• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.03 seconds

A Survey on Fly-By-Wireless Flight Control Technology (Fly-By-Wireless 비행제어 기술의 연구 동향)

  • Han, Jung-Soo;Ha, Chul-Su;O, Su-Hun;Kang, Seung-Eun;Ko, Sangho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.1
    • /
    • pp.7-14
    • /
    • 2014
  • This paper deals with recent research cases and directions of Fly-By-Wireless (FBWLS) flight control technology. FBWLS is a new type of flight control system technology with the aim of solving the problems mainly caused by the increasing amount of wires in aircraft to which Fly-By-Wire (FBW) technology applies. Therefore, in FBWLS flight control system the wired communication system is replaced with a wireless communication system. Currently the FBWLS flight control technology is at an initial development stage and thus this paper surveys deals with the cases in the viewpoint of technology feasibility. In this context, this paper analyzes technology that needs further studies to secure the reliability, stability and accuracy to the similar level of the corresponding FBW system. Since the major problems of FBWLS technology are packet losses and time delays so that this paper suggests the research direction of wireless communication protocol selection, optimization of wireless communication network and controller design considered communication environment.

Implementation of an operation module for an integrated network management system of ship-based and offshore plants (해양플랜트 및 선박의 네트워크 통합 관리 시스템 운용 모듈 개발)

  • Kang, Nam-Seon;Lee, Seon-Ho;Lee, Beom-Seok;Kim, Yong-Dae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.613-621
    • /
    • 2016
  • This research connected network equipment, including CCTV, PAGA, IP-PBX, and Legacy, in order to enable the operation and configuration of internal IP-based network equipment in maritime plants and vessels, both in the field and from remote places, and to allow for the support of remotely controlling such equipment. It also realized an operating program for the integrated network equipment management system to enable the monitoring and control of equipment status, operation condition, and notifications from distant places. By applying the operating program to satellite stations and vessels sailing on the sea, a performance test was conducted to evaluate data loss and transmission/reception delay in the communication section between the land and vessels. As a result, this research verified the normal operation of CCTV control and of real-time monitoring and control of the network equipment, including PAGA, IP-PBX, and Legacy under the FBB and MVSAT environments. It was observed that the transmission of CCTV video images with a large volume of data as well as the transmission and reception of voice data were found to be slightly delayed, indicating the need to develop technology to compress and convert data for real-time transmission and reception.

Collision Avoidance Power Control of Carrier Sensing Zone for Energy Efficiency in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율을 위한 반송파 감지지역의 충돌방지 전력제어)

  • Kim, Chang-Bok;Kim, Nam-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.53-60
    • /
    • 2011
  • In Wireless Sensor Networks, IEEE 802.11 happen unnecessary energy consume because of packet transmission using maximum power between sensor node. The BASIC scheme is to use maximum transmission power for RTS-CTS and minimum required transmission power so as to high energy efficiency for DATA-ACK. However BASIC scheme may degrade network throughput with collision of ACK packet by node in carrier sensing zone and may result in higher energy consumption than when using IEEE 802.11 without power control. Existing PCM(Power Control MAC) scheme is to use DATA packet transmission method by periodically maximum power level so as to sensing DATA packet transmit in carrier sensing zone of transmission node, and this method can avoid collision of ACK packet. This paper present problem by energy efficiency of PCM scheme, and design some more improved PCM scheme.

A Study on Performance Evaluation based on Packet Dropping in ATM Network . New Scheme Proposal

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.27 no.3
    • /
    • pp.283-288
    • /
    • 2003
  • Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6

  • Choi, Hyon-Young;Min, Sung-Gi;Han, Youn-Hee;Koodli, Rajeev
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.603-620
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) is a network-based mobility support protocol and it does not require Mobile Nodes (MNs) to be involved in the mobility support signaling. In the case when multiple interfaces are active in an MN simultaneously, each data flow can be dynamically allocated to and redirected between different access networks to adapt to the dynamically changing network status and to balance the workload. Such a flow redistribution control is called "flow mobility". In the existing PMIPv6-based flow mobility support, although the MN's logical interface can solve the well-known problems of flow mobility in a heterogeneous network, some missing procedures, such as an MN-derived flow handover, make PMIPv6-based flow mobility incomplete. In this paper, an enhanced flow mobility support is proposed for actualizing the flow mobility support in PMIPv6. The proposed scheme is also based on the MN's logical interface, which hides the physical interfaces from the network layer and above. As new functional modules, the flow interface manager is placed at the MN's logical interface and the flow binding manager in the Local Mobility Anchor (LMA) is paired with the MN's flow interface manager. They manage the flow bindings, and select the proper access technology to send packets. In this paper, we provide the complete flow mobility procedures which begin with the following three different triggering cases: the MN's new connection/disconnection, the LMA's decision, and the MN's request. Simulation using the ns-3 network simulator is performed to verify the proposed procedures and we show the network throughput variation caused by the network offload using the proposed procedures.

