• Title/Summary/Keyword: protocol architecture

Search Result 796, Processing Time 0.033 seconds

QoS-enabled Next Generation Local Area Network for IP-based Convergence Services (IP 기반 통합서비스를 위한 QoS 가능 차세대 LAN)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2166-2172
    • /
    • 2006
  • This paper presents a quality-of-service-enabled next generation local area network architecture which can provide efficiently convergence services over the Internet protocol. The basic concept of the architecture is to combine such three principle technologies as programmable switched network quality-of-service resource management and Internet protocol based network convergence. We discuss system entities and technologies development, which constitute the proposed network. The architecture of the network is then described. Implementation of systems verifies the proposed technologies. The network as a next generation local area network can provide quality-of-service-enabled real-time communication services as well as existing data traffic, and the open programmable interface can facilitates to adopt cost-effectively emerging new services or functionalities.

Web-based Building Automation System using Embedded Linux (임베디드 리눅스를 이용한 웹 기반 빌딩자동화시스템)

  • 신은철;이수영;최병욱
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.4
    • /
    • pp.334-340
    • /
    • 2004
  • In this paper, a Web-based management system for the building network is described. A multi-protocol converter based on SoC and embedded Linux is designed. The open source licensing, reliability, and broad hardware support are key reasons for use of embedded Linux in embedded industry. The multi-protocol converter integrates control network of RS-485 and LonWorks devices through TCP/IP protocol for a client with Java applet. The system consists of three-tier architecture, such as a client, a server that is performed on a multi-protocol converter, and control devices. The developed system includes the inverter motor control system with modbus protocol for the RS-485 network. The experiment results show that the multi-protocol converter using embedded Linux is a flexible and effective way to builda Web -based monitoring and control system.

A Study on the Development of Communication Protocol of Electric Power Meter for Remote Reading (원격검침용 전자석 전력량계 통신 프로토콜 개발에 관한 연구)

  • Jang, M.J.;Ryu, Y.H.;Hyun, D.H.;Lee, J.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.04a
    • /
    • pp.69-71
    • /
    • 2001
  • In this paper, we propose a new communication protocol for remote metering in electric power meters, also define necessary functions for it. The new protocol is based on the international metering protocol. IEC 1107, 62056, DNP 3.0. This protocol has 4-layered architecture, which has physical. data link, lower application, and upper application layers. For each layer, definitions and detailed functions are introduced. The protocol will be used for communication between the meters and the metering computer(or AMR system). KEPCO (Korea Electric Power Corporation) plans to adopt this protocol as a part of a new metering standard for electric power meters.

  • PDF

Hierarchical Ring Extension of NUMA Systems using Snooping Protocol (스누핑 프로토콜을 사용하는 NUMA 시스템의 계층적 링 구조로의 확장)

  • Seong, Hyeon-Jung;Kim, Hyeong-Ho;Jang, Seong-Tae;Jeon, Ju-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1305-1317
    • /
    • 1999
  • NUMA 구조는 원격 메모리에 대한 접근이 불가피한 구조적 특성 때문에 상호 연결망이 성능을 좌우하는 큰 변수가 된다. 기존에 대중적으로 사용되던 버스는 물리적 확장성 및 대역폭에서 대규모 시스템을 구성하는 데 한계를 보인다. 이를 대체하는 고속의 지점간 링크를 사용한 링 구조는 버스가 가지는 확장성 및 대역폭의 한계라는 단점을 개선하였으나, 많은 클러스터가 연결되는 경우에는 전송 지연시간이 증가하는 문제점을 가지고 있다. 본 논문에서는 스누핑 프로토콜이 적용된 링 구조에서 클러스터 개수 증가에 따른 지연시간 증가의 문제점을 보완하기 위해 계층적 링 구조로의 확장을 제안하고, 이 구조에 효과적인 캐쉬 일관성 프로토콜을 설계하였다. 전역 링과 지역 링을 연결하는 브리지는 캐쉬 프로토콜을 관리하며 이 프로토콜에 의해 지역 링의 부하를 줄일 수 있도록 트랜잭션을 필터링하는 역할도 담당함으로써 시스템의 성능을 향상시킨다. probability-driven 시뮬레이터를 통해 계층적 링 구조가 시스템의 성능 및 링 이용률에 미치는 영향을 알아본다. Abstract Since NUMA architecture has to access remote memory, interconnection network performance determines performance of NUMA architecture. Bus, which has been used as popular interconnection network of NUMA, has a limit to build a large-scale system because of limited physical scalability and bandwidth. Ring interconnection network, composed of high-speed point-to-point link, made up for bus's defects of scalability and bandwidth. But, it also has problem of increasing delay as the number of clusters is increased. In this paper, we propose a hierarchical expansion of snoop-based ring architecture in order to overcome ring's defects of increasing delay. And we also design an efficient cache coherence protocol adopted to this architecture. Bridge, which connects local ring and global ring, maintains cache coherence protocol and does snoop-filtering which reduces local ring and cluster bus utilization. Therefore bridge can improve performance of this system. We analyze effects of hierarchical architecture on the performance of system and utilization of point-to-point links using probability-driven simulator.

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

A Study on Direct Cache-to-Cache Transfer for Hybrid Cache Architecture to Reduce Write Operations (쓰기 횟수 감소를 위한 하이브리드 캐시 구조에서의 캐시간 직접 전송 기법에 대한 연구)

  • Juhee Choi
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.1
    • /
    • pp.65-70
    • /
    • 2024
  • Direct cache-to-cache transfer has been studied to reduce the latency and bandwidth consumption related to the shared data in multiprocessor system. Even though these studies lead to meaningful results, they assume that caches consist of SRAM. For example, if the system employs the non-volatile memory, the one of the most important parts to consider is to decrease the number of write operations. This paper proposes a hybrid write avoidance cache coherence protocol that considers the hybrid cache architecture. A new state is added to finely control what is stored in the non-volatile memory area, and experimental results showed that the number of writes was reduced by about 36% compared to the existing schemes.

  • PDF

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

MAP Scenarios and Protocol Stack in IMT-2000 MSC (IMT-2000 MSC MAP 시나리오 및 프로토콜 스택)

  • 박현화
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.257-260
    • /
    • 1998
  • In this paper, we describe an IMT-2000 system architecture, a protocol stack, and basic MAP scenarios(e.g., registration, call delivery) based on the IS-41 and IS-41 and IS-751. This paper focuses on the MAP scenarios to support the IMSI which is defined for the global roaming between GSM and IS-41 Networks through the Family of System approach. This paper also deals with the design of the MAP protocol stack transported over the ATM networks and introduces the software structure of MAP in IMT-2000 MSC.

  • PDF

A Trust Management Architecture for TLS

  • Xiaolei Zhang;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.778-780
    • /
    • 2002
  • The TLS protocol suite, which provides transport-layer security far the Internet, has been standardized in the IETF. A TLS session is an association between a client and a server, created by the TLS handshake Protocol. Sessions define a set of cryptographic securi쇼 parameters, which can be shared among multiple connections. The TLS protocol, however, does not address the specific method fur how to manage the existing TLS sessions on the host. This paper proposes an efficient management scheme TLS, based on the principles of trust management.

  • PDF