• Title/Summary/Keyword: Industrial Protocol

Search Result 687, Processing Time 0.04 seconds

Development of Embedded Board for Construction of Smart Factory (스마트 팩토리 구축을 위한 임베디드 보드 개발)

  • Lee, Yong-Min;Lee, Won-Bog;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.1092-1095
    • /
    • 2019
  • In this paper, we propose the development of an embedded board for construction of smart factory. The proposed embedded board for construction of smart factory consists of main module, ADC module, I/O module. Main module is a main calculating device which includes communication pard that allows interface with external device with using industrial protocol and is ported operating system makes board operating into. ADC module takes part in transferring digital signal has converted from electrical signal to the main module from the external sensor which is installed on the field. I/O module is an input and output module which transfers to the main module about a status, alarm, command signal of field device and it has a function that blocks external noises from field device with isolation circuit into it. In order to evaluate the performance of the proposed embedded board for construction of smart factory, it has been tested by an authorized testing institute. As a result, quantity of interacting protocol was 5, speed of hardware clock synchronization was under 10us and operating time of battery without source power was over 8 hours. It produced the same result as the world's highest level.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Downlink-First Scheduling of Real-Time Voice Traffic in IEEE 802.11 Wireless LANs (무선랜 시스템에서의 하향 우선 실시간 음성 트래픽 스케줄링)

  • Jeong, Dong W.;Lee, Chae Y.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.2
    • /
    • pp.150-156
    • /
    • 2003
  • The IEEE 802.11 MAC (Media Access Control) Protocol supports two modes of operation, a random access mode for nonreal-time data applications processed by Distributed Coordinated Function (DCF), and a polling mode for real-time applications served by Point Coordinated Function (PCF). It is known that the standard IEEE 802.11 is insufficient to serve real-time traffic. To provide Quality of Service (QoS) of real-time traffic, we propose the Downlink-first scheduling with Earliest Due Date (EDD) in Contention Free Period (CFP) with suitable admission control. The capacity and deadline violation probability of the proposed system is analyzed and compared to the standard pair system of downlink and uplink. Analytical and simulation results show that the proposed scheme is remarkably efficient in view of the deadline violation probability.

A Scheme to Increase Throughput in Framed-ALOHA-Based RFID Systems with Capture

  • Oh, Sung-Youl;Jung, Sung-Hwan;Hong, Jung-Wan;Lie, Chang-Hoon
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.486-488
    • /
    • 2008
  • In this paper, a scheme to increase the throughput of RFID systems is presented, which considers the capture effect in the context of framed ALOHA protocol. Under the capture model in which the probability of one tag is identified successfully depending on the number of tags involved in the collision, two probabilistic methods for estimating the unknown number of tags are proposed. The first method is the maximum likelihood estimation method, and the second method is an approximate algorithm for reducing the computational time. The optimal frame size condition to maximize the system throughput by considering the capture effect is also presented.

  • PDF

Implementation of Network Management System for Industrial Device (산업설비를 위한 망관리 시스템의 설계)

  • Kang Min-Su;Kwak Dong-Hyun;Jeong Eul-Gi;Jeun Hee-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2002.07a
    • /
    • pp.693-696
    • /
    • 2002
  • In this paper, network management system(NMS) was developed using Ethernet network for several devices. Recently, due to the development of the information communication, network has been constructed several place. And management system using network has been studied due to the increment of necessity of remote control for industrial device. Agent board that necessity of NMS, was developed using general micro-controller, it operates like stand-alone network device, supports TCP/IP protocol suite, has the ability to connect to industrial device and communicates each other. Also manager base on MMI was developed, it operates with agent board and supports effective management. To prove this system UPS(uninterruptible power supply) is selected as the example of industrial device. Finally, experimental result verifies the communication between agent board and manager.