An Dynamic Congestion Window Tuning Algorithm for TCP Performance Improvement in Wireless Ad-hoc Network (무선 Ad-hoc 네트워크에서 TCP 성능 향상을 위한 동적 혼잡윈도우 조정 알고리즘)

  • Kim, Kwan-Woong;Bae, Sung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1384-1390
    • /
    • 2008
  • The TCP protocol is originally designed for wired network, however it performs very poor in wireless network due to different nature of wireless network from wired networks. In terms of TCP performance improvement in wireless Ad-hoc network, many researches show that small congestion window size of TCP connection can improve TCP performance. We propose a new TCP algorithm to improve TCP performance in wireless Ad-hoc network. The basic idea of our approach is that TCP receiver estimates the optimum window size and then sets congestion window limit of TCP sender to an optimum value by using the advertised window field in TCP ACK packet. From extensive computer simulation, the proposed algorithm shows superior performance than traditional TCP protocols in terms of packet delivery ratio and packet loss.

A Tunable Transmitter - Tunable Receiver Algorithm for Accessing the Multichannel Slotted-Ring WDM Metropolitan Network under Self-Similar Traffic

  • Sombatsakulkit, Ekanun;Sa-Ngiamsak, Wisitsak;Sittichevapak, Suvepol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.777-781
    • /
    • 2004
  • This paper presents an algorithm for multichannel slotted-ring topology medium access protocol (MAC) using in wavelength division multiplexing (WDM) networks. In multichannel ring, there are two main previously proposed architectures: Tunable Transmitter - Fixed Receiver (TTFR) and Fixed Transmitter - Tunable Receivers (FTTR). With TTFR, nodes can only receive packets on a fixed wavelength and can send packets on any wavelengths related to destination of packets. Disadvantage of this architecture is required as many wavelengths as there are nodes in the network. This is clearly a scalability limitation. In contrast, FTTR architecture has advantage that the number of nodes can be much larger than the number of wavelength. Source nodes send packet on a fixed channel (or wavelength) and destination nodes can received packets on any wavelength. If there are fewer wavelengths than there are nodes in the network, the nodes will also have to share all the wavelengths available for transmission. However the fixed wavelength approach of TTFR and FTTR bring low network utilization. Because source node with waiting data have to wait for an incoming empty slot on corresponding wavelength. Therefore this paper presents Tunable Transmitter - Tunable Receiver (TTTR) approach, in which the transmitting node can send a packet over any wavelengths and the receiving node can receive a packet from any wavelengths. Moreover, the self-similar distributed input traffic is used for evaluation of the performance of the proposed algorithm. The self-similar traffic performs better performance over long duration than short duration of the Poison distribution. In order to increase bandwidth efficiency, the Destination Stripping approach is used to mark the slot which has already reached the desired destination as an empty slot immediately at the destination node, so the slot does not need to go back to the source node to be marked as an empty slot as in the Source Stripping approach. MATLAB simulator is used to evaluate performance of FTTR, TTFR, and TTTR over 4 and 16 nodes ring network. From the simulation result, it is clear that the proposed algorithm overcomes higher network utilization and average throughput per node, and reduces the average queuing delay. With future works, mathematical analysis of those algorithms will be the main research topic.

  • PDF

Implementation of Wireless PGN Analyzer for ISOBUS network

  • Tumenjargal, Enkhbaatar;Badarch, Luubaatar;Lee, Kangsan;Ham, Woonchul;Doopalam, Enkhzul;Togooch, Amartuvshin
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.46-54
    • /
    • 2015
  • Communication between ECUs (Electronic Control Units) in agricultural machineries tends to use IS011783 widely, that is PGN (Parameter Group Number) based communication protocol lays on CAN protocol by altering its identifier part. Messages in line are transferred and received between ECUs according to ISO11783 standard. This paper discusses about design of wireless monitoring system. We used an ARM Cortex-M3 microcontroller embedded development board and marvel8686 wireless module. The wireless ISOBUS monitoring system, attached to communication line, reads messages, interpret them, and display them on the screen in easily comprehendible form. It can be used to generate messages and monitor the traffic on physical bus systems. The monitoring system connected to ECUs, monitor and simulate real traffic of communication and functionality of the ECUs. In order to support our work, we have implemented the monitoring tool. The development consists of two parts: GUI of the application and firmware level programming. Hence the monitoring system is attached to the communication line and equipped by Wi-Fi module; farmer/dispatcher in a farm monitors all messages in communication line on personal computer and smart device.