• Title/Summary/Keyword: air protocol

Search Result 232, Processing Time 0.023 seconds

Design of RFID Air Protocol Filtering and Probabilistic Simulation of Identification Procedure (RFID 무선 프로토콜 필터링의 설계와 확률적 인식 과정 시뮬레이션)

  • Park, Hyun-Sung;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6B
    • /
    • pp.585-594
    • /
    • 2009
  • Efficient filtering is an important factor in RFID system performance. Because of huge volume of tag data in future ubiquitous environment, if RFID readers transmit tag data without filtering to upper-layer applications, which results in a significant system performance degradation. In this paper, we provide an efficient filtering technique which operates on RFID air protocol. RFID air protocol filtering between tags and a reader has some advantages over filtering in readers and middleware, because air protocol filtering reduces the volume of filtering work before readers and middleware start filtering. Exploiting the air protocol filtering advantage, we introduce a geometrical algorithm for generating air protocol filters and verify their performance through simulation with analytical time models. Results of dense RFID reader environment show that air protocol filtering algorithms reduce almost a half of the total filtering time when compared to the results of linear search.

Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification (RFID의 프로토콜 및 인터페이스 파라미터)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

Eye-Tracking and Protocol Analyses of Expert and Novice Situation Awareness in Air Traffic Control (항공관제 상황인식에서 전문가와 초보자의 시선추적 및 프로토콜 분석)

  • Hyun, Suk-Hoon;Lee, Kyung-Soo;Kim, Kyeong-Tae;Sohn, Young-Woo
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.17-24
    • /
    • 2007
  • Analyses of eye tracking and think-aloud protocol data were performed to examine novice-expert differences in perceptual and cognitive aspects of air traffic controllers' situation awareness. In Experiment 1, three groups of field air traffic controllers (experts, intermediates, novices) were asked to perceive situations that were manipulated by situation complexity. In Experiment 2, protocol analysis for previous situation awareness tasks was performed to extract different task models and strategy models as a function of expertise. Then delayed-recall task and interviews about air control plans for the recalled situations were also executed. Results showed that expert controllers concentrate only on several critical features and have their own strategies to reduce mental workloads.

Investigation of CDMA Air Interface and Protocols

  • Kim, Sun-Young;Song, Pyeong-Jung;Kim, Jin-Up;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.303-315
    • /
    • 1997
  • This appendix deals with the Korean air interface standard, TTA-62, for CDMA Mobile Systems, (CMS) [1]-[2]. The standard has been set up by Telecommunications Technology Association (TTA) which is a standardization organization in Korea [3]. This standard is an important specification that should be determined prior to the development of a digital cellular system. The CMS has been developed on the basis of this standard and the papers published in this special issue are the results of the CMS development. This appendix also describes the technical commonality of these papers. It covers the outline of the air interface and protocol specifications. The outline includes its major characteristics, radio protocol architecture, functionalties, and call processing. A comparison is also given between TTA-62 and IS-95[4], a North American digital cellular standard.

  • PDF

Implementation of An Efficient Reader Protocol for Active RFID Readers (능동형 RFID 리더를 위한 효율적인 리더 프로토콜의 구현)

  • Moon, Young-Sik;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.822-829
    • /
    • 2009
  • A reader protocol is an interface between a host and RFID readers. There are several standards for reader protocol such as EPCglobal Low Level Reader Protocol (LLRP) 1.0.1, EPCglobal Reader Protocol (RP) 1.1, and ISO/IEC 15961/15962. Unfortunately, these standards focus on the passive RFID system, and so they are not appropriate for the active RFID system. In this paper, we implemented an efficient reader protocol for the active RFID system, which is based on EPCglobal LLRP 1.0.1, but smoothing/filtering functions of EPCglobal RP 1.1 are added. This protocol is designed to configure air interface parameters for active RFID readers and tags. It can reduce the amount of data transfer between the reader and host by filtering function, and can improve the performance of tag collection by smoothing function. In addition, it can remove inefficiency caused by tag memory data change according to the standards of ISO/IEC 15961/15962. In the real-world environment, we evaluated the performance of our implemented reader protocol using one RFID reader and 45 tags.

A Key Distribution Protocol based on ECC (ECC를 이용한 키분배 프로토콜)

  • Lee, Jun;Kim, In-Taek
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.142-147
    • /
    • 2007
  • In this paper we suggest a key distribution protocol based on ECC. This could be apply to multi connection to a sensitive system on a computer network. SSL based on RSA is generally used as a key distribution protocol. By reducing two times encryption/decryption procedures to one time and using ECC algorithm this protocol is faster than SSL. Analyzing the key distribution time on a normal PC experiment, we show that this could be practically used in real world without a hardware implementation.

A study on BEMS-linked Indoor Air Quality Monitoring Server using Industrial IoT

  • Park, Taejoon;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.65-69
    • /
    • 2018
  • In this paper, we propose an interworking architecture for building indoor air quality monitoring server (BEMS) using IIoT (Industrial Internet of Things). The proposed monitoring server adopts IIoT-based standard protocol so that interaction with BEMS installed in existing buildings can be performed easily. It can effectively communicate with indoor air quality measurement sensor installed in the building based on IIoT, Indoor air quality monitoring is possible. We implemented a proposed monitoring server, and confirmed the availability and monitoring of data from sensors in the building.