WO2013129752A1 - 통신 장치 및 통신 방법 - Google Patents
통신 장치 및 통신 방법 Download PDFInfo
- Publication number
- WO2013129752A1 WO2013129752A1 PCT/KR2012/008654 KR2012008654W WO2013129752A1 WO 2013129752 A1 WO2013129752 A1 WO 2013129752A1 KR 2012008654 W KR2012008654 W KR 2012008654W WO 2013129752 A1 WO2013129752 A1 WO 2013129752A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication device
- safety
- data
- unique identifier
- error detection
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/09—Error detection only, e.g. using cyclic redundancy check [CRC] codes or single parity bit
- H03M13/095—Error detection codes other than CRC and single parity bit codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/24—Testing correct operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/40—Specific encoding of data in memory or cache
- G06F2212/403—Error protection encoding, e.g. using parity or ECC codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/09—Error detection only, e.g. using cyclic redundancy check [CRC] codes or single parity bit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0041—Arrangements at the transmitter end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0075—Transmission of coding parameters to receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Definitions
- the present invention relates to a communication device and a communication method.
- the present invention relates to a safety communication device and a safety communication method.
- industrial control systems should be able to determine whether there is an error in the data being transmitted with a probability above a prescribed level.
- industrial control systems should be able to determine with a specified level of probability that data repetitions that occur naturally and not by the intention of the malicious have occurred. .
- industrial control systems should be able to determine whether there is a loss in part of the transmitted data with a probability above a prescribed level.
- the error probability in order to satisfy SIL3, the error probability must satisfy 10 -9 .
- the technical problem to be achieved by the present invention is to provide a communication device and communication method that satisfies the integrity required by the industrial control system.
- the first communication device uses a unique identifier of the first communication device and a unique identifier of the second communication device. Generating a security unique identifier for verifying validity of a connection between the first communication device and the second communication device; and a data error for the first communication device to detect an error using the safety unique identifier and data. Calculating a detection code, the first communication device generating a packet including the data and the data error detection code, and the first communication device sending the packet to the second communication device It includes.
- a communication method in which a first communication device receives data from a second communication device includes: receiving, by the first communication device, a packet from the second communication device; Acquiring data and a received data error detection code from the packet; calculating, by the first communication device, a comparison data error detection code using the data; and detecting, by the first communication device, the received data error. Determining whether there is an error in the packet based on a code and the comparison data error detection code.
- FIG. 1 is a block diagram showing a safety communication device according to an embodiment of the present invention.
- FIG. 2 is a ladder diagram showing a communication method according to an embodiment of the present invention.
- FIG. 3 is a view for explaining a unique identifier according to an embodiment of the present invention.
- FIG. 4 is a view for explaining a process of generating a safety unique identifier according to an embodiment of the present invention.
- FIG 5 shows the structure of a safety protocol data unit according to an embodiment of the invention.
- FIG. 6 shows a structure of an Ethernet frame according to an embodiment of the present invention.
- FIG. 1 is a block diagram showing a safety communication device according to an embodiment of the present invention.
- the safety communication apparatus 100 may include a safety unique identifier generator 101, an error detection code calculator 103, a protocol data unit generator 105, and an Ethernet. And a frame generator 107, a data transmitter 109, a data receiver 111, an Ethernet frame analyzer 113, a protocol data unit analyzer 115, an error detector 117, and a controller 121. .
- the safety unique identifier generation unit 101 may generate a safety unique ID (SUID) by combining the unique identifier of the safety communication device 100 and the unique identifier of the other safety communication device 100.
- SUID safety unique ID
- the controller 121 may generate safety data and provide the generated safety data to the error detection code calculator 103.
- the error detection code calculator 103 may calculate a data error detection code for the safety unique identifier and the safety data using the generated safety unique identifier and the safety data.
- the protocol data unit generation unit 105 may generate a protocol data unit (PDU) including the calculated data error detection code, safety data, and safety PDU header.
- PDU protocol data unit
- the Ethernet frame generator 107 may generate an Ethernet frame including the generated safety protocol data unit.
- the data transmitter 109 may transmit the generated Ethernet frame to another safety communication device.
- the data receiver 111 may receive an Ethernet frame including a safety protocol data unit from another safety communication device.
- the Ethernet frame analyzer 113 may acquire the safety protocol data unit by analyzing the received Ethernet frame.
