• Title/Summary/Keyword: network-based distributed control system

Search Result 285, Processing Time 0.027 seconds

A Study on the Distributed Real-time Mobile Robot System using TCP/IP and Linux (Linux와 TCP/IP를 이용한 분산 실시간 이동로봇 시스템 구현에 관한 연구)

  • 김주민;김홍렬;양광웅;김대원
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.10
    • /
    • pp.789-797
    • /
    • 2003
  • An implementation scheme and some improvements are proposed to adopt public-licensed operating system, Linux and de-facto world-wide network standard, TCP/IP into the field of behavior-based autonomous mobile robots. To demonstrate the needs of scheme and the improvement, an analysis is performed on a server/client communication problem with real time Linux previously proposed, and another analysis is also performed on interactions among TCP/IP communications and the performance of Linux system using them. Implementation of behavior-based control architecture on real time Linux is proposed firstly. Revised task-scheduling schemes are proposed that can enhance the performance of server/client communication among local tasks on a Linux platform. A new method of TCP/IP packet flow handling is proposed that prioritizes TCP/IP software interrupts with aperiodic server mechanism as well. To evaluate the implementation scheme and the proposed improvements, performance enhancements are shown through some simulations.

Design and Evaluation of a Contention-Based High Throughput MAC with Delay Guarantee for Infrastructured IEEE 802.11WLANs

  • Kuo, Yaw-Wen;Tsai, Tung-Lin
    • Journal of Communications and Networks
    • /
    • v.15 no.6
    • /
    • pp.606-613
    • /
    • 2013
  • This paper proposes a complete solution of a contention-based medium access control in wireless local networks to provide station level quality of service guarantees in both downstream and upstream directions. The solution, based on the mature distributed coordination function protocol, includes a new fixed contention window backoff scheme, a tuning procedure to derive the optimal parameters, a super mode to mitigate the downstream bottleneck at the access point, and a simple admission control algorithm. The proposed system guarantees that the probability of the delay bound violation is below a predefined threshold. In addition, high channel utilization can be achieved at the same time. The numerical results show that the system has advantages over the traditional binary exponential backoff scheme, including efficiency and easy configuration.

Optimal Coordination and Penetration of Distributed Generation with Shunt FACTS Using GA/Fuzzy Rules

  • Mahdad, Belkacem;Srairi, Kamel;Bouktir, Tarek
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.1
    • /
    • pp.1-12
    • /
    • 2009
  • In recent years, integration of new distributed generation (DG) technology in distribution networks has become one of the major management concerns for professional engineers. This paper presents a dynamic methodology of optimal allocation and sizing of DG units for a given practical distribution network, so that the cost of active power can be minimized. The approach proposed is based on a combined Genetic/Fuzzy Rules. The genetic algorithm generates and optimizes combinations of distributed power generation for integration into the network in order to minimize power losses, and in second step simple fuzzy rules designs based upon practical expertise rules to control the reactive power of a multi dynamic shunt FACTS Compensator (SVC, STATCOM) in order to improve the system loadability. This proposed approach is implemented with the Matlab program and is applied to small case studies, IEEE 25-Bus and IEEE 30-Bus. The results obtained confirm the effectiveness in sizing and integration of an assigned number of DG units.

Conformance Test Technique for the Electric Power IT Protocol based on TTCN-3 (TTCN-3를 이용한 전력 IT Protocol Conformance Test 기법)

  • Song, Byeong-Kwon;Jang, Yong-Gi;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.373-375
    • /
    • 2008
  • TTCN-3(Testing & Test Control Notation Version 3) defined in EISI(2001) are the standardized test specification and test implementation language of applicable for all kinds of black-box testing for reactive and distributed system, telecom systems, Mobile system, Internet, CORBA based system, java, XML, etc. This paper using the TTCN-3 on an Electric Power IT Protocol DLMS(Device Language Message Specification) standards for the implementation of the device equipment test the suitability of the protocol.

  • PDF

Design an Indexing Structure System Based on Apache Hadoop in Wireless Sensor Network

  • Keo, Kongkea;Chung, Yeongjee
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.45-48
    • /
    • 2013
  • In this paper, we proposed an Indexing Structure System (ISS) based on Apache Hadoop in Wireless Sensor Network (WSN). Nowadays sensors data continuously keep growing that need to control. Data constantly update in order to provide the newest information to users. While data keep growing, data retrieving and storing are face some challenges. So by using the ISS, we can maximize processing quality and minimize data retrieving time. In order to design ISS, Indexing Types have to be defined depend on each sensor type. After identifying, each sensor goes through the Indexing Structure Processing (ISP) in order to be indexed. After ISP, indexed data are streaming and storing in Hadoop Distributed File System (HDFS) across a number of separate machines. Indexed data are split and run by MapReduce tasks. Data are sorted and grouped depend on sensor data object categories. Thus, while users send the requests, all the queries will be filter from sensor data object and managing the task by MapReduce processing framework.

