• Title/Summary/Keyword: protocol stack

Search Result 172, Processing Time 0.028 seconds

Evaluation Of LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol

  • Paul, Timothy D;Rathinasabapathy, Vimalathithan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1540-1560
    • /
    • 2022
  • Latest technological innovation in the development of compact lower power radios has led to the explosion of Internet of Things. With Wi-Fi, Zigbee and other physical layer protocols offering short coverage area there was a need for a RF protocol that had a larger coverage area with low power consumption. LoRa offers Long Range with lower power consumption. LoRa offers point to point and point to multipoint connections. with Single hop communication in place the need for routing protocols are eliminated. LoRa Wide Area Network stack can accommodate thousands of nodes under a single LoRa gateway with a single hop communication between the end nodes and LoRaWAN gateway. This paper takes an experimental approach to analyze the basic physical layer parameters of LoRa and the practical coverage offered by a LoRaWAN under highly dense urban conditions with variable topography. The insights gained from the practical deployment of the LoRaWAN network, and the subsequent performance analysis is used to design a novel public utility monitoring platform. The second half of the papers is designing a robust platform to integrate both existing wired sensor water meters, current and future generation wireless water meters. The Common Automated Metering Platform is designed to integrate both wired sensors and wireless (LoRaWAN and Wi-Fi) supported water meters. This integrated platform reduces the number of nodes under each LoRaWAN gateway and thus improves the scalability of the network. This architecture is currently designed to accommodate one utility application but can be modified to integrate multi-utility applications.

Design and Implementation of Bio-data Monitering System Based on ISO/IEEE 11073 DIM/REST for IoT Healthcare Service (IoT 헬스케어 서비스를 위한 ISO/IEEE 11073 DIM/REST 기반 생체정보 모니터링 시스템 설계 및 구현)

  • Choi, Ju-Hyun;Chun, Seung-Man;Jang, Dong-Hyun;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.3-12
    • /
    • 2015
  • Recently, various studies have been attempted to provide a biological information monitoring service through integrating with the web service. The medical information transmission standard ISO/IEEE 11073 PHD defines the optimized exchange protocol ISO/IEEE 11073-20601 based on the No-IP to exchange the biometric information between the ISO/IEEE 11073 agent and the manager. It's system structure based on the No-IP using ISO/IEEE 11073-20601 is not suitable for providing a remote biological information monitoring services. That is because it is difficult to provide to control and manage the biological information measurement devices, which have installed IP protocol stack at the remote. Furthermore, ACSE and CMDISE in ISO/IEEE 11073-20601 are not suitable to provide U-healthcare services based on IoT because they are complicated and difficult to implement it caused by the structural complexity. In order to solve the problems, in this paper, we propose the biological information monitoring architecture based on ISO/IEEE 11073 DIM/REST of IoT environment to provide the biological information monitoring service based on IoT. To do this, we designed biological information monitoring system architecture based on IoT and the message exchange protocol of ISO/IEEE 11073 DIM/REST between the ISO/IEEE 11073 agent and the ISO/IEEE 11073 manager. In order to verify the realistic possibility of the proposed system architecture, we developed the service prototype.

An IDS in MANET with Cross Layer Concept (크로스 층에서의 MANET을 이용한 IDS)

  • Kim, Sang-Eun;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.

Improving the Reliability of Beacon Synchronization of IEEE 802.15.4 MAC Protocol using a Reception Time Compensation Scheme (수신 대기시간 보정을 통한 IEEE 802.15.4 MAC 프로토콜의 비컨 동기화 신뢰성 개선)

  • Kim, Hiecheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.3
    • /
    • pp.1-11
    • /
    • 2018
  • This paper explores the reliability issue especially associated with the time-division synchronous communication when a networking stack is implemented using software timers provided by embedded operating systems. Especially, we explore the reliability of beacon synchronization of IEEE 802.15.4. Our experiments based on its practical implementation clearly show that processing delays or losses of hardware timer interrupts used for software timers lead to occasional failures in beacon synchronization. To avoid such failures, we suggest a reception time compensation scheme that turns on the receiver earlier than expected.

An Implementation of a RFID Reader Firmware for ISO/IEC 18000-6 Type C Specification (ISO/IEC 18000-6 Type C 규격에 적합한 리더 펌웨어 개발)

  • Yang, Jung-Kyu;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok;Song, Eui-Seok;Joung, Myoung-Sub;Kwak, Ho-Kil;Ahn, Si-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.927-930
    • /
    • 2007
  • As RFID systems are applied to various fields and applications such as supply chain management, asset management, location based applications etc. the requirements becomes diverse. For example, Much higher performance, TCP/IP protocol stack are required in some applications. However, low end processors based systems such as 8051 processor can not meet such requirements due to their low processing capacity and limited size of memory. In this paper a UHF band RFID system which meets the ISO 18000-6 TYPE C specification with ARM920T-based processor is implemented and tested.

