• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.035 seconds

Design of a bluetooth-based interactive control network

  • Kwak, Jae-Hyuk;Lim, Joon-Hong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.922-925
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connection of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments. The bluetooth system supports both point-to-point connection and point-to-multipoint connections. In point-to-multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There is one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The Bluetooth standard has been suggested that Bluetooth equipments can be used in the short-range, maximum 100 meters . It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

  • PDF

TCP Performance Enhancement over the Wireless Networks by Using CPC and ZWSC (CPC와 ZWSC를 이용한 무선 망에서의 TCP 성능 향상 방안)

  • Lee, Myung-Sub;Park, Young-Min;Chang, Joo-Seok;Park, Chang-Hyeon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • With the original Transmission Control Protocol(TCP) design, which is particularly targeted at the wired networks, a packet loss is assumed to be caused by the network congestion. In the wireless environment where the chances to lose packets due to transmission bit errors are not negligible, though, this assumption may result in unnecessary TCP performance degradation. In these days, many papers describe about wireless-TCP which has suggested how to avoid congestion control when packet loss over the wireless network. In this paper, an enhancement scheme is proposed by modifying SNOOP scheme. To enhance the original SNOOP scheme, CPC(Consecutive Packet Control) and ZWSC(Zero Window Size Control) are added. The invocation of congestion control mechanism is now minimized by knowing the cause of packet loss. We use simulation to compare the overhead and the performance of the proposed schemes, and to show that the proposed schemes improve the TCP performance compares to SNOOP by knowing the cause of packet loss at the base station.

  • PDF

Routing Protocol for Wireless Sensor Network Considering Data Transmission Stability and Load Quantity (선형적 데이터 전달의 안정성과 부하량을 고려한 무선 센서 네트워크 라우팅 프로토콜)

  • Hwang, Min;Cheon, Seung-Hwan;You, Jin-Ho;Kien, Nguyen Trung;Lee, Guee-Sang
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.111-119
    • /
    • 2007
  • Sensor networks are needed for special purposes such as collecting or transmitting information by using sensor devices, for which various routing protocols have been proposed. Among existing protocols, the modified PEGASIS routing technique is known to be effective when applied to cases with directional transmissions of data. However it does not consider recovery from errors or guaranteeing stability in data transmission, while sensor devices performing repetitive relays and controls are prone to errors. In this paper, a double relay routing protocol for Zigbee based sensor networks where data are transfered reliably with a linear direction. The proposed protocol is effective in the sense that it secures the relaible transmission of data with minimal energy consumption based on a directional data transfer. A streetlight control system has been presented as an application of the proposed protocol.

Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks

  • Hussain, Abid;Saqib, Nazar Abbas;Qamar, Usman;Zia, Muhammad;Mahmood, Hassan
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.397-406
    • /
    • 2014
  • Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore, the vulnerabilities of wireless networks must be studied. In this study, we investigate a particular type of RF jamming that exploits the semantics of physical (PHY) and medium access control (MAC) layer protocols. This can be extended to any wireless communication network whose protocol characteristics and operating frequencies are known to the attacker. We propose two efficient jamming techniques: A low-data-rate random jamming and a shot-noise based protocol-aware RF jamming. Both techniques use shot-noise pulses to disrupt ongoing transmission ensuring they are energy efficient, and they significantly reduce the detection probability of the jammer. Further, we derived the tight upper bound on the duration and the number of shot-noise pulses for Wi-Fi, GSM, and WiMax networks. The proposed model takes consider the channel access mechanism employed at the MAC layer, data transmission rate, PHY/MAC layer modulation and channel coding schemes. Moreover, we analyze the effect of different packet sizes on the proposed jamming methodologies. The proposed jamming attack models have been experimentally evaluated for 802.11b networks on an actual testbed environment by transmitting data packets of varying sizes. The achieved results clearly demonstrate a considerable increase in the overall jamming efficiency of the proposed protocol-aware jammer in terms of packet delivery ratio, energy expenditure and detection probabilities over contemporary jamming methods provided in the literature.

