• Title/Summary/Keyword: Industrial Protocol

Search Result 687, Processing Time 0.027 seconds

A Study on Development of Conversion Software for Controller Without OPC Stack to Communicate With OPC DA Client (OPC 스택이 없는 제어기와 OPC DA 클라이언트를 통신시키는 변환 소프트웨어 개발에 관한 연구)

  • Lee, Yong-Min;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.319-326
    • /
    • 2015
  • This paper proposes method about development of conversion software for controller without OPC stack to communicate with OPC DA client. The proposed method is composed of development of OPC server based on OPC DA standard protocol, development of GUI application can be checked the OPC tag and point informations, development of conversion module to convert from OPC protocol to open standard protocol. In the stage of development of OPC server based on OPC DA standard protocol, we develope server in the pc to transmit and receive datum through OPC DA protocol with OPC DA client. In the stage of evelopment of GUI application can be checked the OPC tag and point informations, run the OPC DA server and register to window system registry and check OPC tags, points, transmitting and receiving of data from serial communication. In the stage of development of conversion module to convert from OPC protocol to open standard protocol, convert from OPC tag data which has received from OPC DA client to protocol can be communicated with industrial controller using open standard protocol so that support to transmit and receive data. To evaluate the efficiency of the proposed software, we connected OPC DA server software and OPC client, and 5 sample industrial controller which use open standard protocol, as a result we got 96.98% average communication succeeding rate among entire transmitting and receiving packets. We also confirmed that successfully communicated between industrial building controller which uses modbus protocol and industrial OPC DA client using OPC DA conversion software proposed by this dissertation.

Implementation of Global Position Location System using X.400 Protocol (X.400을 이용한 글로벌 위치확인 시스템 구현)

  • Lee, Myung-Eui
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.2
    • /
    • pp.178-182
    • /
    • 2005
  • The proposed system in this paper is designed to provide users with a means of global location information using Orbcomm satellite communication and X.400 protocol. The system's two-way data transmission capabilities allow users to track mobile or fixed objects anywhere in the world via Internet. This study utilizes the X.400 protocol, and the SIP(Serial Interface Protocol) and self defined control protocol to implement data communication link in this paper. Data processor board connected to SC(Subscriber Communicator) is also designed and implemented to interface with GPS receiver. The experimental results of the proposed global position location system is evaluated through real-time experiments, and we have confirmed it works well according to the protocol designed in this paper.

  • PDF

Enhanced OLSR Routing Protocol Using Link-Break Prediction Mechanism for WSN

  • Jaggi, Sukhleen;Wasson, Er. Vikas
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.259-267
    • /
    • 2016
  • In Wireless Sensor Network, various routing protocols were employed by our Research and Development community to improve the energy efficiency of a network as well as to control the traffic by considering the terms, i.e. Packet delivery rate, the average end-to-end delay, network routing load, average throughput, and total energy consumption. While maintaining network connectivity for a long-term duration, it's necessary that routing protocol must perform in an efficient way. As we discussed Optimized Link State Routing protocol between all of them, we find out that this protocol performs well in the large and dense networks, but with the decrease in network size then scalability of the network decreases. Whenever a link breakage is encountered, OLSR is not able to periodically update its routing table which may create a redundancy problem. To resolve this issue in the OLSR problem of redundancy and predict link breakage, an enhanced protocol, i.e. S-OLSR (More Scalable OLSR) protocol has been proposed. At the end, a comparison among different existing protocols, i.e. DSR, AODV, OLSR with the proposed protocol, i.e. S-OLSR is drawn by using the NS-2 simulator.

Optimal Polling Method for Improving PCF MAC Performance in IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜 시스템에서 PCF 프로토콜의 성능을 향상시키기 위한 최적의 폴링 방식)

  • Choi, Woo-Yong;Lee, Sang-Wan
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • A modified PCF(Point Coordination Function) protocol with the optimal polling sequence is defined in detail and shown to improve the efficiency of the conventional PCF protocol in IEEE 802.11 wireless LAN standard. The problem for the optimal polling sequence is formulated as TSP(Travelling Salesman Problem) with the distance values of 1's or 0's. Numerical examples show that the optimal polling sequence increases the capacity of the real-time service such as VoIP(Voice over Internet Protocol).

A Development of User Protocol Converter with Modbus and NMEA0183 (Modbus와 NMEA0183간의 사용자 프로토콜 컨버터 개발)

  • Eum, Sang-hee;Hong, Sung-ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.90-92
    • /
    • 2015
  • This study aim is to effectively reduce the time that was required for the analysis on an existing communication protocol with the industrial monitoring equipment. We analyzed the collected data with the Modbus protocol and NMEA0183, which is widely used in industrial monitoring. and User will be easy converting to data for use on each devices. The main board of the protocol converter was used AVR128, and RS232C and Ethernet was configured to enable communication.

  • PDF

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network using Symmetric Key Cryptography (대칭키 암호화를 이용한 Ad Hoc 네트워크에서의 안전한 경로발견 프로토콜 제안)

  • Park, Young-Ho;Lee, Sang-Gon;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.1
    • /
    • pp.68-75
    • /
    • 2008
  • Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose an efficient and secure route discovery protocol for ad hoc network using symmetric key cryptography. This protocol has small computation loads at each hop using symmetric key cryptography. In the Route Reply, encryption/decrytion are used to guard against active attackers disguising a hop on the network.

  • PDF

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

Vehicle Registration Protocol for Secure Communication in VANET Environment (VANET 환경에서 안전한 통신을 위한 차량 등록 프로토콜)

  • Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.1-5
    • /
    • 2010
  • To operate safely VANET applications, authenticaton is necessary to identify val d participants and prevent malicious parties from modifying messages. This paper proposes an efficient authentication protocol for the vehicle registration in VANET environment. The topology of VANET changes rapidly due to high-speed movement of vehicles, thus it is need to reduce the computational burden of the authentication protocol. Therefore, this protocol uses only one-way hash functions and EOR operations to register vehicles.

A security study for Control Network: Security Threat Using Control Protocol (제어 네트워크의 프로토콜을 이용한 보안 위협 연구)

  • Choi, DongJun;Lee, JaeWoo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network (Ad Hoc 네트워크를 위한 안전한 경로발견 프로토콜 제안)

  • Park Young-Ho;Kim Jin-Gyu;Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.3
    • /
    • pp.30-37
    • /
    • 2005
  • Ad hoc network is a collection of mobile nodes without using any infrastructure, it , is using in the various fields. Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose two secure route-discovery protocols. One is a protocol using hash function. This protocol is weak in active attack but has some merits such as small data of transmission packet and small computation at each hop. The other is a protocol using hash function and public key cryptography. This protocol is strong in active attack.

  • PDF