• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.024 seconds

Design and Implementation of HomePNA 2.0 MAC Controller Circuit (HomePNA 2.0 MAC Controller 회로의 설계 및 구현)

  • Kim, Jong-Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1A
    • /
    • pp.1-10
    • /
    • 2006
  • The Home Phoneline Networking Alliance(HomePNA) 2.0 technology can establish a home network using existing in-home phone lines, which provides a channel rate of 4-32 Mbps. HomePNA 2.0 Medium Access Control(MAC) protocol adopts an IEEE 802.3 Carrier Sense Multiple Access with Collision Detection(CSMA/CD) access method, Quality of Service(QoS) algorithm, and Distributed Fair Priority Queuing(DFPQ) collision resolution algorithm. In this paper, we describe some performance analysis results of HomePNA 2.0 MAC protocol and the requirements of HomePNA 2.0 MAC controller. Then, we propose the architecture of HomePNA 2.0 MAC controller circuit, show the simulation result of each block included in HomePNA 2.0 MAC controller, and present the HomePNA 2.0 transceiver chip that we have implemented.

Effects of Endurance Training on the Serum Levels of Tumour Necrosis Factor-${\alpha}$ and Interferon-${\gamma}$ in Sedentary Men

  • Jahromi, Abdolreza Sotoodeh;Zar, Abdossaleh;Ahmadi, Fatemeh;Krustrup, Peter;Ebrahim, Khosrow;Hovanloo, Friborz;Amani, Davar
    • IMMUNE NETWORK
    • /
    • v.14 no.5
    • /
    • pp.255-259
    • /
    • 2014
  • Physical activity could be considered one of the factors that affect the immune system status and function. To find the relation between exercise and cytokines, we examined the possible effects of an 8-week endurance training program on the serum levels of cytokines, including tumour necrosis factor-alpha (TNF-${\alpha}$) and interferon-gamma (IFN-${\gamma}$) in sedentary men. A total of 30 healthy young male volunteers were randomly divided into an endurance training group and a control group. The training group followed a specific exercise protocol (running on a treadmill for 15~30 min at 50~70% maximal heart rate) for 8 weeks and the control group did not participate in any exercise program. Venous blood samples were collected from both the groups 24 h before and 24 h and 48 h after the exercise. Repeated ANOVA was used for statistical purposes. The serum levels of TNF-${\alpha}$ and IFN-${\gamma}$ were determined by ELISA. Significant (p<0.05) and non-significant (p>0.05) decreases were observed in the serum levels of IFN-${\gamma}$ and TNF-${\alpha}$, respectively, after the 8-week endurance training program. Our findings indicated that an 8-week endurance exercise may affect the serum levels of some inflammatory cytokines, suggesting the beneficial role of this training protocol in elderly population and people with certain conditions (inflammation of the vertebrae or other inflammatory diseases).

The automatic generation of MPTCP session keys using ECDH (MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구)

  • Sun, Seol-hee;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1912-1918
    • /
    • 2016
  • MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP exchanges a key when initiating an connection and makes a token by using this key for authentication. However the original MPTCP is vulnerable to MITM(Man In The Middle) attacks because the key is transported in clear text. Therefore, we applied a ECDH(Elliptic Curve Diffie-Hellman) key exchange algorithm to original MPTCP and replaced the original key to the ECDH public key. And, by generating the secret key after the public key exchanges, only two hosts is able to make the token using the secret key to add new subflow. Also, we designed and implemented a method supporting encryption and decryption of data using a shared secret key to apply confidentiality to original MPTCP.

TCP Congestion Control based on Context Switch in Heterogeneous Wireless Networks (이기종망간의 수직적 핸드오프에 대한 상태전환 방식의 TCP 혼잡제어방안)

  • Seok, Woo-Jin;Choi, Young-Hwan;Park, Gui-Soon;Na, Jee-Hyeon;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.700-709
    • /
    • 2007
  • The heterogeneous wireless access networks has been envisioned to characterize the future wireless networks. In such environments, TCP(Transmission Control Protocol) has to experience poor end-to-end performance because bandwidth and link delay change suddenly when a mobile node moves over different types of wireless networks, which is called vertical handoff. In this paper, we propose a new TCP which maintains each set of congestion control variables, which we call TCP context, for each type of wireless network. The proposed TCP can switch the TCP context against vertical handoff in order to adjust quickly to a newly arrived network. In simulations, the proposed TCP has higher throughput than TCP SACK(Selective Acknowledgment Options) due to its great features to vertical handoff situations.

