• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.031 seconds

Implementation of PROFIBUS-DP Master Protocol (ICCAS 2003)

  • Kim, Eui-Seob;Hong, Seung-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1367-1370
    • /
    • 2003
  • PROFIBUS is an open industrial communication network for a wide range of application in manufacturing automation and process control systems. PROFIBUS-DP(Decentralized Peripherals) are mainly used to connect smart automation devices via a fast serial link. PROFIBUS-DP adopts master/slave mechanism for communication service. In this paper, we present an implementation method of the protocol stacks for the master station of PROFIBUS-DP.

  • PDF

A note on the discrete time B/G/1 gated queueing system with vacations

  • Noh, Seung-Jong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1993.04a
    • /
    • pp.49-56
    • /
    • 1993
  • We consider a B/G/1 queueing system with vacations, where the server closes the gate when it begins a vacation. In this system, customers arrive according to a Bernoulli process. The service time and the vacation time follow discrete distributions. We obtain the distribution of the number of customers at a random point in time, and in turn, the distribution of the residence time (queueing time + service time) for a customer. This system finds an application in the performance evaluation of the DQDB protocol which has been adopted as the standard protocol for IEEE 802.6 MAN.

  • PDF

Analysis of an SIP System and Implementation of an User Agent Module (SIP 시스템 분석 및 사용자 에이전트 모듈 구현)

  • 이종열;노강래;김준일;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.283-285
    • /
    • 2002
  • 본 논문에서는 현재 VOIP(Voice Over IP)기술고서 ITU-T의 H.323에 대응되는 텍스트 기반 프로토콜인 SIP(Session Initiation Protocol)를 구현한 오픈 소스인 VOCAL(Vovida Open Communication Application Library) 시스템의 구조를 분석하고 SIP의 시스템을 구성하는 여러 모듈들을 테스트를 통하여 검증하였다. VOCAL의 사용자 에이전트에 RTP(Real-time Transport Protocol ) 포맷의 데이터를 전송/수신할 수 있는 모듈을 구현하고 검증하여, SIP 시스템에서 사용할 수 있는 사용자 에이전트의 활용에 대한 방안을 제시하였다.

  • PDF

The Performance Evaluation and Implementation of Transaction Service on Java-Based WAP (WAP상의 트랜잭션 서비스의 구현 및 성능평가)

  • 임경수;우시남;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.565-567
    • /
    • 2002
  • 인터넷과 무선 이동통신 등이 보편화되면서 두 기술을 접목한 WAP (Wireless Application Protocol)[1]이 등장하였으며, 다수의 사용자 요구를 동시에 효율적으로 처리하면서 다양한 무선 단말기로부터 요청을 신속하게 처리할 수 있는 WAP 게이트웨이(gateway)에 대한 연구가 여러 연구 그룹에서 수행되고 있다. 본 논문에서는 Java의 기본적인 서비스인 멀티쓰레드를 이용하고, 컨테이너 유효 리소스의 효율적 관리를 위해 접속 풀링(connection pooling) 기능과 우선순위 큐를 적용하여 WTP (Wireless Transaction Protocol)[2]를 구현한다. 우선순위에 입각하여 구현된 트랜잭션 서비스를 시뮬레이션을 통하여 성능을 분석한다.

  • PDF

Study of Router Advertisement application plan in IPv6 router (IPv6 라우터에서의 Router Advertisement 적용 방안에 관한 연구)

  • Shin, Young-Soo;Yang, Mi-Jeong;Gang, Yu-Hwa;Kim, Tae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.469-471
    • /
    • 2005
  • Paper searches Neighbor Discovery Protocol's IPv6 address AutoConfiguration function that is IPv6's point technology. Also, I study plan to apply Router Advertisement function to Router. Router is formed whole system by Routing Process Card that do manager and Line Card that take charge of Packet Forwarding. Present plan that embody Router Advertisement function to Line Card.

  • PDF

A study on the network schemes of the home appliance using the CEBus (표준 CEBus를 사용한 가전기기의 제어 방식에 관한 연구)

  • 송원국;이연천;김명식;김용득
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.327-331
    • /
    • 1991
  • This paper deals with the network schemes of the home appliance using the CEBus. Protocol schemes which are based on the OSI 7-layer and CAL application were described. And also it was adapted for microwave oven as case study. As a result, it is shown that it operates well under CEBus protocol with only power line media.

  • PDF

A Study on the Key Distribution Protocol for Secure P2P information Security Service (안전한 P2P 정보보호 서비스를 위한 키 분배 프로토콜에 관한 연구)

  • Lee, Jun Seok
    • Journal of Industrial Convergence
    • /
    • v.6 no.1
    • /
    • pp.57-72
    • /
    • 2008
  • In this study, general outline of P2P(peer to peer) application was analyzed dealing with security attacks and threats on the P2P environment. Information security service was studied to provide secure P2P service under the information threats. This study proposes two methods to provide secure information security service. One is a method to use personal firewall software on the peer. The other is a method to use key distribution protocol for confidentiality and integrity.

  • PDF

The Design and Implementation of the Motorized Valve Control System using CANopen Protocol (CANopen 프로토콜을 이용한 전동밸브 제어시스템 설계 및 구현)

  • Lee, Myung-Eui;Shin, Keun-Soo;Yang, Sung-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.321-327
    • /
    • 2010
  • This paper deals with the design and development of the motorized valve control system using CANopen protocol. The CAN network protocol is used in the physical layer(layer 1) and data link layer(layer 2), and other upper network layer above that layer 1 and 2 utilize the CANopen protocol in this paper. The motorized valve controller is implemented by a PIC microprocessor, and the server application software for the control system user is written in C# language. In particular the CANopen protocol is widely used int the area such as ship automation systems and marine transportation systems. The experimental result of the proposed control system implemented in this paper is evaluated via real-time experiments, which works well as designed.

The Application and Effect of the Nursing Protocol of Pediatric Peripheral Intravenous Infusion (아동의 말초정맥주사 간호프로토콜 적용 및 효과)

  • Choi, Heekang;Kang, Mijung;Kang, Hyunju;Kim, Eunhye
    • Perspectives in Nursing Science
    • /
    • v.14 no.2
    • /
    • pp.45-54
    • /
    • 2017
  • Purpose: The aim of this study was to compare the effect of training and implementation of a pediatric peripheral intravenous infusion protocol on the nurses' performance and infusion complication rate. Methods: A quasiexperimental study using a posttest comparison of a one group pretest-time series design was utilized. This method was developed to measure nursing knowledge and performance based on a pediatric peripheral intravenous infusion protocol. To calculate the occurrence rate of complications, the number of complications were divided into the number of intravenous insertions. Results: It was shown that the training developed by the study team in 2015 contributed to nurses' increased knowledge, as well as improved job performance. Furthermore, the implementation of the protocol revealed that the number of peripheral intravenous insertions, an invasive procedure, decreased. Additionally, the nursing workload related to pediatric intravenous infusions was reduced. Conclusion: This protocol may contribute to the improved scientific quality and efficiency of nursing management of peripheral intravenous infusions.

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.