• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.026 seconds

The Standardization Trend of DCCI (DCCI 표준 기술 동향)

  • Lee, Won-Suk;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.929-932
    • /
    • 2008
  • W3C(World Wide Web Consortium)는 2007년 상반기부터 웹 기술을 PC를 넘어 휴대폰, PDA, 정보가전, 로봇 등 모든 디바이스로 적용이 확대하기 위해 유비쿼터스 웹 응용을 위한 표준 개발을 시작하였다. 이를 담당하고 있는 유비쿼터스 웹 응용 워킹그룹은 탁상용 컴퓨터뿐 아니라 사무용품, 가정 매체 기구, 이동 전화, RFID나 바코드를 포함하는 센서나 이펙터(effector) 등의 유비쿼터스 기기들이 다양하게 흩어져 있는 환경에서 쉽게 웹 응용 개발을 가능하게 하는 표준 개발을 목표로 한다. 본 워킹그룹의 활동의 중요한 표준화 아이템 중의 하나는 Delivery Context: Client Interfaces(DCCI)로 이는 다양한 디바이스들의 기능들의 접근을 위한 표준 인터페이스를 정의하는 것이다. DCCI가 중요한 이유는 현재 웹 환경에서 오픈 API를 이용하여 개발되고 있는 다양한 매쉬업 응용에 GPS와 같은 단말을 기능을 매쉬업을 제공할 수 있는 기반이 되기 때문이다. 본 논문에서는 최근에 W3C의 UWA(Ubiquitous Web Application) WG에서 추진되고 있는 DCCI에 대한 표준화 동향을 설명한다.

  • PDF

Open Tubular Molecular Imprinted Polymer Fabricated in Silica Capillary for the Chiral Recognition of Neutral Enantiomers in Capillary Electrochromatography

  • Yang, Song-Hee;Zaidi, Shabi Abbas;Cheong, Won-Jo;ALOthman, Zeid A.;ALMajid, Abdullah M.
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.5
    • /
    • pp.1664-1668
    • /
    • 2012
  • In this study, we have expanded the applicability of the pre-established generalized preparation protocol to MIPs with a neutral template. The ($4S,5R$hyl-5-phenyl-2-oxazolidinone MIP layer was formed inside a pretreated and silanized fused silica capillary, and its chiral separation performance was examined. Optimization of chiral separation was also carried out. This is the very first report of somewhat successful application of the generalized preparation protocol to a MIP with a genuine neutral template.

A Motion Planning Algorithm for Synchronizing Spatial Trajectories of Multi-Robots (다수 로봇간 공간궤적 동기화를 위한 모션계획 알고리즘)

  • Jeong Young-Do;Kim Sung-Rak;Lee Choong-Dong;Lim Hyun-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.12
    • /
    • pp.1233-1240
    • /
    • 2004
  • Recently the need for cooperative control among robots is increasing in a variety of industrial robot applications. Such a control framework enhances the efficiency of the real robotic assembly environment along with extending the robot application. In this paper, an ethernet-based cooperative control framework was proposed. The cooperative control of robots can multiply the handling capacity of robot system, and make it possible to implement jigless cooperation, due to realization of trajectory-synchronized movement between a master robot and slave robots. Coordinate transformation was used to relate among robots in a common coordinate. An optimized ethernet protocol of HiNet was developed to maximize the speed of communication and to minimize the error of synchronous movement. The proposed algorithm and optimization of network protocol was tested in several class of robots.

Development of LnCP based Home Network System by using high level message between heterogeneous application software

  • Chung, Jong-Hoon;Wang, Dae-Sung;Lee, Sang-Kyun;Han, Sun-Mi;Roh, Young-Hoon;Kang, Min-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.903-907
    • /
    • 2004
  • This paper introduces LnCP(Living Network Control Protocol)-based home network system and proposes high level message which is utilized between LnCP Home network Server and User Control Point. LnCP is very optimized protocol for digital home appliances. Then proposed system and implementation of these ideas are presented.

  • PDF

Design of User Authentication Mechanism based on WPKI

  • Lee Cheoi Seung;Park Do Jun;Shin Myung Souk;Lee Jeong Gi;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.519-523
    • /
    • 2004
  • In this paper we challenge the user Authentication using KerberosV5 authentication protocol in WPKI environment. This paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key based structure and transmission hierarchical security back of a WAP forum, and a server client holds for user authentication of an application layer all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol KerberosV5 and its disadvantages.

  • PDF

Implementation of Global Wireless Data Link using Orbcomm Satellite (오브컴 위성을 이용한 글로벌 무선 데이터 링크 구현)

  • Park Kyu-Won;Lee Myung-Eui
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.183-186
    • /
    • 2004
  • The proposed system in this paper utilizes the SIP and self-defined control protocol to provide global wireless communication over the data link of Orbcomm system. Main processor board connected to Orbcomm communication subscriber is designed to interface with digital I/O and AD/DA convertor for various application of control and .measurement. Hardware system implemented in this paper also includes the function of real-time clock and position report using GPS receiver The experimental result of the proposed global wireless communication system is evaluated via real-time experiments, and we have confirmed it works well according to the protocol designed in this paper.

  • PDF

A study on the Ad-hoc Network Application of Zone Routing Protocol (Zone Routing Protocol의 Ad-hoc네트워크 적용에 관한 연구)

  • Lee Young Roh;Kim Yong-Deuk
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.119-122
    • /
    • 2004
  • This mobile oriented Ad-hoc network yet steps on development level, related issues and standardization are progressing. This paper presented ad-hoc network's overview and overall property, followed by routing scheme that must be setup for communication between each nodes. Among several routing scheme proposed for standardization, ZRP that is foaled by this paper, is hybrid type algorithm, and only includes advantages of others This paper presented running process and implementation method, result that is made from network simulation, shows analysis of each parameter values's change. Each parameters changed with many differences according to Zone radius and communication node's location from simualtion that was performed changing a number of nodes and a velocity of nodes.

  • PDF

Worst-case Delay Analysis of Time-Triggered 802.15.4 for Wireless Industrial Environments

  • Kim, Hyun-Hee;Lee, Kyung-Chang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.3
    • /
    • pp.205-212
    • /
    • 2017
  • This paper focuses on worst-case delay analysis of the time-triggered IEEE 802.15.4 protocol to satisfy the industrial quality-of-service (QoS) performance. The IEEE 802.15.4 protocol is considered to be unsuitable for industrial networks because its medium access control method is contention-based CSMA/CA, which exhibits unstable performance with an unbounded delay distribution under heavy traffic. To avoid these limitations, this paper presents a time-triggered version of the nonbeacon-enabled network of IEEE 802.15.4 that relies on a time division multiplexing access (TDMA) method implemented in the application layer without any modification of specification. The timing analysis of this time-triggered IEEE 802.15.4 was executed, and the worst-case transmission delay was calculated. Based on this analysis, the time-triggered IEEE 802.15.4 is a promising alternative for wireless industrial networking.

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.