• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.03 seconds

Adaptive Data Hiding Techniques for Secure Communication of Images (자기유사성 네트워크에서 트래픽 제어에 의한 성능 개선)

  • 석경휴;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.575-583
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of large time scale Self-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem. The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.

A COMPARATIVE STUDY BETWEEN GMLAN SPEED AND GPS REPORTED VEHICLE SPEED BY VEHICLE MANEUVER (차량 운동에 따른 GMLAN 차량 속도와 실제 차량 속도 비교)

  • Won, Eugene;Kim, Jinwon;Kang, Sunggi
    • Journal of Auto-vehicle Safety Association
    • /
    • v.5 no.1
    • /
    • pp.16-24
    • /
    • 2013
  • Some GM (General Motors) vehicles are using a GMLAN (General Motors Local Area Network) communication protocol for control and diagnostics. The airbag control module uses vehicle speed information from the GMLAN to record the vehicle speed as pre-crash information. In order to use the vehicle speed information for crash reconstruction purposes, it helps to be able to understand the accuracy of the data. The actual vehicle speed is not expected to be the same as the GMLAN indicated speed in some situations like a spin or if there is hard braking. This paper compares the actual vehicle speed and vehicle speed information during specific vehicle maneuvers. Actual vehicle speed is calculated from a GPS sensor, while GMLAN vehicle speed is calculated from transmission output sensor by the Engine control module (ECM). Vehicle maneuvers defined as Mode #1, Mode #2, Mode #3. The Mode #1 maneuver simulates wheel lock-up and skidding f by hard-braking at a specific speed. The Mode #2 maneuver simulates a 90degree turn using a J-turn maneuver at a specific speed. The Mode#3 maneuver simulates a 180 degree turn using a spin type of maneuver at a specific speed. The study then compares the GMLAN speed and GPS speed to see what speed difference exists between them. The results of this paper are applicable to GM vehicles only. This paper catalogs the performance and limitations of two vehicles as useful reference for crash reconstructions where there is a need to understand the speed indicated in the pre-crash section of the SDM data.

Data Collection Methods to Standardize Protocols of Safety Supervision System (안전관제시스템 프로토콜 표준화를 위한 데이터 수집 방법)

  • Shin, Kwang-Ho;Um, Tae-Hwa;Lim, Dam-Sub;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2016
  • The current railway control system in Korea is comprised of signaling, electric rail power, communication, and maintenance systems that are independent of each other. Further, these systems have different mediums and protocols for transmitting the field equipment data to the central control system. The Safety Supervision System has as its purpose the collecting of safety-related data from each system to predict and prevent accidents, this system utilizes standard protocol. Safety-related data need to be collected from field data transmission devices of the existing control system, the data should be collected without affecting the communication of the existing system. In this study, sniffing skill, which is typically used for network traffic monitoring or security, is used to collect data. The problems arising from the use of sniffing devices are noted, and the Packet Conversion Node is proposed as a solution to the problems. Further, functional and performance testing were completed for the prototype, and the software architecture and packet conversion process were verified.

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

A Study on Implementation of Remote Control System using Wireless Technologies (무선통신을 이용한 원격제어 기술 구현)

  • Jang, Dong-won;Cho, In-Kwee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.307-309
    • /
    • 2016
  • This paper present about the system for sensing and controlling a wireless power transfer system using bluetooth protocol in robot, healthcare, smart-grid, and autonomous car. Recently a variety of applications using the Internet of Things (Internet of Things) and machine to machine (Machine to Machine) have been raised in many industries. To do this, it requires the fusion technology which is constituted with control, computing and networking. Embedded system is centered existing control system and Cyber Physical System(CPS) is the systems which was converged of a computing technologies using a wired or wireless network. CPS was adopted in the future government-led technology in the United States and Europe and is being pursued in cooperation with institutes, industries, and academia. In this paper, we implement and describe a technique for controlling the system for transmitting power wirelessly by sensing method using the matching of CPS technology concepts.

  • PDF

Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support (비용효과적인 이동성 관리 지원을 위한 새로운 인터네트워킹 아키텍쳐의 성능분석)

  • Song, MyoungSeok;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.181-190
    • /
    • 2013
  • PMIPv6(Proxy Mobile IPv6) is a network-based IP mobility management protocol, which can control the mobility without depending on the type of access system or the capability of mobile node. Combining it with SIP mobility, it can establish the route optimization effectively and ensure the terminal mobility and the session mobility. There are many literatures on PMIPv6-SIP in mobility management, but efficient performance analysis and mathematical modeling has not been standardized. For this, a new PMIPv6-SIP architecture is proposed to compare with Pure-SIP in terms of the handover delay and packet loss.

