• Title/Summary/Keyword: Data protocol

Search Result 3,889, Processing Time 0.03 seconds

A Study on Development of Conversion Software for Controller Without OPC Stack to Communicate With OPC DA Client (OPC 스택이 없는 제어기와 OPC DA 클라이언트를 통신시키는 변환 소프트웨어 개발에 관한 연구)

  • Lee, Yong-Min;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.319-326
    • /
    • 2015
  • This paper proposes method about development of conversion software for controller without OPC stack to communicate with OPC DA client. The proposed method is composed of development of OPC server based on OPC DA standard protocol, development of GUI application can be checked the OPC tag and point informations, development of conversion module to convert from OPC protocol to open standard protocol. In the stage of development of OPC server based on OPC DA standard protocol, we develope server in the pc to transmit and receive datum through OPC DA protocol with OPC DA client. In the stage of evelopment of GUI application can be checked the OPC tag and point informations, run the OPC DA server and register to window system registry and check OPC tags, points, transmitting and receiving of data from serial communication. In the stage of development of conversion module to convert from OPC protocol to open standard protocol, convert from OPC tag data which has received from OPC DA client to protocol can be communicated with industrial controller using open standard protocol so that support to transmit and receive data. To evaluate the efficiency of the proposed software, we connected OPC DA server software and OPC client, and 5 sample industrial controller which use open standard protocol, as a result we got 96.98% average communication succeeding rate among entire transmitting and receiving packets. We also confirmed that successfully communicated between industrial building controller which uses modbus protocol and industrial OPC DA client using OPC DA conversion software proposed by this dissertation.

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Yang Hae-Kwon;Ra In-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.442-445
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts an acquisited data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In this paper, we proposes a reliable congestion protocol, ratted HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

  • PDF

QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks (USN에서 QoS보장을 위한 MAC 프로토콜)

  • Kim, Seong-Hun;Goh, Sun-Bok;Lee, Seung-Keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.513-516
    • /
    • 2008
  • The sensor node's performance is expected to be improved and the price will be largely decreased. As USN-applied field is expanded, multiple application services are expected to be provided through one USN soon. Multiple applications be required a periodic data reporting, consecutive information monitoring, event-driven data and query-based data as the data pattern that USN is delivered. Accordingly, the mechanism which can assure QoS according to each data characteristic is required. In this paper, A proposed protocol apply the duty cycle of S-MAC protocol variably and flexible according QoS level. This method largely reduces the delay on the delay-sensitive traffic, while keeping the energy efficiency.

  • PDF

The Study on the Design of the Function and Data Structure for Electronic Watt-Hour Meters (원격검침을 위한 전자식 전력량계 기능과 데이터구조 설계에 관한 연구)

  • Jang, M.J.;Hyun, D.H.;Cho, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07a
    • /
    • pp.308-310
    • /
    • 2001
  • With the development of Computer & Communication Technology, nowadays many people are interested in remote metering, and many vendors are suggesting various remote metering solutions. KEPCO (Korea Electric Power Corporation) adopts some of these to some customers who uses a lot of electric power, also continues researching them. But, currently used electronic watt-hour meters vary in terms of communication protocol and data structure by the vendors. So we have to know each vendor's communication protocol and data structure to construct a remote metering system, or to find problems in it. But that's impossible to know each vendor's protocol and data structure because they are reluctant to tell those to outside the company. To solve these problems and to make a much more cost-effective metering system, KEPCO developed standard communication protocol between meters and PC (or metering server), and defined standard functions and data structure which can be used by everyone easily. Those developments support standard interface for every vendors' meters. And Those will be adopted by KEPCO for a part of a new metering standard for electronic watt-hour meters.

