• Title/Summary/Keyword: Cooperation Control Protocol

Search Result 79, Processing Time 0.024 seconds

The comparative analysis of the MAC Protocol in wireless sensor networks (무선 센서 네트워크에서의 MAC 프로토콜 비교 분석)

  • Lee, Sang-Hun;Lee, Jong-Yong;Park, Jae-Sung;Kim, Jin-Su
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.195-200
    • /
    • 2009
  • 무선 센서 네트워크에서의 통신은 여러 계층으로 나뉘어 각 계층별 역할을 수행하므로 무선통신이 가능할 수 있다. 센서 네트워크에서의 통신계층 중 하나인 MAC(Medium Access Control)계층은 데이터의 에러, 흐름을 제어하고 자원을 관리하기 위해서 사용되며 MAC Protocol을 사용하여 센서 노드간의 통신을 보장한다. 전통적인 MAC Protocol은 패킷 처리율의 최대화, 지연의 최소화 및 공평성 제공이 주된 목적으로 설계된 된다. 무선 센서 네트워크에서 MAC 프로토콜은 응용에 따라 차이는 있으나 대부분 많은 센서 노드들로 구성된다. 또한 멀티 홉 통신을 하기 때문에 센서 장치의 제한된 배터리 수명으로 인해 소모되는 에너지를 최소화 하여 네트워크 에너지의 효율성을 높이는 것이 가장 큰 목적이다. 본 논문에서는 에너지 효율성 측면을 강조하기 위해서 MAC프로토콜의 문제점을 알아보고 그 중에서 최우선적으로 요구되는 에너지 효율성에 대해서 S-MAC, T-MAC의 비교와 T-MAC의 확률값을 변경에 따른 어느 경우가 가장 효율적인지 active time을 통하여 알아보았다.

  • PDF

A Study on Path Selection Scheme for Fast Restoration in Multilayer Networks (신속한 다계층 보호 복구를 위한 경로선택 방식 연구)

  • Cho, Yang-Hyun;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.35-43
    • /
    • 2012
  • The explosive growth of Internet traffic cause by smart equipment such as smart phone has led to a dramatic increase in demand for data transmission capacity and network control architecture, which requires high transmission rates beyond the conventional transmission capability. Next generation networks are expected to be controlled by Generalized Multi-Protocol Label Switching(GMPLS) protocol suite and operating at multiple switching layers. In order to ensure the most efficient utilization of multilayer network resources, effective global provisioning that providing the network with the possibility of reacting in advance to traffic changes should be provided. In this paper, we proposes a new path selection scheme in multilayer optical networks based on the vertical PCE architecture and a different approach to efficiently exploit multiple PCE cooperation.

An Implementation of System for Real time Vehicle's Position Tracking System using Web (웹을 이용한 실시간 자동차 위치 추적 시스템 구현)

  • Yang, Seung-Hyun;Yang, Jae-Won;Lee, Suk-Won
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.281-283
    • /
    • 2006
  • 본 논문에서는 32비트 RISC 프로세서인 PXA255 임베디드 시스템에 리눅스와 HTTP(Hypertext Transfer Protocol) 웹 서버인 GoAhead를 포팅해 웹 서버를 구축하고, 웹 서버를 기반으로 자동차의 실시간 위치 추적시스템을 구현하였다. 운행중인 자동차의 위치 파악은 임베디드 시스템에 GPS 수신기를 장착하여 위성으로부터 전송받은 위치 데이터를 CGI나 자바프로그램을 이용해 프로그램 하였으며, 웹 브라우저를 통해 현재 자동차의 위치를 추적할 수 있는 있도록 하여, PC나 핸드폰, PDA와 같은 개인용 단말기로 장소에 구애받지 않고 쉽게 위치를 파악하도록 하였다.

  • PDF

Design and Implementation of OPC UA-based Collaborative Robot Guard System Using Sensor and Camera Vision (센서 및 카메라 비전을 활용한 OPC UA 기반 협동로봇 가드 시스템의 설계 및 구현)

  • Kim, Jeehyeong;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.47-55
    • /
    • 2019
  • The robot is the creation of new markets and various cooperation according to the manufacturing paradigm shift. Cooperative management easy for existing industrial robots, robots work on productivity, manpower to replace the robot in every industry cooperation for the purpose of and demand increases.to exist But the industrial robot at the scene of the cooperation working due to accidents are frequent, threatening the safety of the operator. Of industrial site is configured with a robot in an environment ensuring the safety of the operator to and confidence to communicate that can do the possibility of action.Robot guard system of the need for development cooperation. The robot's cooperation through the sensors and computer vision task within a radius of the double to prevent accidents and accidents should reduce the risk. International protocol for a variety of industrial production equipment and communications opc ua system based on ultrasonic sensors and cnn to (Convolution Neural Network) for video analytics. We suggest the cooperation with the robot guard system. Robots in a proposed system is unsafe situation of workers evaluating the possibility of control.

