• Title/Summary/Keyword: Legacy device

Search Result 56, Processing Time 0.024 seconds

The Design of Fault Tolerant PSTR Using Virtualization Techniques on the Embedded System (가상화 기술을 이용한 임베디드 시스템상의 고장감내 PSTR 설계)

  • Yoo, Jinho;Han, Kyujong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.443-448
    • /
    • 2014
  • This paper is a study related to fault tolerant design based on PSTR using virtualization techniques. If the fault tolerant PSTR based on virtualization techniques is implemented the communication performance between primary and shadow will improves and monitoring function is easy to available about activities of primary and shadow. The legacy PSTR model is implemented in its hardware. The primary play a main role and shadow play a switched action when the errors occurrs in the primary. The switched action of shadow make it possible to restart the primary function newly. This paper implements fault tolerant primary-shadow model using virtualization techniques on the embedded environment.

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

Development of Bypass Unit for Ship Area Network Based on Legacy-line Communication (무배선 통신을 위한 선박 네트워크용 바이패스 장치 개발)

  • Jun, Ho-Ik;Kim, Hyun-Sik;Jung, Kyun Sik;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.292-297
    • /
    • 2015
  • In this paper, we reported the bypass unit for ship area networks in order to detour the communication failure regions and poor communication links. The device was composed of three parts of circuits for power cut-off, protection, and coupling transformer. Since the coupling transformer exerts a dominant influence on the performance of the by-pass unit, we have tried to find the optimal magnetic core materials and its dimensions. The prototype was passed through the performance test of insertion loss, temperature, and vibration characteristics. The insertion loss was around -2 dB in the range of 90 kHz ~ 30 MHz and the average communication speed was 59.2 Mbps in the laboratory. A pilot communication test using the developed tool was conducted in the training ship of the Korea Maritime and Ocean University. As a results of experiment, we showed that the wired communication among the heterogeneous-links in the ship area networks are possible by the bypass unit and also a high speed communication services are available in ~ Mbps by using a power-line.

A Study on the Possibility of Transforming to Digital Substations using IEC 61850 Field Information Processing Panel of Legacy Substation (기존 변전소의 IEC 61850 기반 현장정보처리반을 이용한 디지털변전소 전환 가능성 검토에 관한 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.129-136
    • /
    • 2018
  • The IEC 61850 communication standard is used worldwide, and within the country the new substation is built as a digital substation based on IEC 61850 from 2013, after field tests and R&D from 2007. Research on the development of digital substation operating system has been conducted mainly in large domestic companies, so the IED power application equipment for LCP are developed. However, there is still a lack of research in the field of systems that can accommodate all the field devices used for legacy substation and new digital substation. In this paper, we developed the 48VDC input modules and the 125VDC output modules which can construct proposed field information processing modules to IEC 61850 based type, and verified the field applicability from the state monitoring and control operation tests by using IEC 61850 client authentication program and Wireshark.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

An Implementation of Network Processor Protocol Converter and flow Control using FPGA (FPGA를 이용한 Network Processor용 Protocol 변환장치의 구현 및 흐름제어)

  • Bang, Jin-Min;Cho, Jun-Dong;Kim, Austin S.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.397-400
    • /
    • 2006
  • Recent trend on high speed packet processing for providing multiple internet services is to use network processor instead of being implemented by legacy ASIC or FPGA. Most frequently used network processor interface is the SPI4.2. This paper address the data-rate conversion interface device between SPI4.2 and SPI3/CSIX, implemented using XILINX XC2VP40 FPGA. Furthermore, we address the methodology and necessity of flow control occurred due to the data rate difference between 10Gbps and 3.2 Gbps.

  • PDF

An Extensible Smart Home IoT System Based on Open Hardware Platforms (개방형 하드웨어 플랫폼 기반의 확장 용이한 스마트 홈 IoT 시스템)

  • Lee, Jin-hae;Park, Gwang-il;Shin, Jong-ha;Yoo, Seong-eun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.369-377
    • /
    • 2016
  • Recently, many changes have been made to people's life patterns as the technological advances in the ICT industry. The fusion of smart phones and various IT technologies has brought people convenience and welfare. A typical example of such fusion is the smart home. However, the existing smart home systems are difficult to be changed or extended. So we design a new smart home system with extensibility that can easily adopt legacy appliances and be scaled up. Among a variety of smart home features, this paper deals with IoT Devices that are responsible for controlling power or transmitting and receiving sensing values, IoT Gateway that connects users and consumer electronics via Internet, and Smart Home Manager that monitors and controls these components in the proposed smart home system.

Implementation of PXIe platform based portable Automatic Test Equipment to improve reliability

  • Gwon, Hyeok-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose a development method of portable Automatic Test Equipment based on PXIe platform. Legacy VME form factor structured test equipment has limited reuse and expansion of modules due to unapplied bus specification. In particular, these limitations can cause development periods and costs to increase, and the reliability of environmental conditions is lacking due to non-standard modules. The test equipment of the proposed PXIe platform can use diverse COTS modules to shorten the development period and minimize the instability between developments. The PXIe development module works with standard Xilinx FPGAs, PXIe Windows device drivers, and applications on standard PXIe buses. The use of standard bus and COTS modules increases scalability and reusability, enabling rapid development and excellent maintenance. Through the test, we show the proposed test equipments can be implemented efficiently between the development processes and proved their reliability through function tests and environmental tests.

Position Information Storage System based on RDBMS

  • Jang, In-Sung;Cho, Dae-Soo;Park, Jong-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.897-899
    • /
    • 2003
  • Recently, owing to the rapid progress of Telecommunication technology, the increase of wireless internet’s subscriber and diffusion of wireless device, LBS (Location Based Services) which take advantage of user's location information and receive information in concerning with user’s location to be essential services. Location Based Services are related the moving objects which change their locations through time. Therefore, to provide location-based services efficiently, it is required that an efficient system which could acquire, store, and query the large number of locations. In this paper, we design management system to insert and search a huge number of Moving Object based on Legacy Relational Database.

  • PDF

Contents Conversion System for Mobile Devices using Light-Weight Web Document (웹 문서 경량화에 의한 모바일용 콘텐츠 변환 시스템)

  • Kim Jeong-Hee;Kwon Hoon;Kwak Ho-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.13-22
    • /
    • 2005
  • This paper aims to develop a system for converting web contents to mobile contents that can be used on mobile devices. Since web contents generally consist of pop-up ad windows, a bunch of unnecessary images and useless links, it is difficult to efficiently display them on common mobile devices that have lower bandwidth and memory, as well as much smaller screen, than the online environment. It is also troublesome for mobile device users to directly access contents. Thus, there has been a great demand for a new method for extracting useful and adequate contents from web documents, and optimizing them for use on mobile phones, In the paper, a system based on WAP 2,0 and XHTML Basic, which is a content creation language adopted for WAP 2,0, has been suggested. The system is designed to convert web contents by using the conversion rules of the existing filtering method after making the size of web documents smaller. The adopted conversion rules use the XHTML Basic's module units so that modification and deletion can be carried out with ease. In addition, it has been defined in a XSL document written in XSLT to maintain the extensibility of conversion and the validity of documents, In order to allow it to efficiently work together with WAP l.X's legacy services, the system has been built in a way that can have modules, which analyze information about CC/PP profiles and mobile device headers.

  • PDF