• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.03 seconds

Experimental Performance Evaluation of BACnet MS/TP Protocol

  • Park, Tae-Jin;Song, Won-Seok;Hong, Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.5
    • /
    • pp.584-593
    • /
    • 2007
  • BACnet is a standard data communication protocol especially designed for building automation and control networks. BACnet uses the Master-Slave/Token-Passing (MS/TP) protocol as one of its field-level networks. In this study, the performance of the BACnet MS/TP protocol is evaluated using an experimental model. The network performance is investigated and evaluated in terms of token rotation time and round trip time. The experimental results show that the performance of the MS/TP network is heavily influenced by the network traffic load, the assignment of MS/TP node address and the network configuration parameter called $N_{max_info-frames}$. Based on the experimental results, simple practical designing guidelines for BACnet MS/TP network systems are also proposed.

IP Mobility Supporting System in Heterogeneous Network (블루투스와 무선 LAN 환경을 위한 IP 이동성 지원 시스템)

  • Kang, Byoung-Hoon;Kim, Man-Bae;Choi, Chang-Yeol
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.245-250
    • /
    • 2008
  • Recently, mobile devices have supported wireless LAN as well as bluetooth, where the services such as heterogeneous network access and seamless mobility connection are important. Even though the mobility and physical network might be varied, an efficient communication mechanism for the network access and a robust mobility management of mobile devices are needed. In this paper, we design and implement a Bluetooth system with mobile LAN access capability. The proposed system has the following features; 1) IP connection is enabled by BENP in the link layer, 2) The networks devices of heterogeneous mobile devices are integrated into a single virtual network interface, 3) IP mobility between the bluetooth and wireless LAN is supported by mobile IP. The experimented results show that the packet loss and delay time during the handover duration is reduced by predicting the handover among different networks followed by the setup of any required parameters in advance.

  • PDF

Porting of Z-Stack and Implementation of UART on the TI CC2530 (TI CC2530 상의 Z-Stack 이식 및 UART 구현)

  • Kim, Byungsoon
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.525-530
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. One of the best solution for wireless sensor networks is ZigBee, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present porting of Z-Stack and implementation of UART on the TI CC2530. We show that our implemented board works correctly in terms of transmitting and receiving data via serial port.

Multicast Scheduling Algorithm using PGM Method in WDM Broadcast Networks (WDM 방송망에서 PGM 기법을 이용한 멀티캐스트 스케줄링 알고리즘)

  • 진교홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.248-256
    • /
    • 2002
  • In this paper, new multicast scheduling algorithms are proposed for the WDM single-hop broadcast-and-select networks. The existing multicast scheduling algorithms do not concerned the previous state of receivers, but the proposed method call H-EAR and PGM that partition a multicast group to subgroups using the tunable transmitter, state information of receivers, and pseudo group concept. the performance of proposed algorithms are evaluated through the computer simulation. They show the better Performance comparing with the existing multicast scheduling algorithm.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Parameter Estimation of Recurrent Neural Equalizers Using the Derivative-Free Kalman Filter

  • Kwon, Oh-Shin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.267-272
    • /
    • 2010
  • For the last decade, recurrent neural networks (RNNs) have been commonly applied to communications channel equalization. The major problems of gradient-based learning techniques, employed to train recurrent neural networks are slow convergence rates and long training sequences. In high-speed communications system, short training symbols and fast convergence speed are essentially required. In this paper, the derivative-free Kalman filter, so called the unscented Kalman filter (UKF), for training a fully connected RNN is presented in a state-space formulation of the system. The main features of the proposed recurrent neural equalizer are fast convergence speed and good performance using relatively short training symbols without the derivative computation. Through experiments of nonlinear channel equalization, the performance of the RNN with a derivative-free Kalman filter is evaluated.

Enhanced ML-LEACH with additional Relay Node

  • Jin, Seung Yeon;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose a new routing protocol for wireless sensor networks. This protocol improves energy consumption of ML-LEACH by reducing the transmission distance of member node via Relay Node. Since clusters of each Layer in ML-LEACH are randomly formed, the distance, between member node and cluster head may be longer than specific distance, distance threshold value. To improve this, we propose the new routing protocol using 2-Hop transmission via Relay Node depending on the transmission distance of the member node.

An Efficient Approach for Lightpath Restoration in WDM Networks

  • Kabir, S.M. Humayun;Pham, Van Su;Yoon, Gi-Wan
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.15-18
    • /
    • 2008
  • WDM is an incredibly promising technique in which multiple channels are operated along a single fiber, providing the facilities of terabit per second bandwidth. Thus, the survivability of WDM networks becomes critical for the success of the next generation internet architecture. Despite the fact that the path-based proactive restoration scheme guarantees 100% restoration as it computes a backup light path while the primary light path is being set up, this method results in additional capacity consumption. In this paper, an ideal technique is proposed that modifies the active multi-backup paths method and results in a better restoration scheme. Based on a theoretical analysis, a new method is shown to reduce the number of hopes as well as the restoration time.