• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.032 seconds

Design and Hardware Integration of Humanoid Robot Platform KHR-2 (인간형 로봇 플랫폼 KHR-2 의 설계 및 하드웨어 집성)

  • Kim, Jung-Yup;Park, Ill-Woo;Oh, Jun-Ho
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.579-584
    • /
    • 2004
  • In this paper, we present the mechanical, electrical system design and system integration of controllers including sensory devices of the humanoid, KHR-2 (KAIST Humanoid Robot - 2). We have developed KHR-2 since 2003. Total number of DOF of KHR-2 is 41. Each arm including a hand has 11 DOF and each leg has 6 DOF. Head and trunk also has 6 DOF and 1 DOF respectively. In head, two CCD cameras are used for eye. To control all axes efficiently, distributed control architecture is used to reduce computation burden of main controller and to expand devices easily. So we developed the sub-controller as a servo motor controller and a sensor interfacing devices using microprocessor. The main controller attached its back communicates with sub-controllers in real-time by CAN (Controller Area Network) protocol. We used Windows XP as its OS (Operation System) for fast development of main control program and easy extension of peripheral devices. And RTX HAL extension commercial software is used to realize the real-time control in Windows XP environment.

  • PDF

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

End-to-End Quality of Service Constrained Routing and Admission Control for MPLS Networks

  • Oulai, Desire;Chamberland, Steven;Pierre, Samuel
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.297-305
    • /
    • 2009
  • Multiprotocol label switching (MPLS) networks require dynamic flow admission control to guarantee end-to-end quality of service (QoS) for each Internet protocol (IP) traffic flow. In this paper, we propose to tackle the joint routing and admission control problem for the IP traffic flows in MPLS networks without rerouting already admitted flows. We propose two mathematical programming models for this problem. The first model includes end-to-end delay constraints and the second one, end-to-end packet loss constraints. These end-to-end QoS constraints are imposed not only for the new traffic flow, but also for all already admitted flows in the network. The objective function of both models is to minimize the end-to-end delay for the new flow. Numerical results show that considering end-to-end delay (or packet loss) constraints for all flows has a small impact on the flow blocking rate. Moreover, we reduces significantly the mean end-to-end delay (or the mean packet loss rate) and the proposed approach is able to make its decision within 250 msec.

Media Access Scheme for Achieving an Effective Traffic Control Mechanism and Energy Efficiency in Sensor Networks (센서 네트워크에서 효과적인 트래픽 제어 방법과 에너지 효율성을 고려한 Media Access 기법)

  • Min Byung-Ung;Kim Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1060-1064
    • /
    • 2006
  • Data collected by sensors in field are transmitted to the base station gathering all of data. Because sensors have to gather data in surroundings and periodically transmit data to the base station, it makes energy consumed much. In this paper, we mose the scheme that is to avoid traffic congestion with achievement of energy efficiency, so collected data is transmitted efficiently. This is to adjust transmission rate differently in case of increasing or decreasing traffic and minimize the energy consumption with setting ideal options up basic CSMA(Carrier Sense Multiple Access) protocol in each sensor. Through the simulation, we find the ideal CSMA options and apply the proposed scheme of traffic control mechanism to them and analyze them, then show energy efficiency and effective traffic control mechanism.

NJ+: An Efficient Congestion Control Mechanism for Wireless Networks

  • Lee, Jae-Hyung;Kim, Jung-Rae;Park, Min-U;Koo, Ja-Hwan;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.333-351
    • /
    • 2008
  • Transmission control protocols have to overcome common problems in wireless networks. TCP employing both packet loss discrimination mechanism and available bandwidth estimation algorithm, known as the good existing solution, shows significant performance enhancement in wireless networks. For instance, TCP New Jersey which exhibits high throughput in wireless networks intends to improve TCP performance by using available bandwidth estimation and congestion warning. Even though it achieves 17% and 85% improvements in terms of goodput over TCP Westwood and TCP Reno, respectively, we further improve it by exploring maximized available bandwidth estimation, handling bit-error-rate error recovery, and effective adjustment of sending rate for retransmission timeout. Hence, we propose TCP NJ+, showing that for up to 5% packet loss rate, it outperforms other TCP variants by 19% to 104% in terms of goodput when the network is in bi-directional background traffic.

