• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.028 seconds

A Study on Design for Stream Control Transmission Protocol on IP Network (IP 네트워크 상에서 스트림 제어 전송 프로토콜 설계에 관한 연구)

  • Kim, Kyung-Nam;Kim, Seong-Hee;Kim, Phyoung-Jung;Cheon, Kyeong-Jae;Kim, Hwan-Chul
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1327-1330
    • /
    • 2001
  • IP 네트워크가 급속도로 성장하고 있고, ISDN, 이동 네트워크, ATM 네트워크 등 다른 통신 구조와 공존하고 있다. 이러한 통신 구조들은 각각 자신의 응용 서비스를 제공하고 있기 때문에 상호 연동 요구가 점차 증가하고 있다. 특히, IP 네트워크를 경유하여 하나의 네트워크로부터 다른 네트워크로 신호 메시지를 전송하고자 하는 요구가 증대되어 왔다. 이에 따라 IETF는 IP 네트워크 상에서 통신 신호메시지 전송을 위한 새로운 프로토콜 SCTP를 개발하고 있다. 본 논문은 SCTP의 개념과 기능적 모듈 그리고 응용을 간단히 고찰하고, IP 네트워크 상에 SCTP를 설계하는 방안을 기술한다.

  • PDF

Analysis and Validation of IEEE 802.15.4 MAC Protocol using SDL (SDL를 이용한 IEEE 802.15.4 MAC 프로토콜의 분석 및 검증)

  • 한창만;최정훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.706-708
    • /
    • 2004
  • 일반적인 무선 통신망은 데이터 전송 고속화에 중심을 두고 발전해 왔으나, 최근 무선 센서 네트워크와 같은 응용 분야에서 소량의 데이터와 낮은 처리 속도를 지원하면서 저비용, 경량, 저전력을 요구하는 무선 통신 기술이 필요하게 됨에 따라 IEEE에서 LR-WPAN(Low Rate-Wireless Personal Area Network)을 위한 새로운 IEEE 802.15.4 표준이 제시되었다. 현재 무선 센서 네트워크에 관한 연구는 소형 경량의 MAC(Medium Access Control ) 프로토콜 개발이 핵심 기술로 인식되면서, 저전력 소모를 위한 라우팅 기법, MAC 프로토콜의 패킷처리 기술 등이 우선적으로 진행 중이다. 그러나 무선 센서 네트워크와 같은 응용분야에 사용 가능한 표준인 IEEE 802.15.4 MAC 프로토콜의 실질적인 상용화를 위해서는 표준안 분석 및 검증 과정이 기본적으로 선행되어야 한다. 본 논문에서는 IEEE 802.15.4 표준안의 핵심인 MAC 프로토콜을 정형화된 명세 언어인 SDL(Specification and Description Language)를 이용하며 상세 설계 및 분석 후, 자동화 도구를 이용한 모의수행을 통하여 검증하였으며 표준안과의 비교 및 오류 수정을 거친 연구결과를 기술한다.

  • PDF

IEEE 802.11 기반 Ad Hoc Wireless LAN에서의 실시간 통합 서비스를 위한 분산 MAC 프로토콜의 설계 및 분석

  • 김원수;강충구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11B
    • /
    • pp.985-998
    • /
    • 2003
  • 본 논문에서는 IEEE 802.11 규격을 기반으로 다중 홉 Ad Hoc 모드에서 비 실시간 및 실시간 트래픽에 대한 통합 서비스를 지원하는 Wireless LAN을 구성할 때, 분산 방식으로 실시간 서비스의 우선권을 고려한 채널 액세스의 차별화를 제공할 수 있는 매체접근제어(Medium Access Control: MAC) 프로토콜의 구현 방안을 제안한다. 이를 위해 실시간과 비 실시간 트래픽의 Contention Window (CW)를 서로 분리하며, 실시간 서비스의 지연 바운드에 따라 정해진 잔여 수명(residual time)을 우선권 설정에 반영함으로써 실시간 트래픽의 지연 요구 사항을 보장할 수 있도록 한다. 또한 실시간 트래픽의 부하에 따라서 적응적으로 offset 값을 조정함으로써 offset에 의해 발생될 수 있는 수율의 저하를 최소화한다. 제안된 방식은 기존 IEEE 802.11 MAC 규격의DCF (Distributed Coordination function) 방식을 그대로 사용하면서 CSMA/CA 기반의 경쟁 방식을 통해서도 비 실시간 트래픽과의 차별화가 가능하고, 또한 잔여 수명 시간을 고려한 동적인 우선권 할당이 가능하도록 하였다. 시뮬레이션에 의한 분석 결과에 따르면 기존 DCF와 비교할 때 실시간 단말의 용량을 2배까지 향상시킬 수 있으며, 트래픽 부하에 따라 적응적 제어를 통해 추가적인 성능 개선 효과를 확인하였다.

Priority MAC based on Multi-parameters for IEEE 802.15.7 VLC in Non-saturation Environments

  • Huynh, Vu Van;Le, Le Nam-Tuan;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.224-232
    • /
    • 2012
  • Priority MAC is an important issue in every communication system when we consider differentiated service applications. In this paper, we propose a mechanism to support priority MAC based on multi-parameters for IEEE 802.15.7 visible light communication (VLC). By using three parameters such as number of backoff times (NB), backoff exponent (BE) and contention window (CW), we provide priority for multi-level differentiated service applications. We consider beacon-enabled VLC personal area network (VPAN) mode with slotted version for random access algorithm in this paper. Based on a discrete-time Markov chain, we analyze the performance of proposed mechanism under non-saturation environments. By building a Markov chain model for multi-parameters, this paper presents the throughput and transmission delay time for VLC system. Numerical results show that we can apply three parameters to control the priority for VLC MAC protocol.