RRSEB: A Reliable Routing Scheme For Energy-Balancing Using A Self-Adaptive Method In Wireless Sensor Networks

  • Shamsan Saleh, Ahmed M.;Ali, Borhanuddin Mohd.;Mohamad, Hafizal;Rasid, Mohd Fadlee A.;Ismail, Alyani
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1585-1609
    • /
    • 2013
  • Over recent years, enormous amounts of research in wireless sensor networks (WSNs) have been conducted, due to its multifarious applications such as in environmental monitoring, object tracking, disaster management, manufacturing, monitoring and control. In some of WSN applications dependent the energy-efficient and link reliability are demanded. Hence, this paper presents a routing protocol that considers these two criteria. We propose a new mechanism called Reliable Routing Scheme for Energy-Balanced (RRSEB) to reduce the packets dropped during the data communications. It is based on Swarm Intelligence (SI) using the Ant Colony Optimization (ACO) method. The RRSEB is a self-adaptive method to ensure the high routing reliability in WSNs, if the failures occur due to the movement of the sensor nodes or sensor node's energy depletion. This is done by introducing a new method to create alternative paths together with the data routing obtained during the path discovery stage. The goal of this operation is to update and offer new routing information in order to construct the multiple paths resulting in an increased reliability of the sensor network. From the simulation, we have seen that the proposed method shows better results in terms of packet delivery ratio and energy efficiency.

Improvement of Dynamic Slot allocation algorithm for wireless ATM networks (무선 ATM 망에서 실시간 가변성 서비스를 위한 동적 슬롯 할당 알고리즘의 개선)

  • Hyun-joo Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.165-180
    • /
    • 2001
  • This study is on the design and performance evaluation of a multi medium access control(MAC) protocol for multimedia access in the wireless ATM network. In general, MAC protocols for multimedia data transmission are classified into the fixed slot allocation algorithm that allocates base-station slots equally over terminals, and the dynamic slot allocation algorithm that with flexible penetration. The conventional slot allocation algorithms assign slots based on the average bandwidths required for various services types. Although the algorithms have a wide bandwidth for real-time-variant services, the slots are being wasted due the service types. To improve the slot waste problem, this thesis proposes a method that minimizes the waste by assigning variable slots based on the most appropriate bandwidth after a base-station analyzes the service type requested from terminals.

  • PDF

A Study on Performance Improvement of TCP Using Packet Loss Discrimination Module in Ad-hoc Network (패킷 손실 구별 모듈을 이용한 Ad-hoc 통신망에서의 TCP 성능 향상에 관한 연구)

  • Cho, Nam-Ho;Lee, Jung-Min;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.286-288
    • /
    • 2005
  • 최근 기지국(Base Station)의 도움 없이 이동 단말기 간의 다중 무선 홉을 사용하여 송,수신자 간의 데이터 전송을 가능하게 하는 Ad-hoc 통신망에 관한 연구가 활발히 진행되고 있다. 유선망과 달리 Ad-hoc 통신망은 무선 전송 매체를 사용하기 때문에 신호의 페이딩(Fading), 간섭(Interference), 잡음(Noise) 등에 의해 높은 BER(Bit Error Rate)이 발생하는 특징을 가지고 있다. 하지만, 현재 인터넷 상에서 광범위하게 사용되고 있는 전송 규약인 TCP(Transmission Control Protocol)는 유선망의 신뢰적인 전송 매체를 고려하여 개발된 프로토콜이기 때문에 TCP를 수정 없이 Ad-hoc 통신망에 적용할 경우 전송 성능이 저하되는 문제를 가지고 있다. 전송 성능이 저하되는 문제는 기존 TCP가 에러 발생의 원인을 혼잡에 의한 것으로 인식하고 불필요한 혼잡 제어를 하기 때문이다. 본 논문에서는 송신자가 에러 발생 원인을 구별하고, 그에 따라 전송률을 조절함으로써 Ad-hoc 망에서의 TCP성능 향상을 위한 방법을 제시하였다. 또한 ns-2 시뮬레이터를 이용한 실험을 통해 TCP의 성능이 제안된 알고리즘에 의해 향상되었음을 확인하였다

  • PDF