- the protocol data unit analyzer 115 may analyze the protocol data unit to obtain an error detection code and safety data.
- the error detector 117 may calculate a comparison data error detection code using safety data.
- the error detector 117 may detect an error by comparing the calculated error detection code with the obtained error detection code.
- the controller 121 may control the overall operation of the safety communication device 100.
- the controller 121 may transition the operation state of the safety communication device 100 to the failure-safe state.
- the safety communication device 100 suspends safety communication until it receives a user input for a reset.
- the safety communication device 100 may or may not stop communications other than communications relating to safety data, but at least interrupts communications associated with safety data.
- the controller 121 may consume the received safety data and generate safety data to be transmitted next. If the received safety data is for a request, the controller 121 generates safety data for the response. If the received safety data is for a response, the controller 121 generates safety data for the next request.
- FIG. 2 is a ladder diagram showing a communication method according to an embodiment of the present invention.
- the first safety communication device 100A and the second safety communication device 100B communicate with each other, and the first safety communication device 100A communicates a safety protocol to the second safety communication device 100B.
- the second safety communication device 100B sends a safety protocol data unit response to the first safety communication device 100A.
- the communication method according to an embodiment of the present invention relates to a communication method for mutual authentication (or interconnection) before transmitting and receiving actual data between the first safety communication device 100A and the second safety communication device 100B. will be.
- the safety unique identifier generating unit 101 of the safety communication device 100 combines the unique identifier of the first safety communication device 100A and the unique identifier of the second safety communication device 100B to provide a safety unique identifier (SUID).
- Safety Unique ID is generated (S101). That is, the safety unique identifier generation unit 101 of the first safety communication device 100A knows in advance the unique identifier of the second safety communication device 100B to be connected, and the safety safety identifier 100B of the second safety communication device 100B.
- the unique identifier can be used to create a safety unique identifier.
- the safety unique identifier generation unit 101 of the second safety communication device 100B knows in advance the unique identifier of the first safety communication device 100A to which the connection is to be made.
- the unique identifier can be used to create a safety unique identifier.
- the safety unique identifier generator 101 of the first safety communication device 100A may know in advance the unique identifier of the safety communication device other than the second safety communication device 100B, and the first safety communication.
- a unique safety unique identifier may be generated and possessed by combining the unique identifier of the device 100A and the unique identifier of the other safety communication device.
- FIG. 3 is a diagram illustrating a unique identifier according to an embodiment of the present invention
- FIG. 4 is a diagram illustrating a process of generating a safety unique identifier according to an embodiment of the present invention.
- a unique identifier may be made of a combination of a user value and a MAC address.
- the user value may be any one of a predetermined value according to the user's setting, a specific range of values specified according to the user's setting, an identifier of the safety communication device, and an address of the safety communication device.
- the user value shown in FIG. 3 may be a value of a device ID.
- the device identifier may mean an identifier of the safety communication device.
- the MAC address may contain information for Ethernet connection.
- the size of the unique identifier may be 64 bits, but is not limited thereto.
- the size of the device identifier may be 16 bits and the size of the MAC address may be 48 bits, but it is not limited thereto.
- the safety unique identifier generating unit 101 of the first safety communication device 100A includes a source device ID, a source MAC address, and a destination device identifier.
- a security unique identifier may be generated using a destination device ID and a destination MAC address.
- the safety unique identifier may be used to confirm the validity of connection for communication between the first safety communication device 100A and another safety communication device.
- the first safety communication device 100A and the other safety communication device have safety unique identifiers corresponding to each other, the validity of the connection may be confirmed between the first safety communication device 100A and the other safety communication device.
- the safety unique identifier generation unit 101 of the first safety communication device 100A uses a source device identifier, a source MAC address, a destination device identifier and a destination MAC address.
- a security unique identifier (SUID) can be generated.
- SUID f (source MAC address and device ID, destination MAC address and device ID)
- the safety unique identifier generation unit 101 of the first safety communication device 100A may include a source device identifier of the unique identifier of the first safety communication device 100A and a unique identifier of the second safety communication device 100B.
- the device identifier for the safety unique identifier is generated by combining the destination device identifier, and the MAC address of the unique identifier of the first safety communication apparatus 100A and the MAC address of the unique identifier of the second safety communication apparatus 100B are combined to ensure safety.
- a safety unique identifier can be generated.
- the safety inter-device security may be satisfied through the device identifier for the generated safety unique identifier, and the uniqueness between the safety communication devices may be satisfied through the MAC address for the generated safety unique identifier.
- the first safety communication device 100A transmits safety data and the second safety communication device 100B receives safety data
- the first safety communication device 100A is the source, and the second safety communication device 100B is It becomes a destination.
- the safety unique identifier is a media access control (MAC) address of the first safety communication device 100A, a device identifier of the first safety communication device 100A, and a media access control of the second safety communication device 100B.
- MAC media access control
- the size of the generated safety unique identifier may be 8 octets, but need not be limited thereto.
- One octet generally means eight bits.
- the device identifier of the generated safety unique identifier may have a size of 2 octets and a MAC address of 6 octets, but is not limited thereto.
- the control unit 121 of the first safety communication device 100A generates safety data for a request (S103).
- the control unit 121 of the first safety communication device 100A may generate safety header data related to the safety data together with the requested safety data.
- the error detection code calculation unit 103 of the first safety communication device 100A uses the generated safety unique identifier and the safety data to generate a data error detection code for the safety unique identifier and the safety data.
- data error detection code is calculated (S105).
- the error detection code calculation unit 103 of the first safety communication device 100A may calculate a header error detection code for safety header data using the safety header data.
- the error detection code may be calculated through a hash function, and a cyclic redundancy check (CRC) may be used as the hash function.
- the error detection code may be a cyclic redundancy check value.
- the error detection code calculation unit 103 of the first safety communication device 100A may designate a header error detection code HEADER_CRC, a header field, and a safety unique identifier. Can be calculated using a sequence number.
- Equation 1 f represents a hash function.
- the safety unique identifier is used only for the calculation of the error detection code and may not be included in the safety PDU.
- the sequence number may indicate the sequence number of the safety PDU.
- the sequence number used for calculating the error detection code may be a virtual sequence number not included in the safety PDU. That is, although the 1st safety communication apparatus 100A uses a virtual sequence number for calculation of an error detection code, it does not transmit to the 2nd safety communication apparatus 100B.
- the error detection code calculation unit 103 of the first safety communication device 100A uses safety data, a connection unique identifier (SUID), and a sequence number.
- the data error detection code DATA_CRC may be calculated.
- DATA_CRC: f (SUID, Sequence_Number, Safety_Data)
- Equation 3 f represents a hash function.
- the protocol data unit generation unit 105 of the first safety communication device 100A generates a safety protocol data unit (PDU) including safety data and a calculated data error detection code (S107).
- the safety protocol data unit may further include safety header data and a calculated header error detection code.
- FIG. 5 shows a structure of a safety protocol data unit according to an embodiment of the present invention.
- the safety protocol data unit includes a safety PDU header and a safety PDU payload in order.
- the safety PDU header includes a safety header field followed by a header error detection code.
- the safety PDU header may be placed at the very front of the safety protocol data unit.
- the safety PDU header contains a command field and a reservation field in order.
- the safety data may be related to a safety PDU.
- the safety data may be related to the command field.
- the size of the safety header field is 4 octets
- the size of the command field is 2 octets
- the size of the reserved field is 2 octets
- the size of the header error detection code is 4 octets.
- the size of the data error detection code is 4 octets, but need not be limited to this.
- One octet generally means eight bits.
- Table 2 shows an example of command field values according to an embodiment of the present invention.
- the safety data may indicate a reset command. If the value of the command field is 0x02, the safety data may indicate a connection command. If the value of the command field is 0x03, the safety data may indicate a parameter transfer command. If the value of the command field is 0x04, the safety data may indicate a data transfer command.
- the embodiment of FIG. 2 may correspond to a communication method in a connection state in which a command field has a value corresponding to connection.
- the first safety communication device 100A may correspond to an initiator
- the second safety communication device 100B may correspond to a responder.
- the initiator may transmit only the request safety data to the responder without transmitting the response safety data.
- the responder may send only the response safety data corresponding to the initiator's request safety data to the initiator without transmitting the request safety data.
- the reserved field may be used later for other purposes.
- the Ethernet frame generation unit 107 of the first safety communication device 100A generates an Ethernet frame including the request safety data (S109).