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

Design and Implementation of Mobile VNC System for GUI Control and Monitoring of Remote Computer (원격 컴퓨터의 GUI 제어와 모니터링을 위한 Mobile VNC 시스템 설계 및 구현)

  • Chon Hee-ja;Seo Jung-Hee;Park Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.912-919
    • /
    • 2005
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere. So mobile devices like cellular phone and PDA are now used in various fields. In particular, the mobility of mobile devices has a great advantage in remote control. This paper designed and implemented a Mobile VNC system that transmitted the screen image of a remote computer, control the remote computer GU and monitor all by cellular phone. The proposed system consists of a Mobile Viewer un on the cellular phone, VNC Server m on a number of remote computers and a VNC Monitor. For communication between the VNC Server and the Mobile Viewer the MRFB protocol is used. The screen image transmitted to the Mobile Viewer is encoded in the PNG format supported by SK-VM, the Java execution environment of the Cellular phone. According to implementation results, the image is about $2KB\~8KB$. According to the 65 times transmission test, the average frame per second is 4.93fps in the emulator and a real cellular phone takes 0.8fps. Therefore, the proposed system is more efficient than existing systems.

Implementation of Exclusive OR-Based Video Streaming System (배타적 논리합 기반 비디오 스트리밍 시스템의 구현)

  • Lee, Jeong-Min;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1091-1097
    • /
    • 2022
  • In this paper, we implement the eXclusive OR-based Cast (XC) system that is a video streaming system using exclusive OR operations, and measure various performance metrics in wireless local area network (WLAN) environments. In addition, we investigate the performance improvement of the XC system considering various practical video streaming environments, while conventional studies analyzed the performance of XC through computer simulations in limited environments. To this end, we propose new control messages such as STR_REQ_MSG (SRM) that clients transmit to a video streaming server and STR_CON_MSG (SCM) that is used for the video streaming server to control the clients, and develop a new protocol by using the new control messages. According to the various measurement results using the implemented XC system, XC video streaming system can reduce the consumption of network bandwidth by 8.6% on average and up to 25% compared to the conventional video streaming system. In addition, the outage probability can be also reduced up to 76%.

IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration

  • Kum, Seung Woo;Kang, Mingoo;Park, Jong-Il
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3958-3971
    • /
    • 2016
  • With Internet of Things (IoT) technology, home environment becomes smarter than ever. Not only smart devices such as smart phone or smart TV, but also various IoT devices including sensor, smart thermostat, and smart scale has now become very common on the market. These devices have connectivity to the Internet, so that user can read data from the device or control the device using Internet technology. However, due to diversity of smart home requirements, device collaboration in smart home remains a challenging task still. Usually smart home is built with various technologies to fulfill its own purpose, and these purposes cover very wide area from controlling low-power sensor devices to controlling high-performance devices like smart TV and smart phone. This variety of smart home requirements makes smart home very complicated due to mixed network architecture, protocol and technology. In this paper, a framework to enable managing and collaborating heterogeneous IoT devices in smart home environment is proposed. Several programming models are defined in the proposed framework to make application development for heterogeneous devices more intuitive. The proposed framework has been implemented as a web service, and a case study with real-world smart home IoT devices is presented.

Distributed Cognitive Radio MAC Protocol Considering User Fairness and Channel Quality (사용자의 공평성과 채널품질을 고려한 분산형 무선인지MAC 프로토콜)

  • Kwon, Young-Min;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.37-44
    • /
    • 2016
  • It is important that using of efficient radio resource because of deficiency spectrum problem, so that related to this problem many researches are have proceeded. To solve this problem, Cognitive Radio(CR) was suggested. The channels are allocated to the secondary users when the primary users don't use the channels, and unfairness of secondary users can be serious problem and channel quality of multichannel can be different due to the different traffic pattern of primary users. In this paper, we propose MAC prtocol both of the user's fairness and channel quality in CR networks. Simulation results show the comparison with CR MAC protocols.

An Efficient Online RTP Packet Classification Method for Traffic Management In the Internet (인터넷상에서 트래픽 관리를 위한 효율적인 RTP 패킷 분류 방법)

  • Roh Byeong-hee
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.39-48
    • /
    • 2004
  • For transporting real-time multimedia traffic, RTP is considered as one of the most promising protocols operating at application layer. In order to manage and control the real-time multimedia traffic within networks, network managers need to monitor and analyze the traffic delivering through their networks. However, conventional traffic analyzing tools can not exactly classify and analyze the real-time multimedia traffic using RTP on the basis of real-time as well as non-real-time operations. In this paper, we propose an efficient online classification method of RTP packets, which can be used on high-speed network links. The accuracy and efficiency of the proposed methodhave been tested using captured data from a KIX node with 100 Mbps links, which interconnects between domestic and overseas Internet networks and is operated by NCA.

  • PDF