  • PDF

Analysis for Security Vulnerabilities on DSTM Tunneling (DSTM 터널링 보안 취약점 분석)

  • Cho, Hyug-Hyun;Kim, Jeong-Wook;Noh, Bong-Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.215-221
    • /
    • 2007
  • IPv6 is a protocol to solve the address space limitation of IPv4 by IETF. Many transition mechanism to communicate between IPv4 and IPv6 in mixed IPv4/IPv6 network are proposed. DSTM tunneling is a mechanism that dual stack in IPv6 network is able to communicate with node in IPv4 network by dynamic allocating the IPv4 address. This mechanism supports the execution of IPv4 dependent application without modification at IPv6 network. In this paper, we explain the security vulnerability at DSTM network for DHCP attack, TEP attack, and source spoofing attack then describe the result of attacks.

  • PDF

Study on Improvement of UBR Traffic Performance using ABT Block Scheduling in Multicast ATM Networks (멀티캐스트 ATM망에서 ABT 블록스케쥴링을 이용한 UBR 트래픽 성능 개선에 관한 연구)

  • 임동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1665-1674
    • /
    • 2000
  • This paper treats the interworking of LAN-based networks like TCP over the ATM protocol stack in an ATM multicast session. Multicast connection will cause CIP since multicast group members form a connection tree by some tree methods and share the connected tree. The paper solve the CIP problem through a block-by-block transmission using ABT/IT method. ABT/IT RM cell is modified and block scheduling algorithm considering the traffic types is applied to each ATM switch using the enhanced RM cell. Block scheduling algorithm will avoid the indiscriminate discard of UBR traffic when congestion occurs and it can provide an efficient and fair service. The paper builds a block scheduler system and suggests the block scheduling algorithm for a multicast session in an ATM switch. UBR traffics arriving at the switch trough each VC is classified by the traffic type and stored at class buffer and thereafter indisciminately transmitted. When block scheduling algorithm is applied it will improve the UBR traffic performance such as end-to-end delay cell block loss ration etc. This paper evaluated the performance of block scheduling algorithm through the simulation using the C language and data structure.

  • PDF

Development of an Embedded Bluetooth Audio Streaming Solution on SoC Platform (SoC 플랫폼 상에서 임베디드 블루투스 오디오 스트리밍 솔루션 개발)

  • Kim, Tae-Hyoun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.589-598
    • /
    • 2006
  • In this paper, we describe the development and optimization of an embedded Biuetooth solution on an SoC platform for real-time audio streaming over a Bluetooth wireless link. The solution includes embedded Bluetooth protocol stack and profile simplemented on a virtual operating system for portability, and other optimization techniques to fully exploit the benefits of multimedia-oriented SoC. The optimization techniques implemented in this paper are memory access minimization by using on-chip scratch pad memory, codec library optimization with DSP and parallel memory access instruction set, and dynamic audio quality adjustment regarding current wireless link status. Experimental results show that the optimized solution presented in this paper can support high-qualify audio streaming without the support of external memory.

A Study of Guarantee Technique Using Buffer Node in Ad Hoc Network (Ad Hoc 망에서 버퍼 노드를 이용한 QoS 보장 기법에 관한 연구)

  • 김관중
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.73-81
    • /
    • 2003
  • An Ad Hoc network is a dynamic multi-hop wireless network that is established by a group of mobile hosts on a shared wireless channel by virtue of their proximity to each other. Since wireless transmissions are locally broadcast in the region of the transmitting host, hosts that are in close proximity can hear each other and are said to be neighbors. The transitive closure of the neighborhood of all the hosts in the set of mobile hosts under consideration forms an Ad Hoc network. Thus, each host is potentially a router and it is possible to dynamically establish routes by chaining together a sequence of neighboring hosts from a source to a destination in the Ad Hoc network. In a network, various real-time services require the network to guarantee the Quality of Services provided to the receiver. End-to-end QoS can be provided most efficiently when each layer of the protocol stack translates the requirements of the application into layer classified requirements and satisfies them. In this study, a mechanism to guarantee the QoS in Ad Hoc networks with buffer nodes is proposed. They effectively prevent traffic congestion and yield better transmission rate. In this way QoS is enhanced.

  • PDF

A Method for Efficient Signaling Interworking between PSTN/IP Networks (PSTN-IP Networks의 효율적 신호 연동 방안)

  • 고남영;이재완;황민호;서석철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.93-96
    • /
    • 2001
  • For interconnecting PSTN and IP Networks, We made a comparative analysis of signaling interworking and also studied SS7 Signaling process as a method for signaling interworking for using the establishment of PATN/IP network and seting up a phone call. As a methode of signalning interworking for linking an intelligent net-service between PSTN/IP Networks, we made researches of the merits and demerits about the access of INAP/SS7 using PSTN SCP and the call-routing of intelligent net-service using PSTM SSP in an IP network. We made a study of the protocol stack in IETF SIGTRAN as the realization for this

  • PDF