• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.048 seconds

The Study of MAC protocol for efficient Wireless Sensor Network (Wireless 센서 네트워크를 위한 MAC 프로토콜에 관한 연구)

  • Lee, Woo-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.517-520
    • /
    • 2005
  • Wireless sensor network combines sensing and computing technology which can sense light, temperature, vibration, magnetic field and wind etc, as each purpose of using those. Wireless nodes operate signal processing skill which has proceeded sensed information from the sensor, transmission which makes information reached to observer and limited energy managing skill which is needed on account of using battery to operate wireless. To make responsible measuring and sensing out of them, efficient energy management is so important to maintain life time of network. In this paper, after explaining CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) traditional wireless MAC protocol, and ER-MAC(Energy Rate Medium Access Control) which are not managing resource of hardware but MAN(Medium Access Control), data-link layer out of OSI 7 layer. We would like to analyze those efficiency of power saving comparing with each protocol.

  • PDF

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Design of the residential poorer line communication device based on Softwire Protocol (Softwire Protocol에 기반한 옥내 전력선 통신 장치의 설계)

  • Cho, Sung-Kug;Kim, Dong-Sung;Myoung, Kwan-Joo;Yun, Ji-Hun;Kwon, Wook-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.485-488
    • /
    • 2000
  • This paper proposes to design the residential power line communication device using Softwire Protocol, which targets the device with 8bit micro-controller and small-size memory based on low-rate power line communication network or wireless communication network. As a case study, the SCP message specification of air-conditioner that has capability of control and monitoring its status is designed using Softwire Protocol. And, it is described how the device operates sequentially.

  • PDF

Conformance Test Technique for the Electric Power IT Protocol based on TTCN-3 (TTCN-3를 이용한 전력 IT Protocol Conformance Test 기법)

  • Song, Byeong-Kwon;Jang, Yong-Gi;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.373-375
    • /
    • 2008
  • TTCN-3(Testing & Test Control Notation Version 3) defined in EISI(2001) are the standardized test specification and test implementation language of applicable for all kinds of black-box testing for reactive and distributed system, telecom systems, Mobile system, Internet, CORBA based system, java, XML, etc. This paper using the TTCN-3 on an Electric Power IT Protocol DLMS(Device Language Message Specification) standards for the implementation of the device equipment test the suitability of the protocol.

  • PDF

Extended PCF(EPCF) Mechanism for Wireless LAN MAC (Wireless LAN MAC을 위한 Extended PCF(EPCF) 방법)

  • Lee, Ho-Seok;Suh, Byung-Suhl
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.31-34
    • /
    • 2002
  • There are two kinds of network architectures in the IEEE 802.11:[1] distributed (ad-hoc) or centralized (infrastructure) wireless network. Centralized networks have an access point (base station) that can control the wireless medium access of stations in these networks. The 802.11 MAC protocol of an access point is the same as those of other stations in the contention period. This paper propose a novel MAC protocol of an access point to solve these problems. This MAC protocol adds a new contention-free period called EPCF (Extended PCF) to resolve accumulated data in the queue of an access point. Simulation results show that the new protocol performs better throughput than the 802.11 standard MAC with the less queue memory site requirement.

  • PDF

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

  • Yoo, Dae-Suk;Choi, Seung-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.501-510
    • /
    • 2010
  • Wireless sensor networks consist of sensor nodes which are expected to be battery-powered and are hard to replace or recharge. Thus, reducing the energy consumption of sensor nodes is an important design consideration in wireless sensor networks. For the implementation of an energy-efficient MAC protocol, a Sensor-MAC based on the IEEE 802.11 protocol, which has energy efficient scheduling, has been proposed. In this paper, we propose a Dynamic S-MAC that adapts dynamically to the network-traffic state. The dynamic S-MAC protocol improves the energy consumption of the S-MAC by changing the frame length according to the network-traffic state. Using an NS-2 Simulator, we compare the performance of the Dynamic S-MAC with that of the S-MAC protocol.

Design of a Real-time Monitoring Protocol For Smart Ship-Area Network (지능형 선박용 백본 네트워크 기반에서의 실시간 모니터링 관리 프로토콜 설계)

  • Jung, Min-Young;Tak, Sung-Woo
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1795-1798
    • /
    • 2010
  • 본 논문에서는 TCP/IP (Transmission Control Protocol/Internet Protocol) 기반의 모니터링 및 관리 시스템인 단순 네트워크 관리 프로토콜(SNMP : Simple Network Management Protocol)을 분석하여 모니터링 관리 프로토콜 설계에서 고려되어야 할 요구 사항 및 성능인자를 기술하였다. 또한 선박 네트워크 장치의 장애 및 통신선의 절체와 같은 동시 다발적인 사고로 인한 결손에 효율적으로 대처하기 위한 장애 관리 기능과 앞선 요구사항 및 성능 인자를 고려 하여 선박용 백본 네트워크 기반에서의 실시간 모니터링 관리 프로토콜을 설계 하였다.

Protocol supporting Variable-length Message using Pre-reservation Slots in WDM Local Network (WDM Local Network에서 선예약슬롯을 이용한 가변길이 메시지 지원 프로토콜)

  • Hwang, In-hwan;Shuin, Eui-jung;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.119-124
    • /
    • 2001
  • A new WDM-based protocol for scheduling a variable-length message is proposed in this paper. Two control slots, Pre-reservation slot and Reservation Slot, are used to coordinate transmission and diminish the collisions of packet to minimize the access delay. When there is an idle reservation slot, a control packet is transmitted on that slot and message is transferred. And the node continues to transmit its control packet through the corresponding slot every cycle, until the message is completely transmitted. If an idle reservation slot is not available, the node schedules the transmission time of message in earliest available time using Pre-reservation slots. The proposed scheduling protocol has several advantages; any new node can join the network anytime without network re-initialization. Moreover, with the pre-reservation slots, we can avoid the packet collisions and destination conflicts, and we can improve the access delay time for message transmissions.

  • PDF

Support the IEEE 1588 Standard in A Heterogeneous Distributed Network Environment PTP for Time Synchronization Algorithms Based Application Framework Development Method (IEEE 1588 표준을 지원하는 이기종 분산 네트워크 환경에서 시간 동기화를 위한 PTP 알고리즘 기반의 어플리케이션 프레임워크 개발 기법)

  • Cho, Kyeong Rae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.67-78
    • /
    • 2013
  • In this paper, We proposed an development method of application framework for using the precision time protocol(PTP) based on physical layer devices to synchronize clocks across a network with IEEE1588 capable devices. The algorithm was not designed as a complete solution across all conditions, but is intended to show the feasibility of such a for the PTP(Precision Time Protocol) based on time synchronization of heterogeneous network between devices that support in IEEE 1588 Standard application framework. With synchronization messages per second, the system was able to accurately synchronize across a single heavily loaded switch. we describes a method of synchronization that provides much more accurate synchronization in systems with larger networks. In this paper, using the IEEE 1588 PTP support for object-oriented modeling techniques through the 'application framework development Development(AFDM)' is proposed. The method described attempts to detect minimum delays, or precision packet probe and packet metrics. The method also takes advantage of the Tablet PC(Primary to Secondary) clock control mechanism to separately control clock rate and time corrections, minimizing overshoot or wild swings in the accuracy of the clock. We verifying the performance of PTP Systems through experiments that proposed method.

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF