandwidth borrowing scheme which improves the performance of the cal admission control of the integrated GEO satellite networks. In general, target transmission rates of communications and streaming services are fixed, but data services do not have the target transmission rates. Therefore, we can control the transmission rates for data services flexibly according to the system loading situation. When the available bandwidth of the system is insufficient, the bandwidth borrowing scheme gives the bandwidth to request real time services by the transmission rates control of data services through packet scheduler. We make the queueing model for our system model and demonstrate the results through simulations. The simulation results show that there is a 8.7-35.2 dB gain at the total blocking probability according to the use of bandwidth borrowing scheme.

  • PDF

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

Real-time EKF-based SOC estimation using an embedded board for Li-ion batteries (임베디드 보드를 사용한 EKF 기반 실시간 배터리 SOC 추정)

  • Lee, Hyuna;Hong, Seonri;Kang, Moses;Sin, Danbi;Beak, Jongbok
    • Journal of IKEEE
    • /
    • v.26 no.1
    • /
    • pp.10-18
    • /
    • 2022
  • Accurate SOC estimation is an important indicator of battery operation strategies, and many studies have been conducted. The simulation method which was mainly used in previous studies, is difficult to conduct real-time SOC estimation like real BMS environment. Therefore, this paper aims to implement a real-time battery SOC estimation embedded system and analyze problems that can arise during the verification process. In environment consisting of two Raspberry Pi boards, SOC estimation with the EKF uses data measured by the Simscape battery model. Considering that the operating characteristics of the battery vary depend on the temperature, the results were analyzed at various ambient temperatures. It was confirmed that accurate SOC estimation was performed even when offset fault and packet loss occurred due to communication or sensing problems. This paper proposes a guide for embedded system strategies that enable real-time SOC estimation with errors within 5%.

A Study on change from an RTU-based substation to IEC 6 1850-based SA substation (RTU 기반 변전소의 IEC 61850 기반 SA 변전소로의 전환에 대한 실증 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.436-444
    • /
    • 2018
  • Currently, the new substation automation uses the international standard IEC 61850 communication protocol. KEPCO is also constructing a new substation based on IEC 61850 from 2013 through the pilot application and research and development starting from 2007. However, there are few cases where existing substations(Transformer, T/L GIS, D/L GIS, etc.) have been used, and RTU based substations operating systems have been changed to SA substations based on IEC 61850. Therefore, the introduction of IEC 61850 in existing substation facilities has the advantage of enhancing the substantiality of the substation by reusing existing facilities, improving the interoperability with the latest substations introduced, and converting existing substations into systems suitable for unmanned operation. In this paper, we introduce a case of changing the existing RTU based substation operation system to digital substation using IEC 61850 field information processor, Ethernet switch and SA operation system. Also, IEC 61850 client authentication program and Wireshark, which is a packet analysis tool, verify IEC 61850 conformance and its feasibility.

Implementation and Performance Analysis for MX-S2X, Ship Centric Direct Communication based on High-frequency (고 주파수 기반 선박중심 직접통신(MX-S2X) 물리계층 구현 및 성능분석)

  • Hye-Jin, Kim;Hyung-Jick, Ryu;Jin-Yeong, Chang;Won-Yong, Kim;Bu-Young, Kim;Woo-Seong, Shim
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.570-575
    • /
    • 2022
  • The MX-S2X, utilizing high-frequency broadband communication technology, provides a reliable connection between land, ship, and facilities. This technology is expected to be effectively utilized as a future maritime communication infrastructure in the upcoming mixed navigational situation among autonomous and manned and/or unmanned ships. Following the physical layer design and M&S-based performance analysis of the MX-S2X system to overcome maritime multipath fading, this paper confirms the optimized and detailed design of physical layer hardware and implemented it to verify the performance. The PER(Packet Error Rate) performance was then measured by configuring a test environment to verify the implemented hardware. The results showed that the performance degradation was 0.2 dB in the AWGN environment and 1.2 dB in the Multi-path Fading on Sea Environment, thus confirming the successful implementation of the physical layer.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.