• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.029 seconds

GOOSE Traffic Generator Using Network Emulation (네트워크 에뮬레이션을 이용한 GOOSE 트래픽 발생기)

  • Hwang, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.209-214
    • /
    • 2016
  • IEC 61850 is a protocol used to reduce the cost of design, installation and maintenance of the Substation Automation System. GOOSE traffic used in IEC 61850 plays an important role for control, protection and automation of the substation. This study implemented a GOOSE traffic generator using the emulation function of NS-3 network simulator, by using protocols provided by a network simulator and another protocols provided by real communication equipment. The generated GOOSE traffic was analyzed with Wireshark, and it was found that the traffic was generated exactly as expected. Besides, this study measured the GOOSE traffic delay due to the increase of the number of switches according to network topology. It is expected that the GOOSE traffic generator implemented by this study will be efficiently used when experiments are performed on actual substation environments.

M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering

  • Hong, Daniel W.;Hong, Choong-Seon;Lee, Gil-Haeng
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.733-746
    • /
    • 2005
  • In the context of multi-protocol label switching (MPLS) traffic engineering, this paper proposes a scalable constraintbased shortest path first (CSPF) routing algorithm with multiple QoS metrics. This algorithm, called the multiple constraint-based shortest path first (M_CSPF) algorithm, provides an optimal route for setting up a label switched path (LSP) that meets bandwidth and end-to-end delay constraints. In order to maximize the LSP accommodation probability, we propose a link weight computation algorithm to assign the link weight while taking into account the future traffic load and link interference and adopting the concept of a critical link from the minimum interference routing algorithm. In addition, we propose a bounded order assignment algorithm (BOAA) that assigns the appropriate order to the node and link, taking into account the delay constraint and hop count. In particular, BOAA is designed to achieve fast LSP route computation by pruning any portion of the network topology that exceeds the end-to-end delay constraint in the process of traversing the network topology. To clarify the M_CSPF and the existing CSPF routing algorithms, this paper evaluates them from the perspectives of network resource utilization efficiency, end-to-end quality, LSP rejection probability, and LSP route computation performance under various network topologies and conditions.

  • PDF

Performance Comparison of Transport vs. Network Layer Mobility Management Mechanisms (트랜스포트 계층과 네트워크 계층 이동성 관리 방안들의 성능비고)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.28-37
    • /
    • 2006
  • Recently, transport layer mobility supporting approaches based on SCTP, which is a new standard transport layer protocol, are proposed. In this paper, the handover performance and overheads of these transport layer mobility supporting approaches are compared to those of the traditional network layer mobility supporting approaches. Through the simulation results, it is shown that the handover performance of the transport layer mobility supporting approaches is better or at least similar to that of the plain MIPv6, which is the representative network layer mobility supporting approach. With respect to the amount of control packet, the transport layer approaches impose less overhead than any of the network layer approaches.

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

Application Technology and Development of CAN Fieldbus Modules for Building Automation and Control System (빌딩자동제어시스템용 CAN 필드버스 모듈개발 및 적용기술에 관한 연구)

  • Hong, Won-Pyo;Seo, Young-Duk
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.121-127
    • /
    • 2004
  • The controller area network(CAN) was originally developed to support cheap and rather simple automative applications, However, because of the its performance and low cost, it is also being considered in automated manufacturing and process control environments to interconnect intelligent devices, such as modem sensors and actuators. This paper presents a new application technology of the developed CAN control modules for the automated doors in building automation system Key pad and RF methods are used to open and close the automated door by the slave CAN module with CAN Protocol. BAS application technology of CAN field bus modules is also presented firstly in our nation.

A Study on Linkage Integration Control System Using Power Line Communication(PLC) and Wireless Sensor Network(WSN) (전력선 통신과 무선 센서 네트워크 기술을 이용한 연동 통합제어 시스템에 관한 연구)

  • Ji, Yun-il;Lim, Kang-il;Park, Kyung-sub
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.733-736
    • /
    • 2009
  • Power Line Communication(PLC) is need not additional communication line. So establishment expense is inexpensive and application is simple. Therefore, lower part network of various application field is possible. However, there are high subordinate interference and noise problem on limited transmission data and communication interference element. Wireless Sensor Network(WSN) is need not infrastructure, Self-regulating network architecture of sensor nodes is possible. So at short time, network construction is available. But, power consumption is increased by active sensing for QoS elevation and unnecessary information transmission, low electric power design and necessity of improve protocol are refered to life shortening problem and is studied. In this paper, supplement problem of power line communication and wireless sensor network mutually and because advantage becomes linkage integration control system using synergy effect of two technologies as more restriction be and tries to approach structurally control network that is improved for smooth network environment construction. Honeywell's hybrid sensor network does comparative analysis(benchmarking). Confirm performance elevation proposing teaming of power line communication and wireless sensor network. Through simulation, service delay decreases and confirms that performance elevation.

  • PDF

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.