• Title/Summary/Keyword: Data Link Message

Search Result 89, Processing Time 0.028 seconds

An Efficient Routing Algorithm for extreme networking environments (극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.

A Best-Effort Control Scheme on FDDI-Based Real-Time Data Collection Networks (FDDI 기반 실시간 데이타 수집 네트워크에서의 최선노력 오류제어 기법)

  • Lee, Jung-Hoon;Kim, Ho-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.347-354
    • /
    • 2001
  • This paper proposes and analyzes an error control scheme which tries to recover the transmission error within the deadline of a message on FDDI networks. The error control procedure does not interfere other normal message transmissions by delivering retransmission request via asynchronous traffic as well as by delivering retarnsmitted message via overallocated bandwidth which is inevitably produced by the bandwidth allocation scheme for hard real-time guarantee. The receiver counts the number of tokens which it meets, determines the completion of message transmission, and finally sends error report. The analysis results along with simulation performed via SMPL show that the proposed scheme is able to enhance the deadline meet ratio of messages by overcoming the network errors. Using the proposed error control scheme, the hard real-time network can be built at cost lower than, but performacne comparable to the dual link network.

  • PDF

Design of U-Healthcare Monitoring System based on Mobile Device (모바일 디바이스 기반의 U-헬스케어 모니터링 시스템 구현)

  • Park, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.46-53
    • /
    • 2012
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. It is necessary to develop the WBAN core technology that sensor node device, WBAN middleware and WBAN application service for WBAN environment. In this paper we designed the medical message structure and implemented medical application for purpose of vital information reliability. The message structure was proposed for WBAN environment and application can be check biometric information from BN on smart device through WBAN gateway.

A Multi Router Support Mechanism in 6LowPAN (6LowPAN 에서 멀티 라우터 지원 방법)

  • Jung, Seuk;Lim, Chae-Seong;Jung, Won-Do;Yoo, Seung-Wha;Roh, Byeong-Hee;Kim, Ki-Hyung
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.279-282
    • /
    • 2007
  • Typically a wireless sensor network consists of a number of nodes that sense surrounding environment and collaboratively work to process and route the sensing data to a sink or gateway node. We propose an architecture with support of multiple routers in IPv6-based Low-power Wireless Personal Area Network (6LoWPAN). Our architecture provides traffic load balancing and increases network lifetime as well as self-healing mechanism so that in case of a router failure the network still can remain operational. Each router sends its own Router Advertisement message to nodes and all the nodes receiving the messages can select which router is the best router with the minimum hop-count and link information. We have implemented the architecture and assert our architecture helps in traffic load balancing and reducing data transmission delay for 6LoWPAN.

  • PDF

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

A Kafka-based Data Sharing Method for Educational Video Services (교육 동영상 공유 서비스의 카프카 기반 데이터 공유 방안)

  • Lee, Hyeon sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.574-576
    • /
    • 2021
  • It is necessary to introduce micro-service techniques when constructing large-scale operating systems or systems that take into account scalability. Kafka is a message queue with the pub/sub model, which has features that are well applied to distributed environments and is also suitable for microservices in that it can utilize various data sources. In this paper, we propose a data sharing method for educational video sharing services using Apache's Kafka. The proposed system builds a Kafka cluster for the educational video sharing service to share various data, and also uses a spark cluster to link with recommendation systems based on similarities in educational videos. We also present a way to share various data sources, such as files, various DBMS, etc.

  • PDF

Design of FOUNDATION Fieldbus Application Layer (FOUNDATION 필드버스 응용계층의 설계)

  • Lee, Sung-Woo
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.1987-1988
    • /
    • 2006
  • 본 논문에서는 필드버스를 이용한 지능형 전송기의 FOUNDATION 필드버스 응용계층에 관해 설계하였다. 필드버스 전송기에는 물리계층 데이터링크 계층 응용계층이 있는데 여기서는 응용 계층 중에서 FAS(Fieldbus Access Sublayer)에 대해서만 설명하고자 한다. FAS는 DLL(Data Link Layer) 계층과 응용 계층인 FMS(Fieldbus Message Specification)간에 인터페이스 기능을 수행한다. FMS에서 생성된 메시지가 DLL에서 제공하는 토큰 패싱 또는 스케줄 방식을 통해서 전송되기 위해서는 전송단과 수신단간에 통신관계가 설정되어야 하며, 이러한 기능이 FAS 계층에서 수행된다. FAS에서 통신관계를 설정하기 위한 서비스 종류는 VCR(Virtual Communication Relationship)에 의하여 결정된다. 하드웨어 설계 부분에 대해서는 본 논문에서 설명하지 않았다.

  • PDF

An Application-Level Fault Tolerant Linear System Solver Using an MPMD Type Asynchronous Iteration (MPMD 방식의 비동기 연산을 이용한 응용 수준의 무정지 선형 시스템의 해법)

  • Park, Pil-Seong
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.421-426
    • /
    • 2005
  • In a large scale parallel computation, some processor or communication link failure results in a waste of huge amount of CPU hours. However, MPI in its current specification gives the user no possibility to handle such a problem. In this paper, we propose an application-level fault tolerant linear system solver by using an MPMD-type asynchronous iteration, purely on the basis of the MPI standard without using any non-standard fault-tolerant MPI library.

Minimizing Stuffing-bit of CAN Message (CAN 메시지의 Stuffing-bit 최소화)

  • Kang, Min-Koo;Park, Kie-Jin;Shin, Dong-Min
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.429-432
    • /
    • 2006
  • CAN(Controller Area Network) 프로토콜은 데이터 링크 계층(Data Link Layer)에서 여러 가지 결함 허용(Faulttolerant) 메커니즘을 기본적으로 제공하기 때문에, 고신뢰성, 고안전성이 요구되는 임베디드 제어 시스템(예: 자동차, 산업제어 등)에서 많이 사용되고 있다. 하지만 제한된 네트워크 대역폭과 이에 따른 응답시간 지연이라는 문제점을 가지고 있으며, 이에 본 논문에서는 전송될 CAN 메시지의 길이를 감소시키기 위해 CAN 메시지의 Stuffing-bit를 최소화하는 메커니즘을 제안하였다. 실험을 통해, CAN 메시지 길이의 축소로 인해 CAN 버스의 부하(Load)를 덜게 되었으며, 네트워크 대역폭 이용률이 증가하는 것을 확인하였다.

  • PDF

Secure Mobile-in-Vehicle System with CBC-MAC authentication (CBC-MAC 방식을 적용한 보안 모바일기기 제어시스템)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2657-2662
    • /
    • 2010
  • Demand on information security in mobile devices based control system grows rapidly with a view to counteracting information hacking and leakage. Among these techniques, encryption and authentication are most common. This paper presents CBC-MAC (Cipher Block Chaining-Message Authentication Code) based mobile devices control system. The system is termed as Secure Mobile in Vehicle (SMIV)We use CBC-MAC that is one of the most efficient authentication modes to protect information against any malicious attacks. By sharing the secret key of CBC-MAC between the transmitter and receiver, it asserts authentic information. The proposed system is verified in such a way that we develop mobile devices control system, apply the CBC-MAC algorithm to the control system and validate the received data. Unlike conventional systems where the development of control mechanism in mobile devices based control systems is main concern, this proposed system offers a secure communication link of the data in mobile devices control system and therefore would be useful to the design and implementation of various mobile devices based control systems.