Ship Ad-hoc Communication (SAC) Protocol for SANETs (선박용 애드혹 네트워크를 위한 Ship Ad-hoc Communication 프로토콜)

  • Yun, Chang-Ho;Kim, Seung-Gun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.906-912
    • /
    • 2012
  • A ship ad-hoc network (SANET) can provide ships with diverse multimedia services by replacing expensive satellite communications. While ITU-R M. 1842-1, standards for maritime VHF band digital communications, can be used as the specifications of physical layer for SANETs, no standards are specified for higher layers of SANETs. In this paper, we propose a ship ad-hoc communication (SAC) protocol for SANETs, based on medium access control (MAC) and routing protocols for terrestrial ad-hoc networks. SAC protocol is a cross-layer protocol which combines MAC and routing into one algorithm and considers maritime environments, including the existence of neighboring ships, the possibility of routing to a destination, and changing the communication mode in case of VHF channel failure.

A Study on the Implementation of the Multi-Process Structured ISDN Terminal Adaptor for Sending the Ultra Sound Medical Images (다중처리 구조를 갖는 초음파 의료영상 전송용 ISDN(Integrated Services Digital Network) TA(Terminal Adaptor) 구현에 관한 연구)

  • 남상규;이영후
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.317-324
    • /
    • 1994
  • This paper proposed a new method in the implementation of ISDN (integrated services digital network) LAPD (link access procedure on the D-channel) and LAPB (link access procedure on the B-channel) protocols. The proposed method in this paper implement ISDW LAPD protocol through multi-tasking operating system and adopt a kernel part that is changed operating system to target board. The features of implemented system are (1) the para.llel processing of the events generated at each layer, as follows (2) the supporting necessary timers for the implementation of ISDW LAPD protocol from the kernel part by using software, (3) the recommanded SAP (Service Access Point) from CCITT was composed by using port function in the operating system. With the proposed method, the protocols of ISDH layerl, layer2 and layer3 (call control) were implemented by using the kernel part and related tests were carried out by connecting the ISDH terminal simulator to ISDN S-interface system using the ISDN LAPD protocol The results showed that ISDW S-interface terminals could be discriminated by TEI (Terminal Equipment Identifier) assignment in layer 2 (LAPD) and the message transmission of layer 3 was verified by establishing the multi-frame transmission and then through the path established by the LAPD protocol, a user data was tranfered and received on B-channel with LAPB protocol Thererfore, as new efficient ISDN S-interface environment was implemented in the thesis, it was verified that the implemented system can be utilized by connecting ISDW in the future to transfer a medical image data.

  • PDF

Performance Analysis of NTT/BT Protocol (NTT/BT 프로토콜의 성능 분석)

  • 이창훈;백상엽;이동주
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.99-123
    • /
    • 1997
  • Performance analysis of NTT/BT protocol is investigated, which is a GFC (Generic Flow Control) ptotocol in ATM (Asynchronous Transfer Mode ) network and is based on cyclic reset mechanism. THe mean cell delay time is proposed as a performance measure of NTT/BT protocol. The mean cell delay time is defined as the duration from the instant the cell arrives at the transmission buffer until the cell is fully transmitted. The process of cell transmission can be described as a single server queueing modle with two dependent services. By utilizing this model, mean cell delay time is obtained and sensitivity of the factors such as window size and reset period is also analysed.

  • PDF

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF

A Study on the implementation of PLCP sublayer for Frequency Hopping Wireless LAN (주파수 호핑방식 무선 LAN을 위한 PLCP 부계층 프로토콜 기능 구현 연구)

  • 이선희;기장근
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.837-840
    • /
    • 1999
  • In this paper, we design and verify the hardware circuit that performs PLCP(Physical Layer Convergence Protocol) protocol functions of physical layer in IEEE 802.11 frequency hopping WLAN(Wireless Local Area Network). Altera MAX+PLUS I $I^{〔1〕}$ is used as a design tool. The designed circuit consists of control register module to interface with upper layer, FIFO module to transmit/receive data with upper layer, TX function module, and RX function module. It is verified that the developed circuit conforms well to the IEEE 802.11 standard specification and can support both 1Mbps and 2 Mbps transmission rate by simulation. The developed circuits can be utilized for the implementation of protocol processor in wireless LAN areas.

  • PDF

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.