• Title/Summary/Keyword: Communication protocol design

Search Result 961, Processing Time 0.033 seconds

A Study on the Multi-wireless Communication Using Cnet Protocol for PLC (Cnet 프로토콜을 이용한 PLC간의 다중무선통신에 관한 연구)

  • Rhyu Keel-Soo;Lee Hoo-Rach;Chung Kyung-Yul
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.4
    • /
    • pp.384-390
    • /
    • 2005
  • This paper addresses the design and implementation of a wireless network. proposed as a cost-effective support platform for PLCs. With this network. one or more supervising stations may access remote equipment like PLCs. An applicable communication methods are described and we applied efficient method among them to PLCs communication. The paper specifies these requirements and indicates methods to fulfill them. Also. it provides to the model of operation, and focuses on the implementation approach. The hardware and software design is described together with a number of critical points related to wireless communication on the Cnet. Furthermore, a discussion on system expandability and performance is tackled and some observations are stated. The main conclusion is, that the proposed method can feature good performance under normal operating conditions.

Design and Implementation of IEC 61162-4 based TLI Protocol for e-Navigation on Ship (선박의 통합정보처리를 위한 IEC 61162-4 기반 TLI 프로토콜 설계 및 구현)

  • Jang, Kil-Woong;Lee, Jang-Se;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.351-359
    • /
    • 2010
  • In this paper, we propose a transmission algorithm of the TLI protocol of the IEC 61162-4 standard to perform the e-Navigation on ship, and we design and implement the TLI protocol according to the proposed algorithm. The implemented protocol is a TCP/IP based protocol, and is a network protocol with the MAU and LNA components proposed in the IEC 61162-4 standard. In addition, it makes a data transmission over the network architecture based on client/server network model. In the implemented protocol, there are a communication between the MAU and the LNA in one host, and also a communication between the LNA and the LNA in each other hosts. In order to provide a variety of service in a host, every client host has a LNA and multiple MAUs. According to the standard specification and the proposed transmission algorithm, we designed and implemented the TLI protocol using object-oriented mechanism. We carried out the experiment under a simple network model similar to real ship environment, and confirmed that it successfully transmits and receives data between the hosts.

Home Network Control Protocol for Networked Home Appliances and Its Application

  • Lee Jae-Min;Myoung Kwan-Joo;Kim Dong-Sung;Kwon Wook-Hyun;Ko Beom-Seog;Kim Young-Man;Kim Yo-Hee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.26-39
    • /
    • 2002
  • This paper describes design and implementation of home network control protocol for networked home appliances. The proposed network protocol has four-layered protocol structure and device-modem interface structure for the flexibility of modems based on power line communication. The standard message set is specified to guarantee the interoperability between various home appliances The proposed protocol can be easily implemented because it has minimum network overhead.

  • PDF

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

K-Grid Integrated Data Modeling and Data Exchange Protocol Design and Evaluation (K-Grid 통합 노드 데이터 모델링 및 정보교환 프로토콜 설계와 시험)

  • Choi, Jung-In
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.12
    • /
    • pp.119-131
    • /
    • 2011
  • To be integrated into the IEC 61970-based K-Grid, application of open communication protocol and sub-system modeling to major nodes is needed. In this paper, a module which links load nodes in customers to CIM based on psXML/oBIX, one of open protocols, was developed and data modeling and communication protocols of IEC 61850-7-42 based DER and ESS which apply the module to the customers who have DER and ESS were designed. Also the XML-based distributed database middleware was designed. The proposed modeling and protocols were applied to the building in which commercial DER products and the effectiveness of the proposed data modeling and the communication protocol were evaluated.

Performance Management of Communication Networks for Computer Intergrated Manufacturing (컴퓨터 통합 생산을 위한 통신망의 성능 관리)

  • Lee, S.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.11 no.4
    • /
    • pp.126-137
    • /
    • 1994
  • Performance management of computer networks is intended to improve a given network performance in order for more efficient information exchange between subsystems of an integrated large-scale system. Importance of perfomance management is growing as many functions of the large- scale system depend on the quality of communication services provided by the network. The role of performance management is to manipulate the adjustable protocol parameters on line so that the network can adapt itself to a dynamic environment. This can be divided into two subtasks : performance evaluation to find how changes in protocol parameters affect the network performance and decision making to determine the magnitude and direction of parameter adjustment. This paper is the first part of the two papers focusing on conceptual design, development, and evaluation of performance management for token bus networks. This paper specifically deals with the task of performance evaluation which utilizes the principle of perturbation analysis of discrete event dynamic systems. The developed algorithm can estimate the network performance under a perturbed protocol parameter setting from observations of the network operations under a nominal parameter setting.

  • PDF

Design and Implementation of IoT Middleware Using Data Refinement Scheme based on IETF CoAP (IETF CoAP 기반의 데이터 정제 기법을 이용한 IoT 미들웨어 설계 및 구현)

  • Wang, Jian;SaKong, June;Kwak, Ho-Young;Kim, DoHyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.123-128
    • /
    • 2015
  • Recently, a communication protocol for connectivity between various sensors and actuators is issue the key technology in IoT(Internet of Things). IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol) protocol supports the communication between things like sensors and actuator nodes in a limited environment. Smart-phone will work for the data processing of the sensors and the management of IoT nodes at the next generation communication environment. In this paper, we design the connection for smart-phone and IoT node based using IETF CoAP protocol, and implement the middleware with the proposed data refinement on smart-phone. The middleware detects and eliminates a error data and duplicated data using the proposed data refinement. The proposed data refinement scheme supports to transfer a reliability information in the constrained environment.

Identity-Based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design

  • Shen, Jian;Moh, Sangman;Chung, Ilyong
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.682-691
    • /
    • 2012
  • Key agreement protocol is a fundamental protocol in cryptography whereby two or more participants can agree on a common conference key in order to communicate securely among themselves. In this situation, the participants can securely send and receive messages with each other. An adversary not having access to the conference key will not be able to decrypt the messages. In this paper, we propose a novel identity-based authenticated multi user key agreement protocol employing a symmetric balanced incomplete block design. Our protocol is built on elliptic curve cryptography and takes advantage of a kind of bilinear map called Weil pairing. The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks. Furthermore, our protocol is efficient and needs only two rounds for generating a common conference key. It is worth noting that the communication cost for generating a conference key in our protocol is only O($\sqrt{n}$) and the computation cost is only O($nm^2$), where $n$ implies the number of participants and m denotes the extension degree of the finite field $F_{p^m}$. In addition, in order to resist the different key attack from malicious participants, our protocol can be further extended to provide the fault tolerant property.

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

Design of Communication Protocol Conversion using EPN (EPN을 이용한 통신프로토콜 변환방식 설계)

  • 이상호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.4
    • /
    • pp.509-518
    • /
    • 1993
  • Protocol conversion is to resolve the imcompatibility between networks so that users on different protocols can communicate with each other. This paper designs a formal model, EPN , to increase its modeling power and analyze conversion protocol and proposes a conversion algorithm using it. The conversion algorithm has two capabilities : synchronization and automatic error recovery function. Therefore burden of protocol converter design will be reduced, automatic protocol converter design can be possible and implementation for half-gateway will be easy.

  • PDF