• Title/Summary/Keyword: Protocol Design

Search Result 2,581, Processing Time 0.029 seconds

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Implementation of the T:1 protocol based on lava Card for USIM (자바 카드를 기반으로 한 UISM 용 T=1 프로토콜의 구현)

  • 주홍일;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.800-803
    • /
    • 2004
  • This paper describes the design and implementation of the T=1 protocol based on lava Card. The T=1 protocol implemented in this paper complies with ISO/IEC 7816 standard. Also, JCOS(Java Card Operating Systems) including the contactless card protocol conforms to Java Card 2.2.1 specification and is running on 32-bit ARM7/TDMI processor. The protocol stack proposed and implemented in this paper is easy to maintenance of protocol independently. To verify the T=1 protocol implemented in this paper we tested the T=1 protocol scenarios defined in ISO/IEC 7816-3 Annex A. And we tested using USIM(Universal Subscriber Identity Module) cards, which include the implemented T=1 protocol. The T=1 protocol was tested and passed all against the specification 3GPP TS 31.122, which was the Conformance Test Specification for USIM cards including the test suites of both transmission protocols.

  • PDF

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

Performance Analysis of a BRAM (The Broadcast Recognizing Aceess Method) Protocol in a Wireless LAN (무선 근거리 통신망에서의 BRAM(The Broadcast Recognizing Access Method) 프로토콜 성능 분석)

  • 김재현;이종규
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.1
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, we have analyzed the performance of a BRAM (The Broadcasting Recognizing Access Method) protocol, as a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) scheme, which is widely used in wireles LAN systems. We have selected a Fair BRAM protocol among CSMA/CA schemes, considering the fairness of channel usage and the simplicity of the protocol. We have compared the performance of BRAM protocol to that of CSMA/CD. to research the characteristics of BRAM in wireless LAN system. In order to analyze the performance of this system, we have set up an imbedded Markov chain and calculated state transition probabilities. Then we have calculated steady state probabilities and finally derived the throughput of a Fair BRAM moder. To verify our analysis, we have simulated practical models. Then, we have found that analytic results are very close to simulation ones. Our analysis of the BRAM protocol will be expected to be very helpful to design and evaluate a MAC (Media Access Control) protocol in wireless LAN systems.

  • PDF

Implementation of TTP Network System for Distributed Real-time Control Systems (분산 실시간 제어 시스템을 위한 TTP 네트워크 시스템의 구현)

  • Kim, Man-Ho;Son, Byeong-Jeom;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.6
    • /
    • pp.596-602
    • /
    • 2007
  • Recently, many ECUs(Electronic Control Units) have been used to enhance the vehicle safety, which leads to a distributed real-time control system. The distributed real-time control system requires to reduce the network delay for dependable real-time performance. There are two different paradigms by which a network protocol operates: event-triggered and time-triggered. This paper focuses on implementation of a time-triggered protocol. i.e. TTP/C(Time-Triggered Protocol/class C). This paper presents a design method of TTP control network and performance evaluation of distributed real-time control system using TTP protocol.

A MAS Information Management Method for WiMedia MAC Protocol

  • Chung, Tae-Wook;Chung, Chul-Ho;Kim, Jae-Seok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.9 no.4
    • /
    • pp.205-208
    • /
    • 2009
  • In this paper, a MAS information management method is proposed for the WiMedia MAC protocol. WiMedia MAC configures a fully distributed network based on Ad-hoc method. WiMedia devices communicate during Superframe which is a communication unit in WiMedia MAC. Each superframe which consist of 256 MASs is divided into two periods, beacon period and data period. In data period, devices communicate with each other using the received channel access information during the beacon period. Due to only $12{\mu}s$ timing allowance between beacon period and data period, the process of the MAS information management cannot be completed in time if entire process handle by software. Therefore, we propose a novel MAS information management method using hardware module. With our proposed method, a WiMedia device is satisfied with the processing time that is required in WiMedia MAC protocol.

The Generation of Transaction Monitor Modules from a Transaction-Oriented Interface Protocol Description (트랜잭션 중심의 인터페이스 프로토콜 기술로부터 트랜잭션 모니터 모듈의 생성)

  • 윤창렬;장경선;조한진
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.756-764
    • /
    • 2002
  • The verification portion of SoC design consumes about 70% of total design effort. To reduce the verification effort and time, it is necessary and desirable to raise the level of SoC design verifications level from the signal or cycle level to the transaction. This paper describes a generation method of transaction monitor modules that monitor interface signals, logging the transaction executions, and report transaction errors. The input of the generation method is a transaction-oriented interface protocol description.

Development of Communication Protocol Verification Tool for Vital Railway Signaling Systems

  • Hwang, Jong-Gyu;Jo, Hyun-Jeong;Lee, Jae-Ho
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.4
    • /
    • pp.513-519
    • /
    • 2006
  • As a very important part in development of the protocol, verifications for developed protocol specification are complementary techniques that are used to increase the level of confidence in the system functions by their specifications. Using the informal method for specifying the protocol, some ambiguity may be contained therein. This indwelling ambiguity in control systems can cause the occurrence of accidents, especially in the case of safety-critical systems. To clear the vagueness contained in the designed protocol, we use the LTS (Labeled Transition System) model to design the protocol for railway signaling. And then, we verify the safety and the liveness properties formally through the model checking method. The modal ${\mu}$-calculus, which is an expressive method of temporal logic, has been applied to the model checking method. We verify the safety and liveness properties of Korean standard protocol for railway signaling systems. To perform automatic verification of the safety and liveness properties of the designed protocol, a communication verification tool is implemented. The developed tools are implemented by C++ language under Windows XP. It is expected to increase the safety and reliability of communication protocol for signaling systems by using the developed communication verification tool.

Development of TDMA-Based Protocol for Safety Networks in Nuclear Power Plants (원전 안전통신망을 위한 TDMA 기반의 프로토콜 개발)

  • Kim, Dong-Hoon;Park, Sung-Woo;Kim, Jung-Hun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.7
    • /
    • pp.303-312
    • /
    • 2006
  • This paper proposes the architecture and protocol of a data communication network for the safety system in nuclear power plants. First, we establish four design criteria with respect to determinability, reliability, separation and isolation, and verification/validation. Next we construct the architecture of the safety network for the following systems: PPS (Plant Protection System), ESF-CCS (Engineered Safety Features-Component Control System) and CPCS (Core Protection Calculator System). The safety network consists of 12 sub-networks and takes the form of a hierarchical star. Among 163 communication nodes are about 1600 origin-destination (OD) pairs created on their traffic demands. The OD pairs are allowed to exchange data only during the pre-assigned time slots. Finally, the communication protocol is designed in consideration of design factors for the safety network. The design factors include a network topology of star, fiber-optic transmission media, synchronous data transfer mode, point-to-point link configuration, and a periodic transmission schedule etc. The resulting protocol is the modification of IEEE 802.15.4 (LR-WPAN) MAC combined with IEEE 802.3 (Fast Ethernet) PHY. The MAC layer of IEEE 802.15.4 is simplified by eliminating some unnecessary (unctions. Most importantly, the optional TDMA-like scheme called the guaranteed time slot (GTS) is changed to be mandatory to guarantee the periodic data transfer. The proposed protocol is formally specified using the SDL. By performing simulations and validations using Telelogic Tau SDL Suite, we find that the proposed safety protocol fits well with the characteristics and the requirements of the safety system in nuclear power plants.

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.