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

Integrated Stochastic Admission Control Policy in Clustered Continuous Media Storage Server (클리스터 기반 연속 미디어 저장 서버에서의 통합형 통계적 승인 제어 기법)

  • Kim, Yeong-Ju;No, Yeong-Uk
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.217-226
    • /
    • 2001
  • In this paper, for continuous media access operations performed by Clustered Continuous Media Storage Server (CCMSS) system, we present the analytical model based on the open queueing network, which considers simultaneously two critical delay factors, the disk I/O and the internal network, in the CCMSS system. And we derive by using the analytical model the stochastic model for the total service delay time in the system. Next, we propose the integrated stochastic admission control model for the CCMSS system, which estimate the maximum number of admittable service requests at the allowable service failure rate by using the derived stochastic model and apply the derived number of requests in the admission control operation. For the performance evaluation of the proposed model, we evaluated the deadline miss rates by means of the previous stochastic model considering only the disk I/O and the propose stochastic model considering the disk I/O and the internal network, and compared the values with the results obtained from the simulation under the real cluster-based distributed media server environment. The evaluation showed that the proposed admission control policy reflects more precisely the delay factors in the CCMSS system.

  • PDF

An Implementation of the Position Controller for Multiple Motors Using CAN (CAN 통신을 이용한 다중모터 위치제어기 구현)

  • Yi, Keon-Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.2
    • /
    • pp.55-60
    • /
    • 2002
  • This paper presents a controller for the multiple DC motors using the CAN(Controller Area Network). The controller has a benefit of reducing the cable connections and making the controller boards compact through the network including expansibility. CAN, among the field buses, is a serial communication methodology which has the physical layer and the data link layer in the ISO's OSI (Open System Interconnect) 7 layered reference model. It provides the user with many powerful features including multi-master functionality and the ability to broadcast / multicast telegrams. When we use a microprocessor chip embedding the CAN function, the system becomes more economical and reliable to react shortly in the data transmission. The controller, we proposed, is composed of two main controllers and a sub controller, which have built with a one-chip microprocessor having CAN function. The sub controller is plugged into the Pentium PC to perform a CAN communication, and connected to the main controllers via the CAN. Main controllers are responsible for controlling two motors respectively. Totally four motors, actuators for the biped robot in our laboratory, are controlled in the experiment. We show that the four motors are controlled properly to actuate the biped robot through the network in real time.

Designing of Smart WAMAC Infra Architecture based on Synchro-Phasor (Synchro-Phasor 기반의 Smart WAMAC 인프라 아키텍쳐 설계)

  • Kim, Ji-Young;Woo, Doug-Je;Kim, Sang-Tae;Choi, Mi-Hwa;Kim, Yong-Kwang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.9
    • /
    • pp.1549-1559
    • /
    • 2010
  • Modern power system is operated and managed in closed network environment with treating a great variety of data, and requirement of real time power system data is more increasing. However, it is difficult for operators to fast evaluate the condition of power system using only isolation network system such as SCADA or EMS regarding unexpecting situations occurring. Recent technology achievement in areas of distributed computing, networking high speed communications and digital control as well as the availability of accurate GPS time source are rapidly becoming the enabling factors for the development of a new generation of real time power grid monitoring tools. In this paper, architecture of WAMAC which is the wide area monitoring and control system not only to control but also to monitoring in real time is proposed and the plan of integration interface with legacy system such as EMS for providing power system analysis base data effectively is suggested.

An Controller Area Network(CAN) Application for Humanoid Robot (휴머노이드 로봇에 대한 CAN 적용)

  • Ku, Ja-Bong;Huh, Uk-Youl;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2400-2402
    • /
    • 2004
  • The Controller Area Network (CAN) is being widely used in real-time control applications such as automobiles, aircraft, and automated factories. Unfortunately, CAN, in its current form, is not able to either share out the system bandwidth among the different devices fairly or to grant an upper bound on the transmission times experienced by the nodes connected to the communication medium as it happens, for instance, in the token-based networks. In this paper, we present the message scheduling for CAN, based on the distributed control scheme to integrate actuators and sensors in a humanoid robot. Besides introducing the new algorithm, this paper also presents some performance figures obtained using a specially developed software simulator, while the behavior of the new algorithm is compared with the traditional CAN systems, in order to see how effective they are.

  • PDF