• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.028 seconds

A Research of Automotive Embedded System (차량용 임베디드시스템 기술동향)

  • Park, Sang-Hyun;Lee, Chul-Dong
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.243-245
    • /
    • 2009
  • In recent years, a development of automotive embedded systems called Intelligent Vehicle are used for control and communication with CAN protocol. But as various devices and protocols are developed for Vehicle communication and control, it becomes difficult to manage the systems that contain limitation of bandwidth and various control requirement. To solve these problems, we introduce a research of automotive embedded systems which is considered the automotive real time operating system, automotive communications, and control systems.

  • PDF

A New Directionin the Advance of TM/TC System (물관리자동화시스템의 발전방향)

  • 고광돈;여운식
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 1999.10c
    • /
    • pp.99-104
    • /
    • 1999
  • In 2000 FFIA , FIA, RDC are united into new corporation. This corporation will manage rural water with TM/TC(Tele-Monitoring/Tele-Control) system. Most systems which were adopted in TM/TC system were Closed Control System which use exclusive network and protocol . Closed Control System can not support new corporation's requirement in water management system. Therefore, new corporation should adopt Open Control System as standard rural water management system. Open Control System support Fieldbus technology, TCP/IP various protocols, programming model, OPC which is essential to the water management program, and so on.

  • PDF

Implementation of Linux RTAI Open CNC System Based on EtherCAT Network (EtherCAT 네트워크 기반 리눅스 RTAI 개방형 CNC 시스템 구현)

  • Park, Sung-Mun;An, Cheol-Jin;Kim, Hyoungwoo;Yi, Hyun-Chul;Choi, Joon-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.10
    • /
    • pp.977-981
    • /
    • 2015
  • We propose a method for the implementation of an EtherCAT communication bus in a Linux-based open source Computerized Numerical Control (CNC) system. Recently, increasingly more CNC systems support real-time Ethernet protocols such as EtherCAT, which is a high-performance industrial communication protocol. For real-time CNC control over an Ethernet-based protocol, an additional layer driver needs to be implemented between the CNC system and the master of industrial communication protocol. Among the various solutions for the connection layer driver, we employ a Hardware Abstraction Layer (HAL) driver based on Linux. The operation of the implemented CNC system is demonstrated and confirmed by Hal Meter, which is used to observe the pins, signals, or parameters of HAL.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

A MAC Protocol for the Integrated Voice/Data Services in Packet CDMA Network (패킷 CDMA 망에서 음성/데이타 통합 서비스를 위한 MAC 프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.68-75
    • /
    • 2000
  • In this paper, a media access control protocol is proposed for voice/data integrated services in the packet CDMA network, and the performance of the proposed protocol is analyzed. The proposed protocol uses the spreading code sensing and the reservation schemes. This protocol gives higher priority to the delay-sensitive voice traffic than to the data traffic. A voice terminal can reserve an available spreading code during a talkspurt to transmit multiple voice packets. On the other hand, whenever a data packet is generated, the data terminal transmits the packet through one of the available spreading codes that are not used by the voice terminals. In this protocol, the voice packets do not come into collision with the data packets. The numerical results show that this protocol can increase the maximum number of voice terminals. The performance for the data traffic degrades by increasing the voice traffic load because of the low priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

Connection Control Protocol and Parallel Interworking Model for the VB5.2 Interface (VB5.2 인터페이스를 위한 연결 제어 프로토콜과 병렬형 연동 모델)

  • 차영욱;김춘희;한기준
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.2
    • /
    • pp.22-31
    • /
    • 2000
  • The VB5.2 interface of B-lSDN, that is located between an access network and a service node, allows dynamic allocation and release of ATM resources. In this paper, we propose the B-ANCC protocol of the VB5.2 interface to minimize the overall connection setup delay by introducing the access network. The B-ANCC protocol enhances the B-BCC protocol and adopts a parallel interworking function with signaling protocols in the service node. To confirm the correctness of the proposed B-ANCC protocol, we validate it using the automated validation tool, SPIN. We analyze and simulate the sequential interworking model based on the B-BCC protocol and the parallel interworking model based on the B-ANCC protocol, in terms of a connection setup delay and a completion ratio. It is shown that our proposed parallel interworking model with B-ANCC reduces a setup delay and improves a completion ratio compared to the sequential interworking model with B-BCC.

  • PDF

IDENTITY-BASED AAA AUTHENTICATION PROTOCOL

  • Kim Dong-myung;Cho Young-bok;Lee Dong-heui;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.678-682
    • /
    • 2005
  • IETF suggested AAA for safe and reliable user authentication on various network and protocol caused by development in internet and increase in users. Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it still has the weak point against collusion attack or forgery attack. In this thesis, new ID based AAA authentication system is suggested which is safe against collusion attack and forgery attack and reduces arithmetic quantity of mobile nodes with insufficient arithmetic and power performance. In this thesis, cryptological safety and arithmetical efficiency is tested to test the suggested system through comparison and assessment of current systems. Suggested system uses two random numbers to provide stability at authentication of mobile nodes. Also, in terms of power, it provides the advantage of seamless service by reducing authentication executing time by the performance of server through improving efficiency with reduced arithmetic at nodes.

  • PDF

A Study on Network Architecture for Next Generation Optical Internet based DWDM (DWDM 기반의 차세대 광 인터넷 구조에 관한 연구)

  • 배정현;송현수;이재동;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.496-507
    • /
    • 2003
  • Rapidly increasing Internet traffic demands require IP protocol based on high quality networking technology. Accordingy, our Internet has evolved from best-effort service toward differentiated service framework so as to implement QoS as prerequisite to a series of new applications. In addition, it is forecasted that existing transport network will be reorganized into DWDM-based optical Internet sooner or later under the influence of Internet demands for higher bandwidth based on QoS. This study shows a way to an effective implementation in some aspects: QoS implementation on DWDM-based optical Internet network, control protocol, backbone network architecture and switching technology for the Next Generation Internet (NGI).

  • PDF

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

Enhancements of T-REFWA to Mitigate Link Error-Related Degradations in Hybrid Wired/Wireless Networks

  • Nishiyama, Hiraki;Taleb, Tarik;Nemoto, Yoshiaki;Jamalipour, Abbas;Kato, Nei
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.391-400
    • /
    • 2006
  • With the on-going wireless access technologies, the Internet has become accessible anytime anywhere. In wireless networks, link errors significantly degrade the performance of the transmission control protocol (TCP). To cope with this issue, this paper improves the recently-proposed terrestrial REFWA (T-REFWA) scheme by adding a new error recovery mechanism to its original design. In the T-REFWA scheme, senders are acknowledged with appropriate sending rates at which an efficient and fair utilization of network resources can be achieved. As the feedback values are computed independently of link errors, senders can keep transmitting data at high rates even in case of link error occurrences. Using this feature, the proposed error recovery mechanism can achieve high throughput in environments with high bit error rates. The throughput is further improved by disabling the exponential back-off algorithm of TCP so that long idle times are avoided in case of link errors. We show through simulations that the proposed method improves TCP performance in high bit error rates. Compared with several TCP variants, the proposed error recovery scheme exhibits higher link utilization and guarantees system fairness for different bit error rates.