• Title/Summary/Keyword: Network device

Search Result 2,398, Processing Time 0.027 seconds

Transmission Characteristics in LonWorks/IP-based Virtual Device Network(VDN)

  • Park, Gi-Heung;Song, Ki-Won;Kim, Jong-Hwi;Park, Gi-Sang
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.169-172
    • /
    • 2002
  • Web-based virtual machine/manufacturing system (VMS) utilizes Virtual Device Network (VDN.) VDN inevitably involves the implementation of Distributed Monitoring and Control Networks (DMCN). In general, one needs to integrate device (control) network and IP network to realize DMCN over IP network or internet, which can be viewed as a VDN. In this study, LonWorks networking technology is used fer device network and the transmission characteristics of LonWorks/IP-based VDN is investigated. A method to minimize the transmission delay in the LonWorks/IP networks is also suggested.

  • PDF

Web-based Predictive Maintenance(PM) (웹 기반 예방 보전에 관한 연구)

  • Gi-Heung Choi
    • Journal of the Korean Society of Safety
    • /
    • v.16 no.4
    • /
    • pp.213-217
    • /
    • 2001
  • Requirements for Device Networks differ greatly from those of typical data networks. Specifically, any device network technology which employs a fieldbus protocol is different from IP network protocol TCP/IP. In general, one needs to integrate fieldbus protocol and TCP/IP to realize device network over IP network or internet. Interoperability between devices and equipments is essential to enhance the quality and the performance of predictive maintenance(PM). This paper suggests a basic framework for web-based predicted maintenance and a method to guarantee interoperability between devices and equipments.

  • PDF

An Analysis on the Number of Advertisements for Device Discovery in the Bluetooth Low Energy Network (저전력 블루투스 네트워크에서 장치 탐색을 위한 Advertising 횟수에 관한 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.3-12
    • /
    • 2016
  • Bluetooth Low Energy (BLE) protocol has attracted attention as a promising technology for low data throughput and low energy wireless sensor networks. Fast device discovery is very important in a BLE based wireless network. It is necessary to configure the network to work with minimized energy consumption because the BLE network nodes are expected to operate a long time typically on a coin cell battery. However, since it is difficult to obtain low energy and low latency at the same time, the BLE standard introduces wide range setting of parameters related to device discovery process and let the network operators to set up parameter values for the application. Therefore, it is necessary to analyze the performance of device discovery according to the related parameter values prior to BLE network operation. In this paper we analyze the expected value and the cumulative distribution function of the number of advertisements for device discovery in the BLE network. In addition, we propose a scheme for controlling the interval between advertising events that can improve the performance of device discovery without increasing energy consumption.

A Study on User Authentication for Roaming in Mobile Device (모바일 디바이스의 로밍을 위한 사용자 인증에 관한 연구)

  • Kang, Seo-Il;Park, Choon-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.343-350
    • /
    • 2008
  • In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc${\cdots}$) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.

XML BASED SINGLE SIGN-ON SCHEME FOR DEVICE CONTROL IN UBIQUITOUS ENVIRONMENT

  • Jeong, Jong-Il;Lee, Seung-Hun;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.298-302
    • /
    • 2009
  • This paper proposes a single sign-on scheme in which a mobile user offers his credential information to a home network running the OSGi (Open Service Gateway Initiative) service platform, to obtain user authentication and control a remote device through a mobile device using this authentication scheme, based on SAML (Security Assertion Markup Language). Especially by defining the single sign-on profile to overcome the handicap of the low computing and memory capability of the mobile device, we provide a clue to applying automated user authentication to control a remote device via a mobile device for distributed mobile environments such as a home network based on OSGi.

  • PDF

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

Control of Left Ventricular Assist Device using Artificial Neural Network (인공신경망을 이용한 좌심실보조장치의 제어)

  • 류정우;김훈모;김상현
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.260-266
    • /
    • 1996
  • In this paper, we presents neural network identification and control of highly complicated nonlinear Left Ventricular Assist Device(LVAD) system with a pneumatically driven mock circulation system. Generally the LVAD system need to compensate nonlinearities. Hence, it is necessary to apply high performance control techniques. Fortunately, the neural network can be applied to control of a nonlinear dynamic system by learning capability. In this study, we identify the LVAD system with Neural Network Identification. Once the NNI has learned the dynamic model of LVAD system, the other network, called Neural Network Controller(NNC), is designed for control of a LVAD system. The ability and effectiveness of identifying and controlling a LVAD system using the proposed algorithm will be demonstrated by computer simulation.

  • PDF

Implementation of Security Policies of ONSU-MF(One Network Security Unit-Multi Function) and OSD-MD(One Security Device-Multi Defense) (ONSU-MF(One Network Security Unit-Multi Function)기법과 OSD-MD(One Security Device-Multi Defense)기법 기반의 보안정책 구현)

  • Seo, Woo-Seok;Lee, Gyn-An;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.317-326
    • /
    • 2011
  • This study is meaningful in that it standardizes various security and defense policies and devices, newly defines characteristics of defense policies and defense techniques, and specify and report various kinds of security polities and devices in order for administrators or users to add and apply the policies when introducing new security policies including the implementation of existing network infra and applying additionally. Therefore, this study aims to divide the policies into ONSU-MF(One Network Security Unit-Multi Function) that classifies one network security device-based policies and OSD-MD(One Security Device-Multi Defense), which implements various security methods by using one security device, and suggest network security infra improvement mechanism through the standardization implementation technique integrating the two methods.

Development of MAC layer of Network for KTX high-speed train system (고속 열차용 네트워크의 MAC 계층 개발)

  • Lee, Bum-Yong;Kim, Hyung-In;Jung, Sung-Youn;Park, Jae-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2015-2020
    • /
    • 2008
  • Real-time communication network is important for KTX high speed train system because small problem can make a huge accident. Communication network for KTX high speed train system consists of IEEE 802.4 token bus network and FM0 encoding. The network device is developed by using MC68824 TBC, MC68185 TPM and MC68020 MPU. The network device make available to analysis of the network protocol among vehicles for Kyung-Boo high-speed train system.

  • PDF

Implementation of Wireless Network Design Tool for TD-SCDMA (TD-SCDMA 무선망 설계 Tool 의 구현 방법론)

  • Jeon, Hyun-Cheol;Ryu, Jae-Hyun;Park, Sang-Jin;Kim, Jung-Chul;Ihm, Jong-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.247-250
    • /
    • 2007
  • There are three main kinds of service standards for 3G(Third-Generation) wireless communication as WCDMA, CDMA2000 and TD-SCDMA(Time Division-Synchronous Code Division Multiple Access). Compare with WCDMA and CDMA2000, TD-SCDMA system has distinguished technical characters. It is a TDD(Time Division Duplexing) based technology and deploys several advanced but in some respects complex technologies such as smart antenna, joint-detection and baton-handoff, etc. Therefore to analyze and design TD-SCDMA wireless network, it needs more efficient and systematic simulation tool. General simulation tool has so many analysis functions including path loss prediction, capacity and coverage analysis. For more suitable for TD-SCDMA, new additional technologies have to be implemented in simulation tool. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the reliability of the simulation tool. In this paper, to give the concrete process and skill about how to implement TD-SCDMA simulation tool, we define the kinds of simulation tool and list basic analysis functions available for TD-SCDMA network design at first. And then we explain how to consider the effects of new technologies of TD-SCDMA and give the solutions about theses considerations.

  • PDF