• Title/Summary/Keyword: Application protocol

Search Result 1,516, Processing Time 0.031 seconds

A STUDY FOR RFID APPLICATION OF CONSTRUCTION MATERIALS

  • Choong-Han Han ;Ki-Bum Ju
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1155-1160
    • /
    • 2009
  • The trend in construction industry, now, lies in improving efficiency and competitive power in construction management and on-the-spot instruction by combining with new IT technology. Above all, it is safe to say that the application of RFID technology can play a pivotal role at this point, but it is not that easy to apply RFID due to the physical, chemical and environmental peculiarities of construction materials. Thus, a study on the standardization of the usable frequency, specifications, protocol, and package administration is required. This study, as part of the study on the standardization, figured out the restrictions by attaching the existing RFID Tag to the construction materials, turned out the prototype of RFID Tag to perform a field test. In result the effective recognition range varies according to the physical and environmental peculiarities of construction materials; and the management efficiency varies as the attaching method and/or applying method. To analyze the management method (media, process etc.) systematically for the existing construction materials; to prepare more various restrictions and its solutions for practical construction spots will be the key for successful RFID implementation.

  • PDF

Design and Implementation of MPλS Simulator based on ns-2 Network Simulator (ns-2 네트워크 시뮬레이터 기반의 MPλS 시뮬레이터의 설계 및 구현)

  • 서선영;이봉환;황선태;윤찬현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.119-128
    • /
    • 2003
  • The rapid increase of Internet users, diversity of application services, high speed data transmission, and extension of application areas have resulted in exponential growth of Internet traffic. In order to satisfy the increasing demand of bandwidth, the MPλS protocol, which is based on MPLS for efficient integration of WDM and IP protocols, has been suggested by IETF. In this paper, we present an MPλS simulator which enables to simulate various MPλS function such as optical crossconnect (OXC), multi-wavelength links, routing and wavelength assignment(RWA), and MPλS signaling and control. The simulator is developed based on the ns-2, an widely used multi-protocol network simulator. The function of the simulator is validated by running many simulation based on various scenarios and performance measures such as throughput and blocking probability. The simulator could be widely utilized for validation of proposed protocols before developing real optical network systems.

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.

Security Model of Smart Contract Based Private BlockChain Using Commitment Scheme (커미트먼트 스킴을 응용한 사설 블록체인 기반 스마트 컨트랙트의 보안 모델)

  • Kim, Young Soo;Park, Young-Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.620-627
    • /
    • 2018
  • With the widespread adoption of blockchain in the field of business, the importance of confidentiality of critical information has been emerging. Although blockchain models solve the security problem regarding integrity threat by sharing transactions and making them public, it is vulnerable in terms of confidentiality. Therefore, a security mechanism to provide confidentiality of critical information and private information of a firm is necessary to utilize block chain in the process of work. In order to solve the problem, we suggest Private blockchain based cryptographic protocol application model using Smart contract commitment scheme of the Ethereum. It can contribute to activation of blockchain services by enabling non-trusted participants to perform businesses through application of smart contract enhanced in terms of confidentiality and integrity to private blockchain.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Rate Control Scheme for Improving Quality of Experience in the CoAP-based Streaming Environment (CoAP 기반의 스트리밍 환경에서 사용자 체감품질 향상을 위한 전송량 조절 기법)

  • Kang, Hyunsoo;Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1296-1306
    • /
    • 2017
  • Recently, as the number of Internet of Things users has increased, IETF (Internet Engineering Task Force) has released the CoAP (Constrained Application Protocol). So Internet of Things have been researched actively. However, existing studies are difficult to adapt to streaming service due to low transmission rate that result from buffer underflow. In other words, one block is transmitted one block to client's one request according to the internet environment of limited resources. The proposed scheme adaptively adjusts the rate of CON(Confirmable) message among all messages for predicting the exact network condition. Based on this, the number of blocks is determined by using buffer occupancy rate and content download rate. Therefore it improves the quality of user experience by mitigating playback interruption. Experimental results show that the proposed scheme solves the buffer underflow problem in Internet of Things streaming environment by controlling transmission rate according to the network condition.

