• Title/Summary/Keyword: Interaction Protocol

Search Result 139, Processing Time 0.03 seconds

Implementation of RS232C and TCP/IP Connection Device Using ARM Processor (ARM프로세서를 이용한 RS232C와 TCP/IP 접속장치의 구현)

  • Lee, Young-Jun;Han, Kyong-Ho
    • Proceedings of the KIPE Conference
    • /
    • 2002.07a
    • /
    • pp.635-638
    • /
    • 2002
  • In this paper, the connection device of RS232C and TCP/IP implementation using ARM processor and LINUX is proposed. Data interaction flash memory the multiple serial ports are transferred to ARM processor and the data are processed and formed into data packet for transfer via internet protocol. Packet flash memory Internet is decoded to extract the serial port data. The serial ports supports RS232C asynchronous protocol communication and control program is developed in GNU-C and installed in the on-board memory for packet conversion and control. The research result can be applied to terminal server, printer server and multiple serial ports equipments.

  • PDF

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

Intelligent Multimedia Educational System on Distributed Environment (분산 환경에서의 지능형 멀티미디어 교육 시스템)

  • Lee, Se-Hun;Yun, Gyeong-Seop
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1323-1331
    • /
    • 1999
  • This paper suggests a multimedia educational system which has the ability to extract intelligent instruction on the distributed environment. The proposed system is designed for supporting individual instruction and real time user interaction. As the system based on CORBA, we put group managing module on it for multi user environment, so it has ability for distributed computing facilities. Using MHEG standard, we can provide multimedia courseware and real time user interaction. To diagnose students' responses and generate evaluations, we use several linguistic variables of fuzzy theory. There are two major advantages for using this system. This system can provide dynamic generation of problems and the ability to provide a dynamic instruction strategy. And it can increase reusability of courseware material for using standard of multimedia representation and communication. We use CORBA and MHEG to overcome the disadvantage of the Web, passive protocol and poor interactivity, HTTP.

  • PDF

Design and Implementation of RET management system for Satellite Multimedia Internet Service (위성 멀티미디어 인터넷 서비스를 위한 RCST관리 시스템 설계 및 구현)

  • 손경호;백승진
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.231-234
    • /
    • 2002
  • This paper has studied a management system for RCST of the Satellite Multimedia Internet Service through analysing the architecture and specification of BSAN based on Digital Video Broadcasting System. In this paper, designing and implementing RCST DPM and agent system are shown. The UCD-SNMP framework served as base station for implementation of the agent. And the message protocol between RCST DPM and agent system has been also defined to provide a way for interaction.

  • PDF

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

PLC and Arduino Interaction Based on Modbus Protocol

  • Jeong, Yunju;Ansari, Md Israfil;Shin, WooHyeon;Kang, Bonggu;Lim, JinSeop;Moon, HyeonSik;Shim, Jaechang
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.511-519
    • /
    • 2017
  • This Paper introduces the design and communication method between PLC (Programmable Logic Controller) and Arduino based on MODBUS Protocol. MODBUS connection can be established in a new or existing system very easily, therefore we used this protocol in our proposed system. In the field of automatic devices, multi-function serial port such as RS232, RS422, RS485, and so on creates a great convenience to the developer. This proposed system used RS485 as a key mediator for data exchanging on a connected network. We also believe that it will reduce the development cost in various automated industry because this system can be reused or can be implemented any such PLC installed machines. RS485 is used as a communication interface between PLC (as a slave) and Arduino (as a master), through which a reliable network is created for safe and fast communication. Furthermore, RS485 allows multiple devices(up to 32) to communicate at half duplex on a single pair of wires and provides a long connectivity area (up to 1200 meters) as compare to other device, which makes it a user-friendly for various devices in the automated industry. Moreover, Arduino can play as a mediator by connecting third party device and setup a communication network with PLC.

A Design and Implements of CPP/CPA Editing System based on ebXML (ebXML의 CPP/CPA 편집 시스템 설계 및 구현)

  • 최종근;김창수;정회경
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.928-936
    • /
    • 2003
  • In terms of B2B, business partners require works that define 1h13ir ability to operate business collaboration. The document outlining collaboration is the basis of improving the system of business partner and its interoperability. In addition, the definition of business interaction that is based on the documents demonstrating inter-cooperation of business companies is needed to function interoperability properly, and business trading is performed depending on the documents that define reciprocal action of collaboration. In ebXML, CPP(Collaboration-Protocol Profile) defines one business partner's technical capabilities to engage in electronic business collaborations with other partners by exchanging electronic messages. A CPA(Collaboration-Protocol Agreement) documents the technical agreement between two partners to engage in electronic business collaboration. In this paper, I draw up a plan for a composer system that deals with business collaboration document to ameliorate the interoperability of B2B companies.

  • PDF

QoS-Guaranteed Realtime Multimedia Service Provisioning on Broadband Convergence Network(BcN) with IEEE 802.11e Wireless LAN and Fast/Gigabit Ethernet

  • Kim, Young-Tak;Jung, Young-Chul;Kim, Seong-Woo
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.511-523
    • /
    • 2007
  • In broadband convergence network(BcN), heterogeneous broadband wired & wireless subnetworks and various terminal equipments will be interconnected. In order to provide end-to-end realtime multimedia services on such heterogeneous networking environment, as a result, two major problems should be resolved: i) Multimedia session establishment & negotiation that adjusts the differences in the capability of multimedia data processing at the end terminal nodes, ii) quality of service(QoS)-guaranteed connection establishment or resource reservation with connection admission control(CAC) in each heterogeneous subnetworks along the path. The session layer signaling(e.g., SIP/SDP) should be extended for QoS negotiation, and must be tightly cooperating with network layer signaling or resource reservation with CAC function. In this paper we propose a session and connection management architecture for the QoS-guaranteed realtime multimedia service provisioning on BcN, with Q-SIP/SDP, resource reservation protocol with traffic engineering extension, and CAC functions. The detailed interaction scenario and related algorithms for QoS-guaranteed realtime multimedia session, resource reservation and connection establishment are explained and analyzed. From the experimental implementation of the proposed scheme on a small scale BcN testbed, we verified that the proposed architecture is applicable for the realtime multimedia service provisioning. We analyze the network performance and QoS parameters in detail.

Design and implements of Processing System for business Collaboration by B2B (B2B 기업간 비즈니스 협업 문서 처리를 위한 시스템 설계 및 구현)

  • 이상복;강치원;정재길;정희경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.452-455
    • /
    • 2002
  • In terms of B2B, business partners require works that define their ability to operate business collaboration. The document outlining collaboration is the basis of improving the system of business partner and its interoperability. In addition, the definition of business interaction that is bastd on the documents demonstrating inter-cooperation of business companies is needed to function interoperability properly, and business trading is performed depending on the documents that define reciprocal action of collaboration. In ebXML, CPP(Collaboration-Protocol Profile) defines one business parter's technical capabilities to engage in electronic business collaborations with other partners by exchanging electronic messages. A CPA(Collaboration-Protocol Agreement) documents the technical agreement between two partners to engage in electronic business collaboration. In this paper, 1 draw up a plan for a system that deals with business collaboration document to ameliorate the interoperability of B2B companies.

  • PDF

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.