• Title/Summary/Keyword: CAN network

Search Result 19,494, Processing Time 0.044 seconds

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

A Distributed Communication Model of Intrusion Detection System in Active Network

  • Park, Soo-Young;Park, Sang-Gug
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1577-1580
    • /
    • 2005
  • With remarkable growth of using Internet, attempts to try intrusions on network are now increasing. Intrusion Detection System is a security system which detects and copes illegal intrusions. Especially with increasing dispersive attacks through network, concerns for this Distributed Intrusion Detection are also rising. The previous Intrusion Detection System has difficulty in coping cause it detects intrusions only on particular network and only same segment. About same attacks, system lacks capacity of combining information and related data. Also it lacks cooperations against intrusions. Systematic and general security controls can make it possible to detect intrusions and deal with intrusions and predict. This paper considers Distributed Intrusion Detection preventing attacks and suggests the way sending active packets between nodes safely and performing in corresponding active node certainly. This study suggested improved E-IDS system which prevents service attacks and also studied sending messages safely by encoding. Encoding decreases security attacks in active network. Also described effective ways of dealing intrusions when misuses happens thorough case study. Previous network nodes can't deal with hacking and misuses happened in the middle nodes at all, cause it just encodes ends. With above suggested ideas, problems caused by security services can be improved.

  • PDF

On Finding a Convenient Path in the Hierarchical Road Network

  • Sung, Ki-Seok;Park, Chan-Kyoo;Lee, Sang-Wook;Doh, Seung-Yong;Park, Soon-Dal
    • Management Science and Financial Engineering
    • /
    • v.12 no.2
    • /
    • pp.87-110
    • /
    • 2006
  • In a hierarchical road network, all roads can be classified according to their attributes such as speed limit, number of lanes, etc. By splitting the whole road network into the subnetworks of the highlevel and low-level roads, we can reduce the size of the network to be calculated at once, and find a path in the way that drivers usually adopt when searching out a travel route. To exploit the hierarchical property of road networks, we define a convenient path and propose an algorithm for finding convenient paths. We introduce a parameter indicating the driver's tolerance to the difference between the length of a convenient path and that of a shortest convenient path. From this parameter, we can determine how far we have to search for the entering and exiting gateway. We also propose some techniques for reducing the number of pairs of entries and exits to be searched in a road network. A result of the computational experiment on a real road network is given to show the efficiency of the proposed algorithm.

Development of Green Network Plan Using Bird Habitat Evaluation Model -A Case Study of Seoul, Korea- (조류서식지 평가모형을 이용한 서울시 녹지네트워크 구상)

  • 차수영;박종화
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.4
    • /
    • pp.29-38
    • /
    • 1999
  • Present green space planning of Korea pay little attention to biodiversity conservation in urban areas. The quality of urban wildlife habitat has been deteriorated severely due to fragmentation and isolation of urban open spaces. The application of ecological corridors to urban green space planning and management can greatly enhance the bird habitat of Seoul. The objectives of this study were to evaluate bird habitat potential of existing urban parks of Seoul, and to investigate methods to develop ecological corridors for wild birds. This study consists of three parts. The first part is to construct bird species/habitat relationship model. The second part is to evaluate 207 urban parks of Seoul with the model. Based on the relative potential for bird habitat, urban parks of Seoul can be classified into cores, nodes, and points of the network. Outcomes of this part can also be used to enhance the quality of bird habitats by identifying limits or weakness of existing green spaces for bird habitat. The final part is to develop three green network plans; north-south network, the Han river network, and a district network for Kangnam-Gu.

  • PDF

Method to Verify the Validity of Device in a Home Network (홈 네트워크에서 디바이스의 유효성 검증 방법)

  • Kim Do-Woo;Kim Geon-Woo;Lee Jun-Ho;Han Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1065-1069
    • /
    • 2006
  • With a home network, a device can dynamically join a home network obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.

A visiting scheme of mobile sink system in distributed sensor networks

  • Park, Sang-Joon;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.93-99
    • /
    • 2021
  • The sensor networks should be appropriately designed by applied network purpose, so that they can support proper application functions. Based on the design of suitable network model, the network lifetime can be maximized than using other general strategies which have not the consideration of specific network environments. In this paper, we propose a non-deterministic agent scheme to the mobile sink in distributed wireless sensor networks. The sensor network area can be divided into several sensor regions. Hence, to these such networks, the specified suitable scheme is requested by the applied network model to implement satisfactory network management. In this paper, we theoretically represent the proposed scheme, and provide the evaluation with the simulation results.

