• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.026 seconds

Call Admission Control in Wireless Ad-hoc Networks with Multiple Channels and Radios

  • Ko, Sung-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.4
    • /
    • pp.104-114
    • /
    • 2007
  • In this paper, an Ad-hoc Routing Protocol that works in wireless Ad-hoc communication networks with multiple radios and multiple channels and that controls call admission based on bandwidth measurement is proposed. Unlike the conventional Ad-hoc node with a single radio using a single channel, an Ad-hoc node of the protocol proposed, the MCQosR(Multiple Channel Quality of Service Routing), has multiple radios and uses multiple channels, which allows full duplex transmission between wireless Ad-hoc nodes, and reduces intra interference on the route. Also, a fixed channel only for reception at each node enables the estimation of the available bandwidth, which is used to control the call admission for QoS provision. The performance of the MCQosR was verified by simulation.

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

Impact of Delayed Control Message in AODV Protocol

  • Miao, Haoran;Lee, Ye-Eun;Kim, Ki-Il
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.82-83
    • /
    • 2022
  • Ad-hoc On-demand Distance Vector (AODV), is one of well-designed routing protocols in mobile ad hoc networks. It supports the functionality of node mobility modules through multiple control messages to create and maintain paths for data transfer. Even though a number of studies have been conducted to achieve rapid discovery of paths across the network, but few have focused on impact of control messages. This paper proposes a method to adjust the transmission time of messages used in path recovery according to their individual characteristics. Simulation results show the improved performance of the proposed algorithm rather than traditional AODV routing protocol.

Control of Arago's Disk System using CAN (Controller Area Network) (CAM(Controller Area Network)을 이용한 아라고 원판 시스템 제어)

  • Lee, Won-Moo;Jung, Joon-Hong;Choi, Soo-Young;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2325-2327
    • /
    • 2003
  • This thesis is concerned with the control of Arago's disk system using CAN(Controller Area Network). CAN protocol is used widely for the real time control in networked control systems(NCS). A networked control system using CAN is constructed to perform position control of Arago's disk. The mathematical model, of overall system is derived to design an appropriate controller analytical1y. Various operating points of the Arago's disk system in the real time control are chosen as stable region ($45^{\circ}$), marginal1y stable region($90^{\circ}$) and unstable region($120^{\circ}$), and the experiment for the position control of arago's disk system is done for each operating point. The performance of the suggested NCS is verified by experiments. It is shown that the NCS using CAN has stability and excel1ency in real time control.

  • PDF

Design of Border Surveillance and Control System Based on Wireless Sensor Network (WSN 기반 국경 감시 및 제어 시스템 설계)

  • Hwang, Bo Ram;An, Sun Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.11-14
    • /
    • 2015
  • WSN (Wireless Sensor Network) based on low-power is one of the core technologies in the ubiquitous society. In this paper, we present a border surveillance and control system in WSN environment. The system consists of static sensor node, mobile sensor node, static gateway, mobile gateway, server and mobile application. Mobile applications are divided into user mode and manager mode. So users monitor border surveillance through mobile phone and get information of border network environment without time and space constraints. In manager mode, for the flexible operation of nodes, manager can update to the software remotely and adjust the position of the mobile node. And also we implement a suitable multi-hop routing protocol for scalable low-power sensor nodes and confirm that the system operates well in WSN environment.

Congestion Control of Self-Similar Traffic in Two-way Network (양방향 네트워크에서 자기유사성 트래픽 혼잡 제어)

  • 석경휴;송선희;김철영;나상동
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.295-303
    • /
    • 2004
  • In this Paper, we discuss an active TCP link of unsynchronized transmission mode network in two-way traffic and the Improvement of its traffic patron thorough the network pathway of protocol is shown. This is because the traffic pattern is performed on the basis of existing windows which are distributing information in several periods of time in the way of interfacing LTS control module, which is controlling by an information of exceeding the time limit of feedback loop determined by RTP, with TCP. The simulation to utilize this efficiently is performed with the circumstance of bench mark based on physical modeling of the self-similarity traffic in the performance of TCP. In this paper, we use a methodology to understand and evaluate the effect of change of transmitting protocol in sticks under the condition of the self-similar traffic in two-way network and it is shown that an improvement of congestion control by self-similarity under a heavy condition.

