• 제목/요약/키워드: protocol Analysis

검색결과 2,519건 처리시간 0.031초

Performance Analysis of the UPC/NPC Algorithm for Guaranteed QoS in ATM Networks

  • Kim, Yong-Jin;Kim, Jang-Kyung;Lee, Young-Hee;Park, Chee-Hang
    • ETRI Journal
    • /
    • 제20권3호
    • /
    • pp.251-271
    • /
    • 1998
  • It is well known that if usage parameter control/network parameter control (UPC/NPC) functions are used together with a cell loss priority control scheme in ATM networks, the measurement phasing problem can occur. This makes it difficult for a network provider to define and commit the cell loss ratio as a QoS parameter. To solve the problem, we propose a new UPC/NPC algorithm. By using the proposed UPC/NPC algorithm, we can define the cell loss ratios for CLP = 0 and CLP = 0+1 cell streams without the measurement phasing problem under any conditions. We analyzed the performance of the proposed UPC/NPC algorithm. Using a discrete time model for the UPC/NPC architecture with a discrete-time semi-Markov process (DSMP) input model, we obtained the cell discarding probabilities of CLP = 0 and CLP = 0+1 cells streams and showed that more CLP = 0 cells are accepted compared to what was proposed in ITU-T.

  • PDF

Zone Routing Protocol의 Ad-hoc네트워크 적용에 관한 연구 (A study on the Ad-hoc Network Application of Zone Routing Protocol)

  • 이영노;김용득
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(1)
    • /
    • pp.119-122
    • /
    • 2004
  • This mobile oriented Ad-hoc network yet steps on development level, related issues and standardization are progressing. This paper presented ad-hoc network's overview and overall property, followed by routing scheme that must be setup for communication between each nodes. Among several routing scheme proposed for standardization, ZRP that is foaled by this paper, is hybrid type algorithm, and only includes advantages of others This paper presented running process and implementation method, result that is made from network simulation, shows analysis of each parameter values's change. Each parameters changed with many differences according to Zone radius and communication node's location from simualtion that was performed changing a number of nodes and a velocity of nodes.

  • PDF

네트워크 토폴로지에 따른 CAN-FD 통신 영향성 분석 (Performance Analysis of CAN-FD Based Network Against Network Topology)

  • 서석현
    • 대한임베디드공학회논문지
    • /
    • 제12권6호
    • /
    • pp.351-358
    • /
    • 2017
  • The most common communication interface for automotive electronic control devices is CAN (Controller Area Network). Sine CAN was first adopted to Daimler vehicles in 1991, all of automobile manufacturers use the CAN communication for in-vehicle networks. However, as the number of electronic control devices connected to the CAN network rapidly increases, the CAN protocol reaches the limit of technology. To overcome this limitation, Bosch introduced the new communication protocol, that is CAN-FD (Flexible Data-rate). In this paper, we analyze the characteristics and limitations of CAN-FD communication according to the topology under the in-vehicle wiring harness environment designed based on the existing classic CAN communication.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • 제8권4호
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

마코프 에러형태 하에서의 Blast 프로토콜의 수율 분석 (Throughput Analysis for Blast Protocols under Markov Error Type)

  • 홍정식;홍정완;이창훈
    • 대한산업공학회지
    • /
    • 제23권4호
    • /
    • pp.687-698
    • /
    • 1997
  • In this paper, a Variation of Blast with Go-Back-N(V-BGBN) protocol is proposed, which differs from Blast with Go-Back-N(BGBN) and Blast with Full Retransmission on Error(BFRE) protocols in the retransmission strategy of packets. Performances of these three protocols under correlated packet errors are analyzed. Throughput efficiency of an arbitrary packet is obtained under the assumption that the round trip delay and the packet length are respectively constant. Recursive formula and difference equations are used as analytical tools. Correlation of packet errors is modelled by a two state Markov chain. The throughput efficiencies under these protocols are compared. V-BGBN protocol is shown to be superior to other two protocols in high speed network.