  • PDF

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

Proactive Data Dissemination Protocol on Distributed Dynamic Sink Mobility Management in Sensor Networks (센서 네트워크에서 다수의 이동 싱크로의 에너지 효율적인 데이터 전파에 관한 연구)

  • Hwang Kwang-Il;Eom Doo-Seop;Hur Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.792-802
    • /
    • 2006
  • In this paper, we propose an energy-efficient proactive data dissemination protocol with relatively low delay to cope well with highly mobile sink environments in sensor networks. In order for a dissemination tree to continuously pursue a dynamic sink, we exploit two novel algorithms: forward sink advertisement and distributed fast recovery. In our protocol, the tree is shared with the other slave sinks so that we call it Dynamic Shared Tree (DST) protocol. DST can conserve considerable amount of energy despite maintaining robust connection from all sources to sinks, since tree maintenance of DST is accomplished by just distributed local exchanges. In addition, since the DST is a kindof sink-oriented tree, each source on the DST disseminates data with lower delay along the tree and it also facilitates in-network processing. Through simulations, it is shown that the presented DST is considerably energy-efficient, robust protocol with low delay compared to Directed Diffusion, TTDD, and SEAD, in highly mobile sink environment.

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

The Design of STDMA(Self-Organized Time Division Multiple Access) Protocol Simulation Program (항공 감시용 다중접속방식 프로토콜 시뮬레이션 프로그램 설계)

  • Kim, In-Kyu;Ohn, Kyoung-Ryoon;Song, Jae-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.554-558
    • /
    • 2008
  • In this paper, we show that the SIDMA(Self-organized Time Division Multiple Access) protocol using aviation surveillance data link now, designs to the ICAO DO 9816 documentation sequence. This protocol makes use of the VDL(VHF Data Link) Mode 4 and UAT(Universal Access Transceiver) system's MAC(Media Access Control) layer. We make sure of the simulation result and implementation of STDMA protocol program in accompany with the ICAO documentation sequence. This program operates the slot allocation and reservation with report rate when protocol transmits data and calculates slot address.

  • PDF

Wireless Sensor Network Protocol based on LEACH Protocol using Fuzzy (Fuzzy를 적용한 LEACH Protocol 기반 무선 센서 네트워크 프로토콜)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.115-121
    • /
    • 2017
  • A wireless sensor network is a network in which nodes equipped with sensors capable of collecting data from the real world are configured wirelessly. Because the sensor nodes are configured wirelessly, they have limited power such as batteries. If the battery of the sensor node is exhausted, the node is no longer usable. If more than a certain number of nodes die, the network will not function. There are many wireless sensor network protocols to improve energy efficiency, among which LEACH Protocol is a typical example. The LEACH protocol is a cluster-based protocol that divides sensor space into clusters and transmits and receives data between nodes. Therefore, depending on how the cluster is structured, the shape of the energy cow may decrease or increase. We compare the network lifetimes of the existing LEACH protocols and the three types of protocols that have been improved using fuzzy methods for cluster selection.

Design and Performance Analysis of Multi-hop Routing Protocol for WiMedia (WiMedia를 위한 멀티홉 라우팅 프로토콜 개발 및 성능분석)

  • Jung, Jin-Uk;Lee, Seung-Jin;Jin, Kyo-Hong;Hwang, Min-Tae;Jeon, Young-Ae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1406-1415
    • /
    • 2012
  • Though WiMedia supports the higher data rates than other WPAN technologies, a WiMedia device cannot reach other devices which are apart from it more than 10 meter; the limited transmission range of the WiMedia protocol. In this paper, we propose a multi-hop QoS routing protocol to enable WiMedia devices to transmit real-time data to devices that is located out of transmission range. The proposed routing protocol is a hybrid routing protocol, which is the mixed protocol of table-driven and on-demand routing algorithm. In the proposed protocol, a route for a device within 2-hop is established by using the table-driven routing algorithm and a route for the device beyond 2-hop is established by using the on-demand routing algorithm. We perform ns-2 simulation to investigate the performance of the proposed routing protocol with AODV and DSDV. The simulation results show that the proposed protocol's performance is better than AODV and DSDV in terms of the throughput and delay.