• 제목/요약/키워드: CAN Protocol

검색결과 4,433건 처리시간 0.027초

모드 선택을 이용한 효율적 클러스터링 프로토콜 (An Efficient Clustering Protocol with Mode Selection)

  • 아리스쿠스다요노;이영한;이영오
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.925-928
    • /
    • 2010
  • 무선 센서 네트워크는 제한된 에너지 자원을 갖는 많은 수의 센서 노드로 구성되어 있다. 제약된 에너지로 인해 정보를 효율적으로 수집하는 것은 무선 센서 네트워크의 중요한 문제이며 클러스터링 알고리즘 기술이 에너지 소비를 줄이기 위해 사용된다. 이러한 기법은 무선 네트워크의 확장성 및 수명을 향상시킬 수 있다. 본 논문에서는 무선 센서 네트워크를 위한 CPMS 클러스터링 프로토콜을 제안한다. CPMS 는 BCDCP(Base Station Controlled Dynamic Clustering Protocol) 나 BIDRP(Base Station Initiated Dynamic Routing Protocol)에 비해 우수한 성능을 보인다. CPMS 는 클러스터를 구성하고 잔존 에너지 비율이 높은 헤드 노드가 BS(BaseStation)로 데이터를 전송하게 한다. 또한 이 기법은 모드 선택 기법을 통하여 헤드 노드의 에너지를 절약할 수 있다. 시뮬레이션 결과 CPMS 는 현재의 클러스터링 기법보다 생존시간 및 메시지 전송량에서 우수한 성능을 보여준다.

Controller Area Network(CAN) 통신 프로토콜에 의한 자동차 신호 및 센서 제어 시스템의 개발 (A System Development for Car Signal and Sensor Control with Controller Area Network (CAN) Communication Protocol)

  • 정차근
    • 융합신호처리학회논문지
    • /
    • 제3권3호
    • /
    • pp.54-62
    • /
    • 2002
  • 본 논문에서는 최근 급속히 진전되고 있는 자동차의 각종 전기신호와 센서 입·출력의 통합제어를 위한 CAN 통신 시스템의 개발에 관해서 기술한다. 본 논문에서 제시하는 CAN 통신을 사용한 통합제어 시스템은 기존의 Wiring Harness (W/H)에 의한 제어기 구성의 문제점인 낮은 신뢰성과 시스템 구성의 비효율성을 개선할 수 있고, 다중화 네트워크에 의한 유니트별 독립적인 제어가 가능함으로 성능향상과 기능확대에 유연하게 대응할 수 있는 특징을 갖는다. 제안 시스템은 성능향상과 함께 높은 신뢰성으로 센서 입·출력의 각종 기능을 통합해서 자동차 신호를 제어 할 수 있는 새로운 통합 시스템의 하나이다. 제안 시스템의 성능을 확인하기 위해, 관련 하드웨어와 프로그램을 개발하고 실제 시스템을 구현해서 그 효율성을 입증한다. 이를 위해 CAN 통신 프로토콜의 특징을 간단히 기술하고, 이를 이용한 차량의 각종 전기신호와 센서들의 통합제어를 수행하는 개발된 하드웨어와 프로그램을 제시한다. CAN 통신의 높은 신뢰성과 각종 신호의 효율적인 제어가 가능함으로 제안된 시스템은 향후 자동 전자제어화에 중요한 모듈이 될 것이다.

  • PDF

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권5호
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF

고속 광통신망에서 스위칭 오버헤드를 고려한 동적 전송 예약 프로토콜 (A dynamic transmission reservation protocol with non-zero tunig delay for high-speed mutliwavelength networks)

  • 최형윤;이호숙;김영천
    • 전자공학회논문지S
    • /
    • 제34S권5호
    • /
    • pp.25-34
    • /
    • 1997
  • Relatively slow tuning speed of optical device causes the unwanted delay in high speed single-hop multiwavelength networks. To lessen the overhead, we present a channel access protocol with dynamjic message scheduling. Th eframe structure of proposed protocol adopts hybrid multiaccess scheme in which WDMA is used as a basic multiaccess technique and TDMA is used to provide subchannels within a wavelength band. This architecture has two merits : the network extention is not limited by available number of wavelengths, and the transmission delay caused by optical device tuning time can to minimize the number of tunings. It schedules messages that require same wavelength channels sequencely, so the total transmission delay is reduced by decreasement of wavelength changes. The performance of proposed protocol is evaluated through numerical analysis based on probability and queueing theory. The peformance of proposed protocol is evaluated through numerical analysis based on probability and queueing theory. The numeric results show that the peformance of proposed protocol is better than that of previous one.

