• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.164 seconds

Realization of automobile electromotive mirror system using Controller Area Network(CAN Protocol) (Controller Area Network을 이용한 자동차용 전동거울 시스템 구현)

  • Yoon, Sang-Jin;Cho, Yong-Seok;Lee, Jong-Sung;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2234-2236
    • /
    • 2002
  • In this paper, realized an automation system that applies the automobile electromotive mirror using CAN(Controller Area Network : ISO l1898). CAN is being used mainly in ECUs (Electronic Control Units) connection of control system or automobile inside. And it has high reliability in the various network protocol. To be realized position system, Automobile Electro mirror, has a strong point that estabilishment e decrease and ease of maintenance it compare PPP(Point-to-point) method of existed. The realization composed of three portions. One Input Slave Con which accept a user's input, another Output Slave Co which drove it makes the motor of electromotive mirr other Master Controller which interfacing the two Controller. Automobile electromotive mirror realized time system that will be able to minize the delay t point of time user's input until output point of time mirror.

  • PDF

Neighbor Discovery Protocol Based on Inhibited and Priority Access Controls for Multihop Cellular Networks (멀티홉 셀룰러 네트워크에서 억제 및 우선순위 접속 제어기반의 이웃노드 탐색 프로토콜)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2533-2540
    • /
    • 2013
  • In multihop cellular network environments, the mobility of nodes is a major obstacle to find a reliable routing path between a mobile node (MN) and the access node (AN). Therefore, in this paper, we propose a fast and reliable neighbor discovery protocol that enables the fast and reliable neighbor discovery by considering the node mobility in the multihop cellular network. The proposed neighbor discovery protocol inhibits the transmission of unnecessary control messages to quickly find a suitable neighbor node (NN) and performs a priority-based access control to transmit control messages without collision in the order of NN desirable to be selected. Simulation results show that the proposed neighbor discovery protocol can discover the NNs faster than the conventional scheme and select a more reliable relay node although the number of neighbor nodes increases and the node mobility increases.

K-connected, (K+1)-covered Fault-tolerant Topology Control Protocol for Wireless Sensor Network (무선 센서 망을 위한 K-연결 (K+1)-감지도 고장 감내 위상 제어 프로토콜)

  • Park, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1133-1141
    • /
    • 2009
  • In this paper, we present a distributed fault-tolerant topology control protocol that configure a wireless sensor network to achieve k-connectivity and (k+1)-coverage. One fundamental issue in sensor networks is to maintain both sensing coverage and network connectivity in order to support different applications and environments, while some least active nodes are on duty. Topology control algorithms have been proposed to maintain network connectivity while improving energy efficiency and increasing network capacity. However, by reducing the number of links in the network, topology control algorithms actually decrease the degree of routing redundancy. Although the protocols for resolving such a problem while maintaining sensing coverage were proposed, they requires accurate location information to check the coverage, and most of active sensors in the constructed topology maintain 2k-connectivity when they keep k-coverage. We propose the fault-tolerant topology control protocol that is based on the theorem that k-connectivity implies (k+1)-coverage when the sensing range is at two times the transmission range. The proposed distributed algorithm does not need accurate location information, the complexity is O(1). We demonstrate the capability of the proposed protocol to provide guaranteed connectivity and coverage, through both geometric analysis and extensive simulation.

A Study on Timing Modeling and Response Time Analysis in LIN Based Network System (LIN 프로토콜 시간 모델링 및 메시지 응답 시간 해석에 관한 연구)

  • Youn, Jea-Myoung;Sunwoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, a mathematical model and a simulation method for the response time analysis of Local Interconnect Network(LIN) based network systems are proposed. Network-induced delays in a network based control system can vary widely according to the transmission time of message and the overhead time of transmission. Therefore, in order to design a distributed control system using LIN network, a method to predict and verify the timing behavior of LIN protocol is required at the network design phase. Furthermore, a simulation environment based on a timing model of LIN protocol is beneficial to predict the timing behavior of LIN. The model equation is formulated with six timing parameters deduced from timing properties of LIN specification. Additionally, LIN conformance test equations to verify LIN device driver are derived with timing constraints of the parameters. The proposed model equation and simulation method are validated with a result that is measured at real LIN based network system.

