• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.03 seconds

qPALS: Quality-Aware Synchrony Protocol for Distributed Real-Time Systems

  • Kang, Woochul;Sha, Lui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3361-3377
    • /
    • 2014
  • Synchronous computing models provided by real-time synchrony protocols, such as TTA [1] and PALS [2], greatly simplify the design, implementation, and verification of real-time distributed systems. However, their application to real systems has been limited since their assumptions on underlying systems are hard to satisfy. In particular, most previous real-time synchrony protocols hypothesize the existence of underlying fault tolerant real-time networks. This, however, might not be true in most soft real-time applications. In this paper, we propose a practical approach to a synchrony protocol, called Quality-Aware PALS (qPALS), which provides the benefits of a synchronous computing model in environments where no fault-tolerant real-time network is available. qPALS supports two flexible global synchronization protocols: one tailored for the performance and the other for the correctness of synchronization. Hence, applications can make a negotiation flexibly between performance and correctness. In qPALS, the Quality-of-Service (QoS) on synchronization and consistency is specified in a probabilistic manner, and the specified QoS is supported under dynamic and unpredictable network environments via a control-theoretic approach. Our simulation results show that qPALS supports highly reliable synchronization for critical events while still supporting the efficiency and performance even when the underlying network is not stable.

A ZRP-based Reliable Route Discovery Scheme in Ad-Hoc Networks (애드혹 네트워크에서 ZRP를 기반으로 하는 경로 탐색 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.293-300
    • /
    • 2004
  • Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.

A Media Access Control for Spatial Reuse in Wireless Ad hoc Networks (무선 Ad hoc 네트워크에서의 공간재이용을 위한 매체접근제어프로토콜)

  • Qingxian, Pu;Hwang, Won-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.627-635
    • /
    • 2008
  • Using directional antenna in wireless network can offer many advantages including significant decrease of interference, increase of spatial reuse and possibility of improving network capacity. However, existing 802.11 MAC is designed for use of omni-directional antenna then those advantages can not be shown in that MAC protocol when it uses directional antenna. In this paper, we present a MAC protocol specifically designed for directional antenna to achieve spatial reuse and improve capacity of MAC protocol. Simulation result shows the advantages of our proposal in comparison with existing MAC in terms of end-to-end delay and network throughput.

The Development of Mobile USB Home Control System

  • Kim, Hee-Sun;Kim, Yong-Seok;Lee, Chang-Goo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2155-2158
    • /
    • 2003
  • A term of home automation that was in fashion only a few years ago has not been used any more. Nowadays, We have been used a term of home network or digital home than home automation much. While internet infra is diffused at home, data network corp., communication corp., electric appliance corp. and home automation control system corp. which we did not mind each other particularly constructed consortium, and they have designs on home network market. Also, cellular phone's growth tried home networking by using not only wired internet but also broadband wireless communication. Regardless, many solutions are coming out it is few to be applied to real life because the standard is not determined with the protocol each other. Therefore, we developed home network system using USB(Universal Serial Bus) that has the possibility most in home networking standard. The mobile USB home control system is excellent at expansibility and portability. Also we can complete low cost and stable system using an embedded system.

  • PDF

Reliable Message Routing Protocol for Periodic Messages on Wireless Sensor Networks (무선센서 네트워크에서 주기적 메시지에 대해 신뢰성 있는 메시지 전송을 위한 라우팅 프로토콜)

  • Ngo, Hoai Phong;Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.190-197
    • /
    • 2011
  • In industrial distributed control systems, sensors collect data from the physical environment periodically and transmit them to the actuators, which process the control operations based on the received data. For the effective operation of the control systems, the data transmitted by the sensors has to be delivered to the actuators reliably within the deadline, and if the message reception rate of the actuators becomes lower than a threshold, then the performance of the control systems drops greatly. This paper suggests a message routing protocol to transmit periodic messages reliably in a distributed control system based on wireless sensor networks. For reliable message transmission, the proposed protocol selects a routing path whose end-to-end message reception rate is the highest before transmitting data messages. The proposed protocol has the capability of maintaining a target message reception rate for each flow. To maintain the required target reception rate, each destination monitors the actual message reception rate periodically and transmits a feedback message to the source if it drops below the target reception rate. On receiving the feedback message, the source tries to find a new path which can satisfy the target rate. The performance of the proposed protocol has been evaluated using simulation and compared with other protocols in terms of the message reception rate, the message delay and delay jitter, and so on. The simulation results show that the proposed protocol has a higher message reception rate and comparable message delay and delay jitter to other protocols. The simulation results also show that the proposed protocol has an ability to adapt well to the dynamic network traffic change.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

