• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.036 seconds

Consensus of Linear Multi-Agent Systems with an Arbitrary Network Delay (임의의 네트워크 지연을 갖는 선형 다개체시스템의 일치)

  • Lee, Sungryul
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.517-522
    • /
    • 2014
  • This paper investigates the consensus problem for linear multi-agent systems with an arbitrary network delay. The sufficient conditions for a state consensus of linear multi-agent systems are provided by using linear matrix inequalities. Moreover, it is shown that under the proposed protocol, the consensus can be achieved even in the presence of an arbitrarily large network delay. Finally, an illustrative example is given in order to show the effectiveness of our design method.

Interoperating Methods of Heterogeneous Networks for Personal Robot System (퍼스널 로봇을 위한 이기종 네트웍 운용 방안)

  • Choo, Seong-Ho;Li, Vitaly;Lee, Jung-Bae;Park, Tai-Kyu;Jang, Ik-Gyu;Jung, Ki-Deok;Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.86-88
    • /
    • 2004
  • Personal Robot System in developing, have a module architecture, each module are connected through variety network system like ethernet, WLAN (802.11), IEEE 1394 (firewire), bluetooth, CAN, or RS-232C. In developing personal robot system. We think that the key of robot performance is interoperablity among modules. Each network protocol are well connected in the view of network system for the interoperability. So we make a bridging architecture that can routing converting, and transporting packets with matching each network's properties. Furthermore, we suggest a advanced design scheme for realtime / non-realtime and control signal (short, requiring hard-realtime) / multimedia data (large, requiring soft-realtime).

  • PDF

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

A Cross-layer Link Adaptive HD Video Transmission Scheme in WiMedia D-MAC based UWB Systems

  • Joo, Yang-Ick
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.12
    • /
    • pp.1464-1474
    • /
    • 2012
  • In this paper, we propose a QoS (Quality of Service)-aware and cooperative resource reservation scheme using cross-layer link adaptation for wireless high definition video transmission through UWB (Ultra Wide Band) network with D-MAC (Distributed Medium Access Control). A wireless high definition video transmission system usually requires stable high throughput even without line-of-sight, e.g., a destination device in another room separated by a wall. Since the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme causes lots of DRP resource reservation conflicts due to failure of beacon detection in wireless channel environment, overall performances of the WiMedia D-MAC can be deteriorated. And the current WiMedia MAC standard has not considered QoS provisioning even though QoS parameters such as a range of service rates are provided to each traffic stream. Therefore, we propose Relay DRP protocol with QoS-based relay node selection criterion, which makes a relay path to avoid DRP resource reservation conflicts and guarantee QoS more stably through cross-layer link adaptation of cooperative relay transmission scheme and is compliant with the current WiMedia D-MAC protocol. Simulation results demonstrate performance improvements of the proposed method for throughput and QoS provisioning.

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.

Security Issue in T-MAC Communication Protocol (T-MAC 통신 프로토콜에서 보안 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4760-4765
    • /
    • 2010
  • Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

An Improved CSMA/CD with Channel Reservation Facility (채널예약기능을 부가한 개선된 CSMA/CD 프로토콜)

  • 이석주;서경룡
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.340-348
    • /
    • 2004
  • In this paper, we proposed an efficient medium access protocol to share single transmission medium for several stations. There are two well known types of medium access protocols: collision allowance and collision avoidance, and each of them is adopted to their own suitable network with advantage. Our proposed protocol have channel reservation facility based on collision allow medium access protocol, CSMA/CD. In a collision, the stations delay collision with generating pseudo collision signal to reserve channel. Then, the collision terminates and the stations, which reserve channel successfully, participate the next competition with higher medium access probability. We show that the proposed protocol reduced collision times and improved utilization of the channel.

  • PDF

Multiple token-based neighbor discovery for directional sensor networks

  • Nagaraju, Shamanth;Gudino, Lucy J.;Sood, Nipun;Chandran, Jasmine G.;Sreejith, V.
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.351-365
    • /
    • 2020
  • Directional sensor networks (DSNs) can significantly improve the performance of a network by employing energy efficient communication protocols. Neighbor discovery is a vital part of medium access control (MAC) and routing protocol, which influences the establishment of communication between neighboring nodes. Neighbor discovery is a challenging task in DSNs due to the limited coverage provided by directional antennas. Furthermore, in these networks, communication can only take place when the beams of the directional antennas are pointed toward each other. In this article, we propose a novel multiple token-based neighbor discovery (MuND) protocol, in which multiple tokens are transmitted based on an area exploration algorithm. The performance of the protocol is evaluated using the Cooja simulator. The simulation results reveal that the proposed MuND protocol achieves lower neighbor discovery latency, with a 100% neighbor discovery ratio, and has a relatively low communication overhead and low energy consumption.

M2M Gateway based on CoAP in SG Environment (SG 환경에서 CoAP 기반 M2M 게이트웨이)

  • Shin, In-Jae;Park, Jee-Won;Lee, Sang-Hoon;Song, Byung-Kwen
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.47-48
    • /
    • 2015
  • As the power system develops rapidly into a smarter and more flexible state, so must the communication technologies that support it. Machine to machine (M2M) communication in Smart Grid environment has been discussed in European Telecommunications Standards Institute (ETSI). The power system is not easily replaceable, due to system replacement cost. The M2M gateway is required in other to improve interoperability in M2M environment. The Distributed Network Protocol 3.0 (DNP3.0) is the most important standard in the SCADA systems for the power. It has been used for device data collection/control in Substation Systems, Distribution Automation System. If the DNP3.0 data model is combined with a set of contemporary web protocols, it can result in a major shift. We selected Constrained Application Protocol (CoAP) based on RESTful as M2M protocol. It is a specialized web transfer protocol for use with constrained nodes and constrained networks. We have used the OPNET Modeler 17.1 in order to verity the SOAP versus CoAP. In this paper, we propose the CoAP-based M2M Gateway to Distribution Automation system using DNP3.0 in Smart Grid Environment.

  • PDF

A Study of Implementation for Internet Printing Protocol (IPP) System (인터넷 인쇄 프로토콜 시스템 구현에 관한 연구)

  • Kim, Soo-Hong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1197-1206
    • /
    • 2003
  • This paper describes the IPP (Internet Printing Protocol), a standard that makes network setup for printers potentially much easier and, not so incidentally, also user can print over the Internet and specifies an implementation of IPP client/server system. It allows the system administrator and operators to control IPP system users and printer devices. The focus of this effort is optimized capabilities the security features for authentication, authorization, and policies, also improved compatibility with existing WP devices. Finally this paper presents conclusions and further researches.