- the Ethernet frame related to the request may include the generated safety protocol data unit. Referring to Figure 6 will be described the structure of an Ethernet frame according to an embodiment of the present invention.
- FIG. 6 shows a structure of an Ethernet frame according to an embodiment of the present invention.
- an Ethernet frame includes an Ethernet header, an Ethernet payload, and a frame check sequence (FCS) in that order.
- the Ethernet frame contains a safety PDU as the payload.
- the Ethernet frame header includes a preamble field, a destination address field, a source address field, and a type field.
- the destination address field contains the address of the safety communication device corresponding to the destination, and the source address field contains the address of the safety communication device corresponding to the source.
- the frame check sequence may be generated using the data in the Ethernet header and the data in the payload. FIG. 2 is described again.
- the data transmission unit 109 of the first safety communication device 100A transmits the Ethernet frame including the requested safety data to the second safety communication device 100B (S111). In this way, the data transmission unit 109 may transmit the generated safety protocol data unit to the second safety communication device 100B.
- the Ethernet frame transmitted to the second safety communication device 100B does not include the generated connection unique identifier.
- the data receiving unit 111 of the second safety communication device 100B receives the Ethernet frame including the safety protocol data unit including the requested safety data from the first safety communication device 100A (S113).
- the Ethernet frame may have a structure as shown in FIG.
- the Ethernet frame analyzer 113 of the second safety communication device 100B analyzes the received Ethernet frame to obtain a safety protocol data unit (S115).
- the safety protocol data unit may have a structure as shown in FIG. 7.
- the protocol data unit analyzer 115 of the second safety communication device 100B analyzes the protocol data unit to obtain safety header data, a received header error detection code, a request safety data, and a received data error detection code (S117).
- the error detection unit 117 of the second safety communication device 100B calculates a comparison data error detection code using the requested safety data (S119).
- the error detection unit 180 of the second safety communication device 100B may calculate the comparison header error detection code by using the safety header data. As described above, the error detection unit of the second safety communication device 100B is used. 117 may calculate a comparison header error detection code for error detection of a header data field using the header data.
- the error detection unit 117 of the second safety communication device 100B may calculate a comparison header error detection code as shown in Equation (2).
- the error detection unit 117 of the second safety communication device 100B may calculate a comparison data error detection code as shown in Equation (3).
- the error detection unit 117 of the second safety communication device 100B detects an error by comparing the calculated error detection code with the obtained error detection code (S121).
- the error detection unit 117 may determine that no error has occurred in the safety data. Otherwise, when the comparison data error detection code is different from the received data error detection code or the comparison header error detection code is different from the reception header error detection code, the error detection unit 117 may determine that an error has occurred in the safety data. .
- the error detection unit 117 is configured to secure the first safety communication device 100A and the second safety. It can be confirmed that the connection unique identifiers between the communication devices 100B match.
- the error detection unit 117 determines the first safety communication device 100A and the second. It may be confirmed that the connection unique identifiers between the safety communication devices 100B do not match. If it is determined that an error has occurred in the safety data, the control unit 121 of the second safety communication device 100B may determine that the safety communication device 100 is connected. The operating state of the transition to a fail-safe state (S123). In this fail-safe state, the safety communication device 100 suspends safety communication until it receives a user input for a reset.
- the safety communication device 100 may or may not stop communication other than communication related to safety data, but at least stops communication related to safety data. If it is determined that no occurrence has occurred, the control unit 121 of the second safety communication device 100B consumes the received request safety data (S125), and generates response safety data to be transmitted next (S127).
- the error detection code calculation unit 101, the protocol data unit generation unit 105, the Ethernet frame generation unit 107, and the data transmission unit 109 of the second safety communication device 100B perform the operations in step S101 (S109). As described above, an Ethernet frame including a response safety PDU including response safety data is generated and transmitted to the first safety communication device 100A (S129).
- the above-described communication method may be implemented as code that can be read by a processor in a medium in which a program is recorded.
- processor-readable media include ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage, and the like, and may be implemented in the form of a carrier wave (for example, transmission over the Internet). Include.
- the above-described communication apparatus is not limited to the configuration and method of the above-described embodiments, but the embodiments may be configured by selectively combining all or some of the embodiments so that various modifications may be made. It may be.