An advanced key distribution mechanism and security protocol to reduce a load of the key management system (키 관리시스템의 부하절감을 위한 향상된 키 분배 메커니즘과 보안프로토콜)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.35-47
    • /
    • 2006
  • In an Ubiquitous Environment, the growth of various services and equipment is forecasted to increase both the multicast users and diverse hacking attacks of the multicast key. Rapid increasing of multicast users and application security protocols reduce the performance of the Central key management system. Accordingly. We propose to elevate the functionality of the key management mechanism for greater efficiency and stability of the multicast services. in this paper The existing key management mechanism comparison and simulation will analyze these problems. We propose the advanced SMKD (Secure Multicast Key Distribution) mechanism application of the small group and key length control new security protocol by methods to solve these problems. The SMKD Model in this paper will help reduce loading the key distribution and encryption execution of a central key management system, and this model can also ensure stability to a central key management system by efficient key management.

  • PDF

Design and Implementation of A VXIbus Device for FFT Analysis (FFT분석을 위한 VWIbus 디바이스의 설계 및 구현)

  • 강민호;노승환;전동근;문대철;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1754-1766
    • /
    • 1993
  • The application of VXIbus system, an Industry standard, is rapidly spreading with its ability to offer the easiness of integration from GPIB and the fast data transmission from VMEbus system. Compared with VXIbus Register Based Device, VXIbus Message Based Device has a drawback In the aspect of speed. But it is possible to utilize high level ASCII commands to control a Message Based Device, therefore system integration is much easier with Message Based Device than with Register Based Device. And, the FFT analyzer is an instrument for signal analysis which can be inexpensively implemented to be fast and have high resolution. Its wide ability of analysis presents numerous application. So, it is necessary to apply VXIbus system to FFT analyzer. In this paper, the implementation of FFT analyzer is performed using a DSP module and by implementing all A/D conversion circuit and a control module which performs VXIbus interface. The device can be controlled by Slot0 Commender which supports VXIbus Shared Memory Protocol through VXIbus.

  • PDF

Development of a .NET-based Explorer Supporting WebDAV (웹데브를 지원하는 닷넷 기반의 탐색기 개발)

  • Jung, Hye-Young;Ahn, Geon-Tae;Park, Yang-Soo;Lee, Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.703-710
    • /
    • 2004
  • WebDAV is a protocol to support collaboration among one or more groups in geographically distant locations through the internet. WebDAV extends the web communication protocol HTTP/1.1 to provide a standard infrastructure for .supporting asynchronous collaboration for various contents across the internet. A WebDAV client uses HTTP requests to perform a renewal and update action to the resources in WebDAY servers. So, it is desirable that the client supports the ability of authoring and version management with a good concurrency control and property management. In this paper, to enhance usability, we developed a .NET-based WebDAV client with a user interface similar to the Windows Explorer. The developed WebDAV client supports easy launching of the authoring application and appropriate lock control for the server resources. In addition, through the functionality of process monitoring, it supports automatic update of the server resources when the modification of the resources are completed by the user. The WebDAY client is a .NET-based application written in the C# language, running on any platform supporting a .NET framework.

Implementation of PC-based education PLC(Power Line-network Communication) control system using Labview (LabView를 이용한 PC기반의 교육용 전력선망 통신 제어시스템 구현)

  • Park, Tae-Jin;Lee, Un-Sun;Lee, Sang-Hee;Lee, Jong-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.730-739
    • /
    • 2013
  • More than 30% of energy in Korea was spent in lighting part and then the consumption level and $CO_2$ emission will be increase from now. In this like situation, control-system construction for street-lamp of a smart grid-based that it has important meaning. Nowadays as a result, as an trying to utilize using Power-line-network communication modem and application a terminal in industrial fields, in this paper, we are want to implement the Power-line-network communication control system of PC-based. Therefore it will be use varied communication test-equipment and tools through the system. For experimentation, using the MODEM was able to use Planet production of based on the ZIC protocol and then the application program use the LabView. The result is primarily focused on equipments control by the PLC, and that we are able to perform each test with PLC equipment for experiment it.