  • PDF

Development of a Computer Game "Ecopoly" for Education on Relationship between Environment and Economy

  • Komuro, Tasuya;Matsumoto, Toshiyuki
    • Industrial Engineering and Management Systems
    • /
    • v.10 no.4
    • /
    • pp.264-271
    • /
    • 2011
  • It is necessary for humans who have been facing environmental problems to build a sustainable society in which economic activities coexist with nature. To realize such goals, it is essential to promote and enhance environmental education, and to raise global awareness of environmental issues. As a preceding study, a board game "Ecopoly" based on the Kyoto protocol and the estate dealings game, was developed and the validity of environmental education was verified. This study further aims to develop a computer game "Ecopoly", based on the board game which enables us to learn the relationship between environmental problems and economic activities, and to learn more about environmental problems. This computer game enables to concentrate on it by automatic complicated calculations, and to get a higher visual effect compared with the board game. Experimental testing of the game was conducted with 13 college student subjects, and the validity of the game was verified.

Development of the RAS-RMS Protocol optimized to PSTN environment and Implementation of its differentiated process (PSTN 환경에 최적화된 RAS-RMS 연동 프로토콜 개발 및 차별화된 처리과정 구축)

  • Chang, Sung-Keun;Lee, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8357-8362
    • /
    • 2015
  • The emergency call device has been installed and operated for the elevator passenger safety, but the call can not be connected or delay to the operator in an emergency. The application of the Internet of Things(IoT) technology is required for the systematic management and reliability of the emergency call device installed in the elevator. To meet these requirements it is necessary to apply the RMS(Remote Management System). Emergency call device periodically reports the operating status information and the emergency call history information of the emergency call device to the RMS in the PSTN(Public Switched Telephone Network) environment, and transmits the call request information in an emergency. RAS(Remote Access Server) plays a role of converting the PSTN signals to TCP / IP. RMS reports a significant outbreak call and abnormal operating conditions to administrators. In this study, we developed optimized protocol to PSTN environment that is required by RMS and implemented its differentiated process. And a RAS-RMS Protocol was added to the Application Layer. Development protocol consisting of simple structure as compared to CoAP, MQTT or HTTP can work properly in low-spec CPU and transmit elevator emergency key information easily.

Exploitation of IP-based Intelligent Networked Measuring and Control Device and System

  • Liu, Gui-Xiong;Luo, Yi;Fang, Xiao-Dong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1235-1239
    • /
    • 2003
  • On the base of network frame and protocol system of Ethernet the networked sensing technology based on Ethernet is studied and the design principles of industrial Ethernet measurement of control system is put forward, and the general structure model is built in the paper. An eight-bit economical MCU scheme is proposed, and a general scheme of distributed intelligent networked measuring and control equipment based on TCP/IP is designed too. A compact TCP/IP protocol stack are successfully implemented in eight-bit MCU. With C51 program language, method of modularized programming is applied in soft design. The problem of in-system modifying measuring and control strategy of its system is solved successfully by assigning memory dynamically and saving parameter with EEPROM, and it makes the intelligent networked measurement and control system can explain and analyses control strategy from PC. Experiment result shows that, the research of intelligent networked measurement and control equipment and system base on TCP/IP is successful, with flexible network, convenient usage, and good commonality.

  • PDF

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Communication Delay Properties in Performance Model of PROFIBUS Token Passing Protocol (PROFIBUS 토큰 패싱 프로토콜의 성능모델에서의 전송지연 특성)

  • Kim, Hyun-Hee;Lee, Kyung-Chang;Lee, Seok
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.511-514
    • /
    • 2002
  • In may automated systems such as manufacturing systems and process plants, an industrial network or fieldbus is a very important component for the exchange of various and sometimes crucial information. Some of the information has a tendency to rapidly lose its value as time elapses after its creation. Such information or data is called real-time data that includes sensor values and control commands. In order to deliver these data in time, the fieldbus network should be tailored to have short delay with respect to the individual time limit of various data. Fine-tuning the network for a given traffic requires the knowledge on the relationship between the protocol parameters such as timer values and the performance measure such as network delay. This paper presents a mathematical performance model to calculate communication delays of the Profibus FMS network when the timer value TTR and the traffic characteristics are given. The results of this model is compared to those from experiments to assess the model's validity.

  • PDF