The Efficiency Design & MAC Function of the Composition Optical Network (광통신망 구축의 효과적인 설계 및 MAC고려 요소)

  • 하창국
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.41-47
    • /
    • 2001
  • The paper describes SR3 (Synchronous Round Robin with Reservations), a collision-free medium access control protocol for all-optical slotted packet networks based on WDM multi-channel ring topologies where nodes are equipped with one fixed-wavelength receiver and one wavelength-tunable transmitter SR3 is derived from the SRR and MMR protocols previously proposed by the same authors for the same class of all-optical networks. SRR and MMR already achieve an efficient exploitation of the available bandwidth, while guaranteeing a throughput-fair access to each node. SR3, In addition, allows nodes to reserve slots. thereby achieving a stronger control on access delays; it is thus well suited to meet tight delay requirements, as it is the case for multimedia applications. Simulation results show that SR3 provides very good performance to guaranteed qualify traffic, but also brings signigicant performance improvements for best-effort traffic. Energy effciency is an important issue for optical network since they must rely on their batteries. We present a novel MAC protocol that achieves a good energy efficiency of optical interface of the network and provides support for diverse traffic types and QoS. The scheduler of the base station is responsible to provide the required QoS to connections on the optical link and to minimise the amount of energy spend by the High speed Network. The main principles of the MaC protocol are to avoid unsuccessful actions, minimise the number of transitions , and synchronise the mobile and the base-station. We will show that considerable amounts of energy can be saved using these principles.

  • PDF

Protocol-independent Information Modeling and Web Services Implementation for Resource Management in NGN Transport Stratum (NGN 전송 층의 자원 관리를 위한 프로토콜 중립적인 정보 모델링과 웹 서비스 구현)

  • Yim, Young-Eun;Kwon, Tae-Hyun;Kim, Choon-Hee;Han, Tae-Man;Jeong, You-Hyeon;Cha, Young-Wook
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.453-462
    • /
    • 2007
  • NGN is a packet-based converged network to support session and non-session based services in QoS-enabled broadband transport technologies. Resource and admission control functions(RACF) of NGN have been considering COPS and SNMP as resource management protocols to collect network topology and resource status information of transport network. This paper defines requirements of resource management in NGN transport network, and proposes protocol independent information model to keep consistency of data models of each resource management protocol. Based on this information model described with UML class diagram, we designed and implemented NGN resource management system on Web Services.

Design Methodology of Networked Control System using CAN(Controller Area Network) Protocol (CAN(Controller Area Network) 프로토콜을 이용한 네트워크 제어시스템 설계)

  • Jung, Joon-Hong;Choi, Soo-Young;Cho, Yong-Seok;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2328-2330
    • /
    • 2003
  • This paper presents a new design methodology of networked control system using CAN(Controller Area Network). Feedback control systems having control loops closed through a network are called networked control systems. We design CAN nodes which can transmit control and monitoring data through network bus and apply these to networked control system design. We analyze the variation of stability property according to network-induced delay and determine a proper sampling period of networked control system that preserves stability performance. The results of the experimental example validate effectiveness of our networked control system.

  • PDF

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.

A study on adaptable configuration protocol for high speed electric railway vehicles (고속전철 차량간 구성변화의 능동적 적응을 위한 통신규약에 관한 연구)

  • Han Jae-Mun;Park Jae-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.204-209
    • /
    • 2003
  • Recently, The TCN(Train Communication Network} as the distributed control systems for electric vehicles, which is the international standard of the intra vehicle communication, actively recognizes variations and supports reconfiguration of the train network when a vehicle is separated or recombined. The technique of reconfiguration to take variety and interoperability of a vehicle constitution is used when the vehicle constitution is changed. At the time, each node making up vehicle network shares the information about the variation of vehicle constitutions and the state of nodes. In the hierarchical TCN structure, an exchange of data becomes available as a work to transmit information between components is performed at the node playing a role of gateway. This paper proposes a protocol to transmit the information of the train reconfiguration. The protocol gives an application to renew a list for transmitting information and to perform the transmission that can guarantee periodic and non-periodic data transmission between nodes when the network nodes changed by a variation of the network state are reconfigured. If use this protocol, can use functions that are offered in the electric railcar at the same time that composition of vehicles is completed without delay. And when driver of the electric railcar inspect before running of vehicles, can confirm state of vehicles visually through monitor in driver's room.

  • PDF