An Enhanced Wireless TCP protocol based on Explicit Error Notification (에러 보고를 통한 무선 TCP의 성능 향상)

  • 김경희;김낙명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12B
    • /
    • pp.1656-1664
    • /
    • 2001
  • When a packet loss occurs in a communication network operating a TCP protocol, the TCP protocol regards it that the loss has resulted from network congestion. Then the TCP protocol performs congestion control. When it is applied to the wireless network having quite a high BER characteristics, the performance of TCP protocol is degraded very much. In this paper, we propose an Explicit Error Notification(EEN) algorithm to improve the performance of the wireless TCP When a packet loss occurs in the wireless network, the TCP receiver decodes the TCP segment sequence number and the address of the TCP sender and receiver, and then informs the TCP sender of the error in wireless network by sending a NACK. It is to distinguish packets in error from losses of network congestion. In this paper, the performance of the proposed EEN algorithm is analyzed and simulated. In fact, as more errors are corrected, the proposed algorithm shows a larger improvements in performance.

  • PDF

Advanced protocol against MITM attacks in Industrial Control System (산업제어시스템에서의 MITM 공격을 방어하기 위해 개선된 프로토콜)

  • Ko, Moo-seong;Oh, Sang-kyo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1455-1463
    • /
    • 2015
  • If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats. Conventional method is effective to monitor network traffic and detect anomalous patterns, but normal traffic pattern attacks using MITM technique are difficult to be detected. This study analyzes the PROFINET/DCP protocol and weaknesses with the data collected in real industrial control system. And add the authentication data field to secure the protocol, find out the applicability. Improved protocol may prevent the national disaster and defend against MITM attacks.

A Research on the Performance Analysis of SPDY Protocol in Mobile Networks (모바일 환경에서 SPDY 프로토콜의 성능분석에 관한 연구)

  • Kim, Hee-Jung;Yi, Gyu-Sun;Lee, Sung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.43-55
    • /
    • 2014
  • SPDY is the new protocol proposed by Google to complement problems of HTTP(Hypertext Transfer Protocol)/1.1 and to improve web speed. In this paper, we evaluated the performance of SPDY protocol in a variety environment. By this evaluation, we examined the characteristics of the SPDY protocol and compared the differences between the existing protocol and SPDY protocol. And we took a closer look at the Flow Control of SPDY. Through this, we analyzed the problem of SPDY. It improved performance at 3G network environment, but failed to improve performance at high speed WLAN and mobility environments. We also verified that Flow Control does not work well. And finally we proposed directions for improvement of this protocol.

Mapping of QoS Information Elements and Implementation of Rs/Rw Interface Resource Control Protocols in NGN (NGN에서의 QoS 정보요소 매핑 및 Rs/Rw 인터페이스의 자원제어 프로토콜 구현)

  • Jeon, Jin-Su;Kim, Hae-Hyun;Cha, Young-Wook;Kim, Choon-Hee;Jeong, You-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.429-438
    • /
    • 2008
  • NGN is a packet-based converged network to support session and non-session services in QoS-enabled broadband transport network. QoS based resource control must be defined to support differentiated services for various network users in NGN. We designed and implemented DIAMETER protocol as the Rs interface, and also defined mapping rules between DIAMETER information elements and SDP(Session Description Protocol) attributes for QoS based resource control in NGN. We selected and implemented DIAMETER protocol among alternate resource control protocols in ITU-T as the Rw interface because of simple interworking method with Rs interface and adequate AAA functionality. We defined mapping rules of messages and information elements between Rs and Rw interfaces for resource control from a service layer to a transport layer. Based on the mapping rule of QoS information elements and the interworking method between Rs and Rw interfaces, we built up a test-bed that support differentiated delivery services.