  • PDF

무선 통신망에서의 적응 프레임 길이 제어 방식의 성능 분석 (Performance Analysis of Adaptive Frame Size Control Scheme in Wireless Networks)

  • 김응인
    • 전자공학회논문지 IE
    • /
    • 제47권2호
    • /
    • pp.54-59
    • /
    • 2010
  • 본 논문은 무선 데이터 네트워크에 적용 가능한 적응 프레임 길이 제어 방식을 가진 데이터 링크 프로토콜을 제안한다. 무선 데이터망은 수시로 변화는 에러 환경에 놓여 있다. 이런 에러 환경에서도 잘 적용할 수 있는 가변 프레임 제어 방식을 제안하고 그 성능을 분석하였다. 2상태 마코프 모델을 이용하여 채널 환경을 모델링하였다. 수치해석방식을 통하여 새롭게 제안한 방식이 다양한 종류의 에러환경에서도 좋은 성능을 발휘할 수 있음을 보여 주었다.

Ad Hoc 네트워크를 위한 지역기반 오버레이 멀티캐스트 라우팅 프로토콜의 성능 분석 (A Performance Analysis of Region-based Overlay Multicast Routing Protocol for Ad Hoc Networks)

  • 김갑동;박준희;이광일;김학영;김상하
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1037-1040
    • /
    • 2006
  • This paper presents an efficient overlay multicast routing protocol (ROMP) and its architecture. ROMP using GPS and region map stands on the basis of scalable 2-tiered multicast architecture and maintains a global overlay multicast tree through reactive fashion. With this approach, the coarse-grain location-awareness for an efficient overlay multicasting and the determination of hot-spot area for efficient data delivery are feasible. The simulation results show that the localized control packets of ROMP prevent the overlay control packets from squandering the physical network resources.

  • PDF

임베디드 프로세서를 이용한 계통 보호 IED 설계 (Power system protection IED design using an embedded processor)

  • 윤기돈;손영익;김갑일
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

CAN 프로토콜을 이용한 네트워크 시스템의 성능 분석 (Performance Analysis of a Network System using the CAN Protocol)

  • 김대원;최환수
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제50권5호
    • /
    • pp.218-225
    • /
    • 2001
  • This paper analyses the performance of network system using the CAN(Controller Area Network) protocol. Given messages are assumed to be scheduled by the DMS(Deadline Monotonic Scheduling) algorithm. The mathematical models for time-delay that can be occurred between CAN nodes are defined. The effectiveness of modeling is shown by comparing the difference of time-delay between simulations and practical experiments. We analyse the results according to the variation of factors, such as the number of nodes, the transmission speed, the message size and the number of aperiodic messages through simulation and confirm the real-time performance of lower priority messages. We also investigate the real-time performance of periodic messages when aperiodic message generates.

  • PDF

임상가를 위한 특집 4 - 턱교정수술에서 선수술접근 :적응증과 한계 (Surgery First Approach in Orthognathic Surgery : Indication and limitation)

  • 황대석
    • 대한치과의사협회지
    • /
    • 제50권11호
    • /
    • pp.682-688
    • /
    • 2012
  • Surgery first approach in orthognathic surgery is to proceed the orthognathic surgery without preoperative orthodontic treatment. This approach has many advantages, which include a shorter total treatment period, a high level of patient satisfaction due to immediate post-surgical facial improvement, easy postoperative orthodontic treatment due to early normalization of skeletal muscle, and the rapid tooth movement reflecting the regional accelerated phenomenon. However instability due to transient occlusal interference after surgery make worse of long-term skeletal stability. Especially increasing of vertical occlusion caused by interference of interbicupid and molar happen postsurgical skeletal change. Until now, there is no common consensus about treatment protocol of surgery first approach in orthognathic surgery. The purpose of this paper is to introduce our treatment protocol of the surgery first approach and to evaluate indication and limitation with case analysis.