Resource Allocation Strategy of Internet of Vehicles Using Reinforcement Learning

  • Xi, Hongqi;Sun, Huijuan
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.443-456
    • /
    • 2022
  • An efficient and reasonable resource allocation strategy can greatly improve the service quality of Internet of Vehicles (IoV). However, most of the current allocation methods have overestimation problem, and it is difficult to provide high-performance IoV network services. To solve this problem, this paper proposes a network resource allocation strategy based on deep learning network model DDQN. Firstly, the method implements the refined modeling of IoV model, including communication model, user layer computing model, edge layer offloading model, mobile model, etc., similar to the actual complex IoV application scenario. Then, the DDQN network model is used to calculate and solve the mathematical model of resource allocation. By decoupling the selection of target Q value action and the calculation of target Q value, the phenomenon of overestimation is avoided. It can provide higher-quality network services and ensure superior computing and processing performance in actual complex scenarios. Finally, simulation results show that the proposed method can maintain the network delay within 65 ms and show excellent network performance in high concurrency and complex scenes with task data volume of 500 kbits.

ON THE STRUCTURE AND LEARNING OF NEURAL-NETWORK-BASED FUZZY LOGIC CONTROL SYSTEMS

  • C.T. Lin;Lee, C.S. George
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.993-996
    • /
    • 1993
  • This paper addresses the structure and its associated learning algorithms of a feedforward multi-layered connectionist network, which has distributed learning abilities, for realizing the basic elements and functions of a traditional fuzzy logic controller. The proposed neural-network-based fuzzy logic control system (NN-FLCS) can be contrasted with the traditional fuzzy logic control system in their network structure and learning ability. An on-line supervised structure/parameter learning algorithm dynamic learning algorithm can find proper fuzzy logic rules, membership functions, and the size of output fuzzy partitions simultaneously. Next, a Reinforcement Neural-Network-Based Fuzzy Logic Control System (RNN-FLCS) is proposed which consists of two closely integrated Neural-Network-Based Fuzzy Logic Controllers (NN-FLCS) for solving various reinforcement learning problems in fuzzy logic systems. One NN-FLC functions as a fuzzy predictor and the other as a fuzzy controller. As ociated with the proposed RNN-FLCS is the reinforcement structure/parameter learning algorithm which dynamically determines the proper network size, connections, and parameters of the RNN-FLCS through an external reinforcement signal. Furthermore, learning can proceed even in the period without any external reinforcement feedback.

  • PDF

A Study on Timing Analysis of a CAN-Based Simulator for FCHEVs (CAN 기반 FCHEV 시뮬레이터의 시간 해석 연구)

  • Ahn, Bong-Ju;Lee, Nam-Su;Yang, Seung-Ho;Son, Jae-Young;Park, Young-Hwan;Ahn, Hyun-Sik;Jeong, Gu-Min;Kim, Do-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.505-507
    • /
    • 2005
  • In this paper, a timing analysis is performed for the CAN-based simulator system for a fuel cell hybrid electric vehicles. The CAN protocol is recently being used for conventional vehicles, however, the network-induced delay can make the in-vehicle network system unstable. This problem may be occurred in the future vehicles because more ECUs are being required than recent vehicles. In order to develop a stable network-based control system, timing analysis is required at the design process. Throughout this analysis, timing parameters that affect transmission delay are examined and an effective method of predicting a sampling time for a stable communication via CAN protocol. In order to show the validityof suggested timing analysis. some experiments are performed using DSPs with CAN module.

  • PDF

Marine Engine State Monitoring System using DPQ in CAN Network (CAN의 분산 선행대기 열 기법을 이용한 선박 엔진 모니터링 시스템)

  • Lee, Hyun;Lee, Jun-Seok;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.1
    • /
    • pp.13-20
    • /
    • 2012
  • This paper proposes a marine engine state monitoring system using a DPQ (Distributed Precedence Queue) mechanism which collects the state of bearings, temperature and pressure of engine through the CAN network. The CAN is developed by Bosch Corp. in the early 1980' for automobile network. The data from various sensors attached in the marine engine are converted to digital by the analog to digital converter and formatted to fit the CAN protocol at the CAN module. All the CAN modules are connected to the SPU (Signal Processing Unit) module for the efficient communication and processing. This design reduces the cost for wiring and improves the data transmission reliability by recognizing the sensor errors and data transmission errors. The DPQ mechanism is newly developed for the performance improvement of the marine engine system, which is demonstrated through the experiments.