• Title/Summary/Keyword: Protocol analysis

Search Result 2,495, Processing Time 0.038 seconds

Performance Analysis of Data Link Protocol for Interface between EIS and LDTS (전자연동장치와 역정보전송장치간 인터페이스를 위한 데이터링크 프로토콜 성능해석)

  • Hwang, Jong-Gyu;Lee, Jae-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.6 no.2
    • /
    • pp.135-141
    • /
    • 2003
  • According to the computerization of railway signaling systems, the interface link between these signaling equipment is also replaced by digital communication channel, expecially communication link for interface between EIS and LDTS, but there are some problems in the present state of railway signaling. First of all, different communication protocol is applied to interface between above two signaling equipment although they have same functions. The other is that the communication protocol currently used in railway field has some unreasonable points such as structure, formation of byte, error correction scheme and etc. To solve these problems, the standard communication protocol for railway signaling is designed. The structure of designed communication protocol and the results of performance analyses are represented in this paper. It will be expected the increase of safety, reliability and efficiency of maintenance of signaling system by using of the designed communication protocol for railway signaling.

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.

Throughput and Delay Analysis of a Reliable Cooperative MAC Protocol in Ad Hoc Networks

  • Jang, Jaeshin;Kim, Sang Wu;Wie, Sunghong
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.524-532
    • /
    • 2012
  • In this paper, we present the performance evaluation of the reliable cooperative media access control (RCO-MAC) protocol, which has been proposed in [1] by us in order to enhance system throughput in bad wireless channel environments. The performance of this protocol is evaluated with computer simulation as well as mathematical analysis in this paper. The system throughput, two types of average delays, average channel access delay, and average system delay, which includes the queuing delay in the buffer, are used as performance metrics. In addition, two different traffic models are used for performance evaluation: The saturated traffic model for computing system throughput and average channel access delay, and the exponential data generation model for calculating average system delay. The numerical results show that the RCO-MAC protocol proposed by us provides over 20% more system throughput than the relay distributed coordination function (rDCF) scheme. The numerical results show that the RCO-MAC protocol provides a slightly higher average channel access delay over a greater number of source nodes than the rDCF. This is because a greater number of source nodes provide more opportunities for cooperative request to send (CRTS) frame collisions and because the value of the related retransmission timer is greater in the RCO-MAC protocol than in the rDCF protocol. The numerical results also confirm that the RCO-MAC protocol provides better average system delay over the whole gamut of the number of source nodes than the rDCF protocol.

Performance Analysis of Wired/Wireless Hybrid Network based on Common Industrial Protocol (Common Industrial Protocol 기반의 유무선 하이브리드 네트워크에 관한 성능 분석)

  • Jung, Ji-Won;Lee, Seung-Ki;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1119-1127
    • /
    • 2007
  • This paper is concerned with a performance analysis using a wired/wireless hybrid network based on Common Industrial Protocol(CIP). For the performance analysis, the data transmission time, average end-to-end delay and throughput between DeviceNet and the wireless devices are investigated. The experimental results show the performance in terms of the polling/COS service time of CIP based hybrid network.

Improvement of IS-IS Protocol for TICN Tactical Backbone (TICN 전술백본망을 위한 IS-IS 프로토콜 성능 개선)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.996-1002
    • /
    • 2011
  • Recently Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment. Conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. As follow-up study of previous paper, this paper try to find the proper parameters of IS-IS protocol in order to improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments. Finally it selected four time-parameters of IS-IS protocol, those can improve performance of the protocol.

Modeling & Performance Analysis of the MAC Protocol for VDL in the Aeronautical Mobile Communication System (항공이동통신 시스템에서 VDL을 위한 MAC 프로토콜 모델링 및 성능 분석)

  • Kim, Yong-Joong;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.327-336
    • /
    • 2009
  • This paper analysis the STDMA protocol in aviation wireless data communications and carry out the performance analysis with simulation. The STDMA protocol that is currently being used in VDL Mode-4 has TDMA system characteristics, which provides time-division into several slots per one frame. The results of modeled STDMA protocol's data channel analysis show approximate 0.7 channel throughput at the transmission probabilities 0.045, 0.2, and 0.3 in the aspects of channel throughput. The delay time are 2.32434sec, 2.0293sec, and 2.12128sec respectively. These results shows the good stability in spite of variable transmission probabilities. Consequently, it is expected that STDMA protocol would be used properly for domestic communication demands and supervision system improvement by means of applying this to point-to-point communication and data/location broadcasting as a fundamental technology in CNS/ATM.

  • PDF

Performance Analysis of Channel Error Probability using Markov Model for SCTP Protocol

  • Shinn, Byung-Cheol;Feng, Bai;Khongorzul, Dashdondov
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.134-139
    • /
    • 2008
  • In this paper, we propose an analysis model for the performance of channel error probability in Stream Control Transmission Protocol (SCTP) using Markov model. In this model it is assumed that the compressor and decompressor work in Unidirectional Mode. And the average throughput of SCTP protocol is obtained by finding the throughputs of when the initial channel state is good or bad.

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

Implementation of Fault Tolerant BBMD Mechanism in BACnet/IP Protocol (BACnet/IP 프로토콜에서 BBMD의 결함허용 기능 구현)

  • Cho, Su-Un;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.107-109
    • /
    • 2005
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides BACnet/IP Protocol for data communication through the internet. BACnet device transmits BACnet broadcast messages and BACnet/IP messages using conventional IP technologies. Specially, BBMD(BACnet Broadcasting Management Device) is used to deliver BACnet broadcast messages. In this study, we propose a mechanism of fault tolerant BBMD in the BACnet/IP protocol. The Fault Tolerant BBMD mechanism(FTBM) improves the connectivity of BACnet/IP networks by inheriting the operation of BBMD in the networks. The FTBM is implemented with added functions to the original BACnet/IP protocol so that it can be applied together with original BACnet/IP devices. We also prove the FTBM's backward compatibility with original BACnet/IP protocol using experimental analysis.

  • PDF