Development of a Network Simulator for a Power Infrastructure Defense System Using IEEE PC37.118 (IEEE PC37.118을 이용한 광역 방어 시스템의 네트워크 시뮬레이터 개발)

  • Kim, Kyung-Nam;Yi, Keon-Young
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.173-174
    • /
    • 2006
  • The power infrastructure defense system monitor and control a power system with parameters of a power system such as voltage, phasor angle, frequency and power flow which are measured at the same instance. For this, synchronized phasor measurement based on the GPS(Global Positioning System) is necessary. PMU(Phasor Measurement Unit) measures synchrophasor and transmits it to the power infrastructure defense system. For this communication, IEEE H37.118 defines a communication message format and measurement concept and we extend the protocol to transmit disturbance data. The synchrophasor data can be sent at various rates and there are several options for phasor information sent in the synchrophasor message. In this paper, we develop software that simulate communication between the power infrastructure defense system and PMU to annalize the traffic.

  • PDF

An Adaptive Universal Serial Bus (USB) Protocol for Improving the Performance of Data Communication under the Heavy Traffic

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2499-2502
    • /
    • 2005
  • Universal Serial Bus (USB) is one of the most popular communication interfaces. When USB is used in more extended range, especially configuring home network by connecting multiple digital devices each other, USB interface uses the bandwidth in the way of Time Division Multiplexing (TDM) so that the bottleneck of bus bandwidth can be brought under the heavy traffic. In this paper, the more effective usage of bus bandwidth to overcome this situation is introduced. Basically, in order to realize the system for transferring real-time moving picture data among digital information devices, we analyze USB transfer types and descriptors and introduce the method to enhance the detailed performance of isochronous transfer that is one of USB transfer types.

  • PDF

Throughput Analysis of CSMA/CA-based Cognitive Radio Networks in Idle Periods

  • Wang, Hanho;Hong, Daesik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.4
    • /
    • pp.173-180
    • /
    • 2014
  • Random access protocols feature inherent sensing functionality and distributed coordination, making them suitable for cognitive radio communication environments, where secondary users must detect the white space of the primary spectrum and utilize the idle primary spectrum efficiently without centralized control. These characteristics have led to the adoption of carrier-sensing-multiple-access/collision-avoidance (CSMA/CA) in cognitive radio. This paper proposes a new analytical framework for evaluating the performance of a CSMA/CA protocol that considers the characteristics of idle periods based on the primary traffic behavior in cognitive radio systems. In particular, the CSMA/CA-based secondary network was analyzed in the terms of idle period utilization, which is the average effective data transmission time portion in an idle period. The use of the idle period was maximized by taking its statistical features into consideration.

Design and Implementation of User authentication and Roaming Schemes in public WLAN environments (WLAN 서비스에서 사용자 인증과 로밍방식의 설계)

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.208-210
    • /
    • 2009
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAN access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802.1x standards and related protocols like EAPOL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG. (Intelligent Wireless Internet Gateway). For the network security and user authenti -cation purposes, a supplicant who wants to access Internet should be authorized to access the AP port using the EAPOL.

  • PDF

Detection of DTMF Signalling for Low Bit Rate Vocoder (저전송률 음성부호화기의 DUAL-TONE MULTIFREQUENCY(DTMF) SIGNALLING)

  • 손상목
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1998.08a
    • /
    • pp.159-164
    • /
    • 1998
  • We proposes a new detecting algorithm of DTMF tone for low bit ate vocoder so that we use DTMF tones for signalling inthe digital network. Using DTMF tones for signalling, we could not change the conventional IS-95 protocol and control the mobile phone. We apply the root finding to detection of formants and bandwidth to search whether DTMF tones or voice and moreover to find what's kinds of DTMF tones, for instance 1, 2, 3, ......., #, *, A, B, ...., etc. Consequently, proposed method has a good result which is 0.000944% average error rate. It is satisfied with rcommended error rate in ITU-T($\pm$1.8%).

  • PDF

Real-time 3D Graphic Simulation of the Spent Fuel Rod Extracting Machine for Remote Monitoring (사용후핵연료봉 인출장치의 원격감시를 위한 실시간 3차원 그래픽 시뮬레이션)

  • 송태길;이종열;김성현;윤지섭
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.4
    • /
    • pp.327-335
    • /
    • 2000
  • The spent fuel rod extracting machine is automatically operated in high radioactive environment, so high reliability of operation is required. In this paper, to enhance the reliability of this machine by providing a close monitoring capability. a real time graphic simulation method is suggested. This method utilizes conventional IGRIP (Interactive Graphics Robot Instruction Program) 3D graphic simulation tool to visualize and simulate the 3D graphic model of this machine. Also, the dedicated protocol is defined for transmission of the operational data of the machine. The real time graphic simulation is realized by developing the socket module between a graphic workstation and a machine control computer through the TCP/IP network and by dividing the 3D graphic simulation GSL(Graphic Simulation Language) program as a small sized sub routine. The suggested method is implemented while automatically operating the rod extracting machine. The result of implementation shows that the real time 3D graphic simulation is well synchronized with the actual machine according to the operational data.

  • PDF