Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.10.263

A Study on The Improvement of Multidisplinary Structure Technique of Ethrnet Network based of PC Serial Communication  

Jin, Hyun-Soo (Div. of Information Communication, Baekseok University)
Publication Information
Journal of Digital Convergence / v.13, no.10, 2015 , pp. 263-269 More about this Journal
Abstract
This paper suggest remote control technic using TCP/IP protocol network after UART serial communication implemented through RS-232 cable to ethernet module. This is multidisplinary signal technique which is PC signal is converted to internet communication signal. Ethernet module is WIZ1000SR. This is gate module which convert RS-232 protocol to TCP/IP protocol. This module convert serial data transmitted serial device to TCP/IP type data, in contrast TCP/IP data received through network converted to serial data transmitted to serial device. This paper propose that the lower subnet internet layer UDP module make the higher speed in control board than TCP/IP signal.
Keywords
Serial Communication; UART; TCP/IP; RS-232; UDP; Multidisplinary convertion signal;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Robert L Grossman, Harinath Sivakumar and S. Bailey,PSockets: The case for application-level network striping for data intensive applications using high speed wide area networks, Supercomputing, IEEE and ACM, 2000.
2 T. Durnigan, Parallel TCP, August 2002.http://www.csm.ornl.gov/-dunigan/netperf/parallel.html
3 International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Technique -RFID for Item Management," March 2003.
4 Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003.
5 Martin Feldhofer, "A proposal for Authentication Protocol in Secutity Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004.
6 Santosh Mahapatra and Xin Yuan,"Load Balancing Mechanism in data Center Networks," IEEE CEWIT 2010.
7 Mohammad Al-Fares Alexander Loukissas, Amin Vahdat."A Scalable, Commodity Data Center Network Architecture," proceedings of SIGCOMM 2008.
8 Joan Daemen, Vincent Rijmen, "AES Proposal: Rijndael ", (http://csrc.nist.gov/encryption/aes/rijndael/Rijindael.pdf)
9 M.jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-196, 2002.
10 J.Zhou, Z.Cao, X.L.Dong, X.D.Lin, "Securingmhealthcare social networks:challenges, Communications, Vol.20, No.4, pp.12-21, 2013.
11 U.Harish, R. Ganesan, "Design and development of secured m-healthcare system", International conference on Advances in Engineering, Science and Management(ICAESM), pp.470-473, 2012.
12 www.ushmmorg/research/doctors/Nuremberg_Code.htm
13 Curphey, Araujo. Web Application Security Assessment Tools, IEEE Security and Privacy archive, Volume 4 Issue 4, pp.32-41, 2006.   DOI   ScienceOn
14 B.Chess, G. McGraw. Static Analysis for Security, IEEE Security & Privacy, pp.79-84, 2004.
15 Mariantonietta La Pilla, Fabio Martinelli, and Daniele Sgandurra. A Survey on Security for Mible Device, IEEE communication Surveys and Tutorials, Vol. PP,Issue 99, pp.1-26, 2012
16 L.Rizzo, "Effective Erasure Codes for Reliable Computer Communication Protocols,"ACM Comp. Comm, Review, vol.27 no2, pp.24-36, April 1997.   DOI
17 P.Ferre, D.Agrafiots, T.K. Chiew, A.R.Nix, and D.R. Bull,"Multimedia Transmission over IEEE 802.1 1g WLANS: Practical Issues and Consideration," ICCE 2007, pp.1-2, Las Vegas. Jan. 2007.