• Title/Summary/Keyword: Distributed Network Protocol

Search Result 491, Processing Time 0.027 seconds

Adaptive Packet Transmission Scheme for Exchanging Information between Endpoints in DDS Middleware (DDS 미들웨어에서 단말개체 간 정보교환을 위한 적응형 패킷 전송 기법)

  • Ahn, Sung-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.110-113
    • /
    • 2012
  • DDS middleware transmits data packets through unicast or multicast method for discovering endpoints on a distributed network and exchanging information between endpoints. Depending on the communicating situation between endpoints, the transmission method which is used to exchange packets is already defined by the standard protocol. However, the predefined usage of the transmission method has a problem that the middleware does not deal with increasing usage of the system resources properly when the configuration of endpoint is changed dynamically. To solve this problem, we propose the scheme of selecting the packet transmission method in an adaptive manner.

  • PDF

Design and Walking Control of the Humanoid Robot, KHR-2(KAIST Humanoid Robot-2)

  • Kim, Jung-Yup;Park, Ill-Woo;Oh, Jun-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1539-1543
    • /
    • 2004
  • This paper describes platform overview, system integration and dynamic walking control of the humanoid robot, KHR-2 (KAIST Humanoid Robot - 2). We have developed KHR-2 since 2003. KHR-2 has totally 41 DOF (Degree Of Freedom). Each arm including a hand has 11 DOF and each leg has 6 DOF. Head and trunk also has 6 DOF and 1 DOF respectively. In head, two CCD cameras are used for eye. In order to control all joints, distributed control architecture is adopted to reduce the computation burden of the main controller and to expand the devices easily. The main controller attached its back communicates with sub-controllers in real-time by using CAN (Controller Area Network) protocol. We used Windows XP as its OS (Operating System) for fast development of main control program and easy extension of peripheral devices. And RTX, HAL(Hardware Abstraction Layer) extension program, is used to realize the real-time control in Windows XP environment. We present about real-time control of KHR-2 in Windows XP with RTX and basic walking control algorithm. Details of the KHR-2 are described in this paper.

  • PDF

Design and Hardware Integration of Humanoid Robot Platform KHR-2 (인간형 로봇 플랫폼 KHR-2 의 설계 및 하드웨어 집성)

  • Kim, Jung-Yup;Park, Ill-Woo;Oh, Jun-Ho
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.579-584
    • /
    • 2004
  • In this paper, we present the mechanical, electrical system design and system integration of controllers including sensory devices of the humanoid, KHR-2 (KAIST Humanoid Robot - 2). We have developed KHR-2 since 2003. Total number of DOF of KHR-2 is 41. Each arm including a hand has 11 DOF and each leg has 6 DOF. Head and trunk also has 6 DOF and 1 DOF respectively. In head, two CCD cameras are used for eye. To control all axes efficiently, distributed control architecture is used to reduce computation burden of main controller and to expand devices easily. So we developed the sub-controller as a servo motor controller and a sensor interfacing devices using microprocessor. The main controller attached its back communicates with sub-controllers in real-time by CAN (Controller Area Network) protocol. We used Windows XP as its OS (Operation System) for fast development of main control program and easy extension of peripheral devices. And RTX HAL extension commercial software is used to realize the real-time control in Windows XP environment.

  • PDF

The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks (다중 무선 에드혹 네트워크에서 불공정 문제를 해결하기 위한 802.11 MAC 프로토콜)

  • Nam, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.229-234
    • /
    • 2007
  • In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time. which is uniformly selected from the Contention Window (CW) This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a unfairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.

  • PDF

Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks

  • Kim, Kwangsoo;Shin, Seung-hun;Roh, Byeong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1492-1509
    • /
    • 2017
  • The wireless sensor network (WSN) is a key technology to support the Internet of things (IoT) paradigm. The efficiency of the MAC protocol in WSN is very important to take scalability with restricted wireless resources. The DESYNC-TDMA has an advantage of simple distributed slot allocation inspired by nature, but there is a critical disadvantage of split slots by firing message. The basic split slot model has less efficiency for continuous packet transmitting because of wasting of the slots less than the packet size. In this paper, we propose a firing offset adjustment scheme to improve the efficiency of slot utilizations, which can manage the slot assigned to each node as a single large block, called the single slot model. The performance analysis models for both the existing and the proposed schemes are also derived. Experimental results show that the proposed method provide better efficiency of slot utilization than the existing schemes without any loss of the nature of the desynchronization.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks (다중 무선 에드혹 네트워크에서 불공정 문제를 해결하기 위한 802.11 MAC 프로토콜)

  • Nam, Jae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.91-94
    • /
    • 2007
  • In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a fairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.

  • PDF

Machine-to-Machine (M2M) Communications in Vehicular Networks

  • Booysen, M.J.;Gilmore, J.S.;Zeadally, S.;Rooyen, G.J. Van
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.529-546
    • /
    • 2012
  • To address the need for autonomous control of remote and distributed mobile systems, Machine-to-Machine (M2M) communications are rapidly gaining attention from both academia and industry. M2M communications have recently been deployed in smart grid, home networking, health care, and vehicular networking environments. This paper focuses on M2M communications in the vehicular networking context and investigates areas where M2M principles can improve vehicular networking. Since connected vehicles are essentially a network of machines that are communicating, preferably autonomously, vehicular networks can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular networking by supporting large-scale deployment of devices, cross-platform networking, autonomous monitoring and control, visualization of the system and measurements, and security. We also present some of the challenges that still need to be addressed to fully enable M2M support in the vehicular networking environment. Of these, component standardization and data security management are considered to be the most significant challenges.

A Design of Invite Flooding Attack Detection and Defense Using SIP in VoIP Service (SIP을 이용한 VoIP 서비스에서의 Invite Flooding 공격 탐지 및 방어 기법 설계)

  • Yun, Snag-Jun;Kim, Kee-Chen
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.215-218
    • /
    • 2011
  • VoIP(Voice over Internet Protocol) 서비스는 기존의 음성전화 서비스(Public Switched Telephone Network, PSTN)와 달리 IP 프로토콜을 이용한 저렴한 통신비용 등의 장점이 있는 음성통신 기술로써, 기존의 아날로그 음성전화 서비스를 대신하는 서비스이며, 새로운 인터넷 융합서비스로 많은 사용자가 이용하고 있다. 하지만 VoIP 서비스가 인터넷망을 이용함으로 IP Spoofing, DoS (Denial of Server) / DDoS(Distributed Denial of Service), 등의 여러 가지 보안의 문제점을 가지고 있다. VoIP 서비스에서 DDoS 공격은 Proxy 서버 등에 대량의 공격 메시지를 보냄으로써 서버의 자원을 고갈시켜 정상적인 서비스를 하지 못하게 한다. DoS, DDoS 공격 중 Invite Flooding 공격은 1분에 수천 개의 Invite 메시지를 보내 회선의 자원을 고갈시키는 공격이다. 특히 IP/Port 위조하여 공격 경우 공격 패킷 탐지하기 어려우므로 차단할 수 없다. 따라서 본 논문에서는 VoIP의 DoS/DDoS 중 하나인 Invite Flooding 공격 시 SIP Proxy Server에서 메시지 분산시키는 방법과 MAC Address와 사용자 번호 등 IP 이외의 고정적인 사용자 정보를 확인하여 공격을 탐지하고, 공격 Agent에 감염된 Phone을 공격차단서비스로 보내 복구시키는 방법을 제안한다.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.