• Title/Summary/Keyword: Information Exchange Requirements

Search Result 152, Processing Time 0.021 seconds

A Novel Reference Model for Cloud Manufacturing CPS Platform Based on oneM2M Standard (제조 클라우드 CPS를 위한 oneM2M 기반의 플랫폼 참조 모델)

  • Yun, Seongjin;Kim, Hanjin;Shin, Hyeonyeop;Chin, Hoe Seung;Kim, Won-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.2
    • /
    • pp.41-56
    • /
    • 2019
  • Cloud manufacturing is a new concept of manufacturing process that works like a single factory with connected multiple factories. The cloud manufacturing system is a kind of large-scale CPS that produces products through the collaboration of distributed manufacturing facilities based on technologies such as cloud computing, IoT, and virtualization. It utilizes diverse and distributed facilities based on centralized information systems, which allows flexible composition user-centric and service-oriented large-scale systems. However, the cloud manufacturing system is composed of a large number of highly heterogeneous subsystems. It has difficulties in interconnection, data exchange, information processing, and system verification for system construction. In this paper, we derive the user requirements of various aspects of the cloud manufacturing system, such as functional, human, trustworthiness, timing, data and composition, based on the CPS Framework, which is the analysis methodology for CPS. Next, by analyzing the user requirements we define the system requirements including scalability, composability, interactivity, dependability, timing, interoperability and intelligence. We map the defined CPS system requirements to the requirements of oneM2M, which is the platform standard for IoT, so that the support of the system requirements at the level of the IoT platform is verified through Mobius, which is the implementation of oneM2M standard. Analyzing the verification result, finally, we propose a large-scale cloud manufacturing platform based on oneM2M that can meet the cloud manufacturing requirements to support the overall features of the Cloud Manufacturing CPS with dependability.

Formal Modeling and Verification of an Information Retrieval System using SMV

  • Kim, Jong-Hwan;Park, Hea-Sook;Baik, Doo-Kwon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.141-146
    • /
    • 2001
  • An Information Retrieval System offers the integrated view of SCM(Supply Chain Management) information to the enterprise by making it possible to exchange data between regionally distributed heterogeneous computers and also to enable these computers to access various types of databases. The Information Retrieval System is modeled using Data Registry Model based on X3.285. We only verify the MetaData Registry Manager(MDR Manager) among the core parts using SMV(Symbolic Model Verifier) in order to verify whether our model satisfies the requirements under the given assumptions.

  • PDF

Security Consideration for Implementation in Ubiquitous Healthcare System (유비쿼터스 환경하에서의 헬스케어 구현 시의 고려 사항)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.639-641
    • /
    • 2010
  • Healthcare applications involve complex structures of interacting processes and professionals that need to exchange information to provide the care services. In this kind of systems many different professional competencies, ethical and sensibility requirements as well as legal frameworks coexist and because of that the information managed inside the system should not be freely accessed, on the contrary. it must be subject to very complex privacy restrictions. This is particularly critical in distributed systems, where additionally, security in remote transmissions must be ensured. In this paper, we address the fundamental security issues that must be considered in design of a distributed healthcare application.

  • PDF

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

Developing Data Exchange Standard between Roadside-device and Traffic Information Center in accordance with ISO 15784 (ISO 15784를 적용한 교통정보센터와 노변장치간 데이터 교환 표준 개발 _ AVI를 중심으로)

  • Lee, Sang-Hyun;Son, Seung-Neo;Kim, Nam-Sun;Cho, Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.29-41
    • /
    • 2013
  • This study set out to developing data exchange standard between roadside device and traffic information center fitted in a domestic environment by applying international standard ISO 15784. First, we defined message basic concept of 'Dialog' and essential elements should be defined to define the standard message for securing system compatibility by reference ISO 14817 and ISO 14827 Part 1. For defining standard message items exchanged between AVI and traffic information center, we formed Working Group under ITS Standards Technical Committee and analyzed data flow for ITS National Architecture, Standard messages of existing standards, and AVI operation messages actually operated on roadside now. So, we extracted 14 functionally needed messages and defined 28 standard messages adopting 'Dialog' concept. In case of the application protocol for data exchange standards, we defined basic requirements for securing interoperability and interchangeability considering domestic environment by analyzing reference standard of ISO 15784.

A Rapid Prototyping Data Model for ISO 14649 (ISO 14649 표준을 위한 신속조형용 설계정보모델)

  • Kim I. B;Jee H. S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.4
    • /
    • pp.225-236
    • /
    • 2005
  • The primary goal of the study is to provide a newly refined data model, an information exchange foundation of modeling operation for rapid prototyping, as one among non-milling STEP-NC modules. The previous data model has been first modified and refined by reflecting specific user requirements. Second, subsidiary information such as fabrication history as well as traditional process information has been introduced into the newly refined model in order to consolidate the model functionality. In short, the main contribution of the study is to provide a foundation where a newly refined data model is utilized easily and conveniently for practical rapid prototyping fabrication within the newly constructed STEP-NC environment.

Communication Delay Properties in Performance Model of Profibus Token Passing Protocol (Profibus 토큰 패싱 프로토콜 성능 모델에서의 전송 지연 특성)

  • Lee, Kyung-Chang;Kim, Hyun-Hee;Lee, Seok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.12
    • /
    • pp.1055-1064
    • /
    • 2003
  • In many automated systems, such as manufacturing systems and process plants, a fieldbus is a very important component for the exchange of various and sometimes crucial information. Some of the information has a tendency to rapidly lose its value as time elapses after its creation. Such information or data is called real-time data that includes sensor values and control commands. In order to deliver these data in time, the fieldbus network should be tailored to have short delay with respect to the individual time limit of various data. Fine-tuning the network for a given traffic requires the knowledge on the relationship between the protocol parameters such as timer values and the performance measure such as network delay. This paper presents a mathematical performance model to calculate communication delays of the Profibus-FMS network when the timer value and the traffic characteristics are given.

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.

Design of Interoperable DTD Architecture supporting Interoperability of Digital Documents for B2B, B2G Environments (B2B, B2G 환경에서 전자문서의 상호운용을 지원하는 DTD 상호운용 구조의 설계)

  • Park, Sang-Yun
    • Management & Information Systems Review
    • /
    • v.21
    • /
    • pp.99-114
    • /
    • 2007
  • According as Internet based EC(Electronic Commerce) has been activated, More requirements for exchanging digital documents are being proposed in B2B(Business to Business) and B2G(Business to Government) environments. However, the documents can not be processed automatically, because the structures of documents in each site(companies, central/local governments) do not match. Therefore, W3C(World Wide Web Consortium) has proposed XML(eXtensible Markup Language) DTD(Document Type Declaration) technology to support structuring documents. The XML DTD technology can support interoperability between EC sites. And, XML DTD based documents can be processed automatically in every sites. They will improve efficiency of services in B2B and B2G environments. In this paper, we propose interoperable DTD architecture and IDEP(Interoperable DTD Exchange Protocol) protocol which supports searching DTDs and exchanging DTDs. This technology can popularize DTDs and digital documents.

  • PDF

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.