• Title/Summary/Keyword: ProtocolMonitoring

Search Result 744, Processing Time 0.026 seconds

A study on the real-time monitoring & control for wafer fabrication process (웨이퍼 가공공정 실시간 감시제어에 관한 연구)

  • 임성호;이근영;이범렬;한근희;최락만
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.421-426
    • /
    • 1989
  • Many of semiconductor manufacturing companies persuit automation of wafer fabrication to improve the yields and quality of their products. Development of real-time control system for wafer fabrication and wafer/cassette automatic transfer-system is the most important part to achieve the purpose. In this paper, SECS protocol proposed by SEMI is briefly reviewed and an implementation method of real-time monitoring and control system is suggested as one of the possible ways for wafer fabrication automation. The system consists of process equipments supporting SECS.

  • PDF

A Study of Multiplex RE Monitoring Method of Low-Price for Stand-Alone PV Power Generation System (독립형 태양광 발전 시스템을 위한 저가의 다중 무선 모니터링 기법에 관한 연구)

  • Oh Jin-Seok;Kwak Jun-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.5
    • /
    • pp.579-586
    • /
    • 2005
  • Recently, it has demanded to the wireless monitoring system in stand-alone PV power generation system. We propose the multiplex monitoring method using RF unit of low-price. RF unit consists of RF modem and communication controller. It is also able to use by repeater to communicate long distance. In this paper. two algorithms were programmed by CCS-C and C++ for multiplex monitoring method, The algorithm of choosing unit was used 'select and poll method' and the course assignment algorithm was embodied with 'Bellman-Ford algorithm'. The good result was achieved in the actual test without communication-data lose. The proposed method will be applied such as monitoring system of PV light on the wayside, monitoring system of unmanned lighthouse, monitoring system of refrigeration container on vessel and so on. It can be applied in the field that various ocean energy system.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Design and Application of LoRa-based Network Protocol in IoT Networks (사물 네트워크에서 LoRa 기반 네트워크 프로토콜 설계 및 적용)

  • Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1089-1096
    • /
    • 2019
  • Recently, small-scale IoT services using a small amount of information through low-performance computing have been spread. It requires low cost, low-power, and long-distance communication technologies with wide communication radius, relatively low power consumption. This paper proposes a MAC layer and routing protocol that supports multi-hop transmission in small-scale IoT environment distributed over a large area based on LoRa communication and delivering a small amount of sensing data. The terminal node is mobile and the communication type provides bidirectional transmission between the terminal node and the network application server. By applying the proposed protocol, a production line monitoring system for smart factory was implemented. It was confirmed that the basic monitoring functions are normally performed.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Design and Implementation of Interworking Gateway with QoS Adaptation (QoS 적응 기능을 갖는 연동 게이트웨이의 설계 및 구현)

  • Song, Byeong-Hun;Choe, Sang-Gi;Jeong, Gwang-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.619-627
    • /
    • 1999
  • To support multimedia services between network domains with different environments, it is required to map the functionalities in many aspects. In this paper, we implemented interworking gateway which provides protocol conversion and QoS(Quality of Service) adaptation to interwork DAVIC services based on ATM(Asynchronous TRansfer Model )network and Internet AV services. The interworking gateway converts RTSP(Real-Time Streaming Protocol ) message into DSM-CC(Digital Storage Media Command & Control) messages to control the stream that is served in ATM network, and transmits data stream by using RTP(Real-Time Transport Protocol) The interworking gateway provides QoS adaptation functionalities by QoS monitoring and MPEG filtering to meet the variation of network bandwidth.

Context-aware Based Distributed Clustering for MANET (상황인식 기반의 MANET을 위한 분산 클러스터링 기법)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.277-280
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method that the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient.

  • PDF

Implementation of an Integrated Monitoring System for Industrial Equipments with Different Network Protocols using ETOS-l00A (범용 게이트웨이 시스템(ETOS-l00A)을 이용한 이기종 통신 산업기기의 통합 모니터링 시스템 구축)

  • 정장식;안현식
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2537-2540
    • /
    • 2003
  • In this paper, an integrated monitoring system is implemented for industrial equipments which use different types of network protocols to communicate with other equipments. Dedicated gateway systems mate it difficult to modify or to add contents of network systems for communication with other systems. We suggest an integration method of effectively utilizing the general purpose gateway system (ETOS-l00A) which converts various types of protocols into TCP/IP protocol. To demonstrate the validity of the proposed integrated monitoring system, PLC-based automated inspection system is considered and the monitoring system is implemented using Visual Basic and HMI software.

  • PDF

Behavior Monitoring System based on WAP for the Elderly and the Disabled (장애인 및 노약자를 위한 WAP 기반 행동 모니터링 시스템)

  • 김택현;이희영
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2565-2568
    • /
    • 2003
  • This paper presents a behavioral data monitoring system based on WAP(wireless application protocol) service for the 24-hour continuous health state monitoring of the elderly and the disabled. The developed system transmits a character message to the predefined mobile cell phone through SMS service when an emergency state takes place. Simultaneously, the image captured by a CCD camera is transmitted to the server computer installed WAP service program. Then, the user of the cell phone who received he message can access the server and open the transmitted image. This system can be used for the effective health monitoring of the elderly and disabled.

  • PDF