Distributed Address Configuration Mechanism Using Address Pool in MANET (MANET 환경에서 주소 영역기반 주소할당 분산기법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin;Yu, Hyun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.753-760
    • /
    • 2009
  • As it becomes increasingly important that Internet access is available anywhere at any time, providing MANET (Mobile Ad-Hoc Network) with the Internet access attracts more attention. The existing DHCP (Dynamic Host Configuration Protocol) address configuration schemes require message exchanges between MANET nodes and the DHCP server through multi-hop routes. Messages can be easily dropped in the wireless multi-hop communication environment and the address configuration may be instable and need long delay. In this paper, we propose a new address configuration scheme using the concept of address pool allocation. In the proposed scheme, the DHCP server assigns a part of its address pool to a node instead of a single address and the node can assign a part of its own address pool to its neighbor nodes. Through simulation studies, we show that our scheme yields about 77% of the address configuration delay and 61% of the control message overhead of the existing DHCP based mechanism.

Study on VoIP Service Quality Management (VoIP 서비스 품질관리에 관한 연구)

  • Chang, Byeong-Yun;Seo, Dong-Won;Park, Byung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.245-252
    • /
    • 2011
  • VoIP transmits voices over IP-based networks and it is the abbreviation of Voice over Internet Protocol. Recently, VoIP provides various services in addition to voices. Since VoIP services' provision is extending, VoIP service quality management is becoming an important issue. Therefore, in this paper, we study VoIP service quality management. We examine VoIP technology, service types, and network architecture. Then, we investigate key quality indicators(KQIs)/key performance indicators(KPIs) in terms of customers, not network service providers. Toward this, we also study the concept of general service quality management as well as the concept of telecommunication related service quality management. Moreover, we apply $\bar{x}$ and R charts to show how to use statistical quality control techniques in real telecommunication companies with one KQI.

Local Recovery in Reliable Multicast Protocols by Separating NAK-suppression from Error Recovery Request (신뢰성 있는 멀티캐스트 프로토콜에서 NAK 메시지의 기능 분리를 통한 지역적 오류 복구)

  • Jung, Choong-Il;Lee, Yun-Hee;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.559-569
    • /
    • 2001
  • With the growth of the Internet, applications using the reliable multicast protocol are increasing. Two important requirements of reliable multicasting are reliability and scalability. To enhance scalability, many methods have been proposed. A typical method is a local recovery scheme. This paper proposes a new stable and effective protocol with the following features. The first is to apply the discipline of the separations of concerns to NAK message. By dividing the functions of the NAK message into the error recovery request and the NAK-suppression, each function can be optimized. Second, a local representative, which is selected gradually and distributively, executes error recovery in somewhat deterministic manner. Finally, by dynamically adjusting the TTL value of the control message, the error recovery domain can be optimized. The proposed scheme has been implemented and experimented on Network Simulator. Compared to the existing schemes, the performance results show that scalability has not only been enhanced but also error recovery time and network overhead have been reduced.

  • PDF

Rate Control Scheme for Improving Quality of Experience in the CoAP-based Streaming Environment (CoAP 기반의 스트리밍 환경에서 사용자 체감품질 향상을 위한 전송량 조절 기법)

  • Kang, Hyunsoo;Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1296-1306
    • /
    • 2017
  • Recently, as the number of Internet of Things users has increased, IETF (Internet Engineering Task Force) has released the CoAP (Constrained Application Protocol). So Internet of Things have been researched actively. However, existing studies are difficult to adapt to streaming service due to low transmission rate that result from buffer underflow. In other words, one block is transmitted one block to client's one request according to the internet environment of limited resources. The proposed scheme adaptively adjusts the rate of CON(Confirmable) message among all messages for predicting the exact network condition. Based on this, the number of blocks is determined by using buffer occupancy rate and content download rate. Therefore it improves the quality of user experience by mitigating playback interruption. Experimental results show that the proposed scheme solves the buffer underflow problem in Internet of Things streaming environment by controlling transmission rate according to the network condition.

Dynamic Threshold-Based Multicast Scheme for N-Screen Services in Indoor and Ship Area Networks (선박 및 실내 N-스크린 서비스를 위한 동적 Threshold 기반 멀티캐스트 기술)

  • Hur, Kyeong;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1369-1376
    • /
    • 2015
  • A wireless bridge is essential to transmit control and managing information to sensors or instruments from a central integrated ship area network station. In this paper, a WiMedia Distributed-MAC(D-MAC) protocol is adopted for development of a seamless N-Screen wireless service in Indoor and Ship Area Networks. Furthermore, to provide the OSMU(One Source Multi Use) N-screen service through P2P streaming in the seamless D-MAC protocol, a Dynamic Threshold-based Multicast(DTM) technology is proposed and analyzed. For this technology, a new Hard/Soft Vertical Region(HVR-SVR) based time slot allocation and a multicast resource reservation scheme are combined. From simulation results, proposed DTM scheme expands the number of time slots available for unicast and multicast realtime N-Screen reservations with various service time interval requests. Furthermore, it enhances performances in vewpoints of realtime N-Screen data reservation conflict and throughput.