  • PDF

Home Network Control Protocol for Networked Home Appliances and Its Application

  • Lee Jae-Min;Myoung Kwan-Joo;Kim Dong-Sung;Kwon Wook-Hyun;Ko Beom-Seog;Kim Young-Man;Kim Yo-Hee
    • 정보통신설비학회논문지
    • /
    • 제1권1호
    • /
    • pp.26-39
    • /
    • 2002
  • This paper describes design and implementation of home network control protocol for networked home appliances. The proposed network protocol has four-layered protocol structure and device-modem interface structure for the flexibility of modems based on power line communication. The standard message set is specified to guarantee the interoperability between various home appliances The proposed protocol can be easily implemented because it has minimum network overhead.

  • PDF

RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘 (Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol)

  • 이재동
    • 한국멀티미디어학회논문지
    • /
    • 제18권6호
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

음성 및 화상 데이타 전송을 위한 트랜스포트 프로토콜의 설계 및 구현에 관한 연구 (A study on the design and implementation of the transport protocol for Audio/Video data transmission)

  • 김준;이광휘;안순신
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1987년도 전기.전자공학 학술대회 논문집(II)
    • /
    • pp.1053-1057
    • /
    • 1987
  • In this paper, we have studied a communication protocol which may provide Audio/Video data transmission in real time. Auido/Video data have its own characteristics. A new transport protocol with realtime constraint has been designed and implemented which performs dynamic error control and flow control depending on the characteristics of transmitted Audio/Video data. Since the receiving data can be predicted from the previously received data using the prediction function in Auido/Video data transmission, these functions are introduced in our transport protocol that may possibly improve the speed of data transmission and give a real time response. We have tested our transport protocol and measured the performance by the simulation. We assume that our transport protocol would be used in LAN environment. Our prime purpose is to provide a reliable and real time Auido/Video data transmission service.

  • PDF

Protocol Behaviors for Multipeer Multimedia Communications

  • Kim, Yong-Woon
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 1998년도 추계종합학술대회
    • /
    • pp.450-455
    • /
    • 1998
  • This paper proposes an enhanced transport protocol for multipeer communications. It is assumed that there exists a transport connection owner that takes the roles of the establishment, management and termination of a transport connection. The proposed protocol classifies the data transfer type into simplex, duplex and N-plex multicasts and provides several transport services to support various requirements in group communications. The general operations and reliability controls of each transfer type are different from one another and carried out by a shared control tree. The QoS negotiation is performed during the creation phase. The notification of negotiated values is followed by an acknowledgment procedure for confirmation. The four-way handshake is introduced. After negotiation, such a resource reservation protocol as RSVP can reserve system and network resources according to the arbitrated values. This paper suggests a conceptual model of the transport layer and its protocol behaviors over the IP multicast and RSVP network.

  • PDF

BACnet/IP 프로토콜에서 결함허용 BBMD 기능 구현 및 실험적 검증 (Implementation and Experimental evaluation of Fault Tolerant BBMD in the BACnet/IP Protocol)

  • 조수운;홍승호
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제55권12호
    • /
    • pp.534-543
    • /
    • 2006
  • BACnet(Building Automation and Control networks) is a standard data communication network protocol designed specifically for building automation and control systems. BACnet provides BACnet/IP Protocol for data communication through the Internet. BACnet device uses BBMD(BACnet Broadcasting Management Device) to deliver BACnet broadcast messages. In this study, we propose a fault tolerant BBMD in the BACnet/IP protocol. The fault tolerant BBMD improves the connectivity of BACnet/IP networks by inheriting the operation of original BBMD in the networks. The fault tolerant BBMD is implemented with added functions to the original BACnet/IP protocol so that it can provide backward compatibility with the original BACnet/IP devices. We examined the validity of the fault tolerant BBMD using an experimental model.

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks with Multiple Antennas

  • Yang, Jae-Dong;Song, Kyoung-Young;No, Jong-Seon;Shin, Dong-Joan
    • Journal of Communications and Networks
    • /
    • 제13권3호
    • /
    • pp.257-265
    • /
    • 2011
  • In this paper, a cooperative relaying protocol called soft-decision-and-forward (SDF) with multiple antennas in each node is introduced. SDF protocol exploits the soft decision source symbol values from the received signal at the relay node. For orthogonal transmission (OT), orthogonal codes including Alamouti code are used and for non-orthogonal transmission (NT), distributed space-time codes are designed by using a quasi-orthogonal space-time block code. The optimal maximum likelihood (ML) decoders for the proposed protocol with low decoding complexity are proposed. For OT, the ML decoders are derived as symbolwise decoders while for NT, the ML decoders are derived as pairwise decoders. It can be seen through simulations that SDF protocol outperforms AF protocol for both OT and NT.