MAX-MIN Flow Control Supporting Dynamic Bandwidth Request of Sessions (세션의 동적 대역폭 요구를 지원하는 최대-최소 흐름제어)

  • Cho, Hyug-Rae;Chong, Song;Jang, Ju-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.8
    • /
    • pp.638-651
    • /
    • 2000
  • When the bandwidth resources in a packet-switched network are shared among sessions by MAX-MIN flow control each session is required to transmit its data into the network subject to the MAX-MIN fair rate which is solely determined by network loadings. This passive behavior of sessions if fact can cause seri-ous QoS(Quality of Service) degradation particularly for real-time multimedia sessions such as video since the rate allocated by the network can mismatch with what is demanded by each session for its QoS. In order to alleviate this problem we extend the concept of MAX-MIN fair bandwidth allocations as follows: Individual bandwidth demands are guaranteed if the network can accommodate them and only the residual network band-width is shared in the MAX-MIN fair sense. On the other hand if sum of the individual bandwidth demands exceeds the network capacity the shortage of the bandwidth is shared by all the sessions by reducing each bandwidth guarantee by the MAX-MIN fair division of the shortage. we present a novel flow control algorithm to achieve this extended MAX-MIN fairness and show that this algorithm can be implemented by the existing ATM ABR service protocol with minor changes. We not only analyze the steady state asymptotic stability and convergence rate of the algorithm by appealing to control theories but also verify its practical performance through simulations in a variety of network scenarios.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

CRP-CMAC: A Priority-Differentiated Cooperative MAC Protocol with Contention Resolution for Multihop Wireless Networks

  • Li, Yayan;Liu, Kai;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2636-2656
    • /
    • 2013
  • To improve the cooperative efficiency of node cooperation and multiple access performance for multihop wireless networks, a priority-differentiated cooperative medium access control protocol with contention resolution (CRP-CMAC) is proposed. In the protocol, the helper selection process is divided into the priority differentiation phase and the contention resolution phase for the helpers with the same priority. A higher priority helper can choose an earlier minislot in the priority differentiation phase to send a busy tone. As a result, the protocol promptly selects all the highest priority helpers. The contention resolution phase of the same priority helpers consists of k round contention resolution procedures. The helpers that had sent the first busy tone and are now sending the longest busy tone can continue to the next round, and then the other helpers that sense the busy tone withdraw from the contention. Therefore, it can select the unique best helper from the highest priority helpers with high probability. A packet piggyback mechanism is also adopted to make the high data rate helper with packet to send transmit its data packets to its recipient without reservation. It can significantly decrease the reservation overhead and effectively improve the cooperation efficiency and channel utilization. Simulation results show that the maximum throughput of CRP-CMAC is 74%, 36.1% and 15% higher than those of the 802.11 DCF, CoopMACA and 2rcMAC protocols in a wireless local area network (WLAN) environment, and 82.6%, 37.6% and 46.3% higher in an ad hoc network environment, respectively.

A Study on Developing the TCP/IP Application Communication Protocol for the Standard Traffic Signal Controller (표준규격 교통신호제어기에서 TCP/IP 통신프로토콜 제정방안 연구)

  • Han, Won-Sub;Hyun, Cheol-Seung;Lee, Ho-Won;Joo, Doo-Hwan;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.71-84
    • /
    • 2009
  • The communication between the center system and the local controller in the Traffic Signal Controller Specification has been specified by a communication line for the exclusive use and the analog modem serial protocol. Therefore, it can't be adapted in the ITS communication network of the TCP/IP protocol being constructed in the local city. The international and domestic ITS device's communication specification has adapted the DATEX-ASN data exchange technique based on the ethernet communication network. So, this study was performed by the purpose of developing the application communication protocol's standard draft based on the TCP/IP communication protocol for the traffic signal controller, to be able to constitute the traffic signal control system in the ITS communication network. The communication format for 23 items of control, status, and database request etc. which are specified in the standard traffic signal controller was developed by appling the DATEX-ASN data interface procedure and structure which are KS ISO X 14827 Part1, 2, ISO/ DIS 15784 Part-3. To test the developed protocol, the application program for the communication items was developed and according to the test result, the encoding and the decoding transection for all communication items was possible.

  • PDF