Status of Policies Relating Biosafety

  • Jang, Hi-min
    • Journal of Plant Biotechnology
    • /
    • v.5 no.1
    • /
    • pp.13-17
    • /
    • 2003
  • Biotechnology is certainly one of the major landmarks in the 20th century history of science. It may produce enormous utility to human beings, but at the same time, it carries huge potential risks to the environment and public health. Thus, with a view to securing safety for the environment and public health in relation to the development and use of living modified organisms (LMOs), the Cartagena Protocol on Biosafety was adopted, in which a regulation Procedure as to the transboundary movements, transportation, handling, and use of LMOs were drawn up. In order to prepare for the entry into force of the Protocol, the Republic of Korea legislated the "Act on the Transboundary Movements of living modified organisms(hereinafter referred as the 'Act')" in Mar 2001, and has pre-announced the enactments of the enforcement ordinance and the enforcement regulation to the Act. Pursuant to the Act, the Ministry of Commerce, Industry and Energy, as a Competent National Authority, is making efforts to implement domestic biosafety schemes in cooperation with other bio-related government ministries. In order for these efforts to reap fruits, industry, academia, and research institutions should cooperate with one another, and civic groups and NGOs should narrow the differences in opinions and timely respond to the fast-changing situations. Focusing on the precautionary principle, the Protocol puts a great emphasis on the importance of information sharing amongst countries, and the Act also follows this principle. In order to gurantee biosafety, countries around the world, including the ROK, agreed to establish National Biosafety Clearing, designed to provide the information on the export/import of LMOs, R'||'&'||'Ds, risk assessment, safety control, etc. and register it on the CBD Central Biosafety Clearing House.e.

A Ubiquitous Home Network System for Managing Environment-Information Sensors using Image Processing (영상 처리를 이용하여 주변 환경 센서를 관리하기 위한 유비쿼터스 홈 네트워크 시스템)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.931-942
    • /
    • 2010
  • A home network provides users with a variety of information services. The kind and quality of the services can be substantially enhanced by utilizing a variety of data from sensors. However, home networks currently limit their potential by focusing on providing multimedia services rather than services utilizing sensor data. Outdoor electronics are frequently made in a form that emphasizes only certain limited functions in contrast to home appliances. Thus, sensors with one or two functions rather than many can be used in outdoor systems and their use will be more economical than using sensor nodes indoors with more complex home appliances. In this study, we chose to work with motion sensors as they have many potential uses, and we selected a parking lot control system with to use the motion sensors. This parking lot control system was implemented and applied as part of a home network. For this purpose, we defined and implemented a protocol to manage the network in a ubiquitous sensor network environment for the wireless home network in this study. Although a network management system in a Ubiquitous Sensor Network (USN) related to this study is being advanced for other projects, the protocol interface and message system have not yet been clearly defined for use in a general purpose network or in an extension into heterogeneous kinds of networks, communication support, etc. Therefore, USN network management should be conducted for management of faults, composition, power, and applications. To verify the performance of the protocol interface designed in this study, we designed and implemented the necessary units (sensor nodes, sensor gateway, and server) for each network section and, with them, proved the validity of this study.

An Approach to Systems with Multi-Factor Method (다중요소방식을 이용한 시스템 접근방안)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won;Kim, Young-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.842-848
    • /
    • 2012
  • In this paper, as a proper authentication method, we made it authenticate a user who has unauthorized device with using authorized device received from telecommunication company using QR code. We designed a better performance protocol which can authenticate mutually using safer and uncomplicated operations than existing user authentication system. Proposed user authentication system authenticates previously authorized mobile device without any information of client who is requesting to get access from outside, so we can basically prevent attack from hackers. In the future, we can possibly use it as user authentication method in common internet environment or we could study on user unique information instead of mobile device information.

A Study on the Integrated Digital Signature System for Smart Card (지능형 전자 증명 카드에 적합한 통합 서명 시스템에 관한 연구)

  • 김승주;이보영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.870-879
    • /
    • 1997
  • At crypto'89 meeting, D. chaum suggested an undeniable signature scheme. Undeniable signatures are verified via a protocol between the signer and verifier, so the cooperation of the signer is necessary. So far, ther have been several variants of undeniable signatures to obtain a signature scheme, which can control the abous of ordinary digital signatures. In this paper we integrate these variants into a generalized undeniable-type signature scheme. Also, it will be pointed out, that undeniable signature schemes but its first realization are vulnerable in full view of eavesdropping third party. Moreover, to solve this problem, we propose a new type of digital signature, called "result-indisting-uishable undeniable signature" and construct a practical protocol that implements it.

  • PDF

5GHz Wi-Fi Design and Analysis for Vehicle Network Utilization (차량용 네트워크 활용을 위한 5GHz WiFi 설계 및 분석)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.18-25
    • /
    • 2020
  • With the development of water internet technology, data communication between objects is expanding. Research related to data communication technology between vehicles that incorporates related technologies into vehicles has been actively conducted. For data communication between mobile terminals, data stability, reliability, and real-time performance must be guaranteed. The 5 GHz Wi-Fi band, which is advantageous in bandwidth, communications speed, and wireless saturation of the wireless network, was selected as the data communications network between vehicles. This study analyzes how to design and implement a 5 GHz Wi-Fi network in a vehicle network. Considering the characteristics of the mobile communication terminal device, a continuous variable communications structure is proposed to enable high-speed data switching. We simplify the access point access procedure to reduce the latency between wireless terminals. By limiting the Transmission Control Protocol Internet Protocol (TCP/IP)-based Dynamic Host Configuration Protocol (DHCP) server function and implementing it in a broadcast transmission protocol method, communication delay between terminal devices is improved. Compared to the general commercial Wi-Fi communication method, the connection operation and response speed have been improved by five seconds or more. Utilizing this method can be applied to various types of event data communication between vehicles. It can also be extended to wireless data-based intelligent road networks and systems for autonomous driving.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.