Abstract
Description
SIL4 | >= 10-9, < 10-8 |
SIL3 | >= 10-8, < 10-7 |
SIL2 | >= 10-7, < 10-6 |
SIL1 | >= 10-6, < 10-5 |
Command | Description |
0x01 | RESET |
0x02 | CONNECTION |
0x03 | PARAMETER |
0x04 | DATA |
Claims (12)
- 제1 통신 장치가 제2 통신 장치에 데이터를 전송하는 통신 방법에 있어서,상기 제1 통신 장치가, 상기 제1 통신 장치의 고유 식별자와 상기 제2 통신 장치의 고유 식별자를 이용하여 상기 제1 통신 장치와 상기 제2 통신 장치 간 연결의 유효성을 확인하기 위한 안전 고유 식별자를 생성하는 단계;상기 제1 통신 장치가, 상기 안전 고유 식별자 및 데이터를 이용하여 오류 검출을 위한 데이터 오류 검출 코드를 계산하는 단계;상기 제1 통신 장치가, 상기 데이터 및 상기 데이터 오류 검출 코드를 포함하는 패킷을 생성하는 단계; 및상기 제1 통신 장치가, 상기 패킷을 상기 제2 통신 장치에 전송하는 단계를 포함하는통신 방법.
- 제1항에 있어서,상기 패킷은 상기 안전 고유 식별자만을 전송하기 위한 필드를 포함하지 않는통신 방법.
- 제1항에 있어서,상기 제1 통신 장치의 고유 식별자는 소스 디바이스 식별자 및 소스 MAC 주소로 구성되고,상기 제2 통신 장치의 고유 식별자는 목적지 디바이스 식별자 및 목적지 MAC 주소로 구성된통신 방법.
- 제3항에 있어서,상기 안전 고유 식별자를 생성하는 단계는상기 소스 디바이스 식별자와 상기 목적지 디바이스 식별자를 조합하여 상기 안전 고유 식별자를 위한 디바이스 식별자를 생성하는 단계와상기 소스 MAC 주소와 상기 목적지 디바이스 MAC 주소를 조합하여 상기 안전 고유 식별자를 위한 MAC 주소를 생성하는 단계와상기 디바이스 식별자와 상기 MAC 주소를 결합하여 상기 안전 고유 식별자를 생성하는 단계를 포함하는통신 방법.
- 제1항에 있어서,상기 제1 통신 장치가, 헤더 데이터, 상기 연결 고유 식별자 및 시퀀스 번호를 이용하여 상기 헤더 데이터의 오류 검출을 위한 헤더 오류 검출 코드를 계산하는 단계를 더 포함하고,상기 패킷을 생성하는 단계는,상기 헤더 데이터, 상기 헤더 오류 검출 코드, 상기 데이터 및 상기 데이터 오류 검출 코드를 포함하는 패킷을 생성하는 단계를 포함하는통신 방법.
- 제1 통신 장치가 제2 통신 장치로부터 데이터를 수신하는 통신 방법에 있어서,제1 통신 장치가, 패킷을 상기 제2 통신 장치로부터 수신하는 단계;상기 제1 통신 장치가, 상기 패킷으로부터 데이터와 수신 데이터 오류 검출 코드를 획득하는 단계;상기 제1 통신 장치가, 상기 데이터를 이용하여 비교 데이터 오류 검출 코드를 계산하는 단계; 및상기 제1 통신 장치가, 상기 수신 데이터 오류 검출 코드와 상기 비교 데이터 오류 검출 코드에 기초하여 상기 패킷에 오류가 있는지를 판단하는 단계를 포함하는통신 방법.
- 제6항에 있어서,상기 패킷은 상기 제1 통신 장치와 상기 제2 통신 장치 간 연결의 유효성을 확인하기 위한 안전 고유 식별자를 포함하지 않는통신 방법.
- 제6항에 있어서,상기 패킷에 오류가 있는지를 판단하는 단계는,상기 비교 오류 검출 코드를 상기 수신 데이터 오류 검출 코드와 비교하는 단계와,상기 비교 데이터 오류 검출 코드가 상기 수신 데이터 오류 검출 코드와 동일한 경우에, 상기 패킷에 오류가 발생하지 않았다고 판단하는 단계와,상기 비교 데이터 오류 검출 코드가 상기 수신 데이터 오류 검출 코드와 다른 경우에, 상기 패킷에 오류가 발생했다고 판단하는 단계를 포함하는통신 방법.
- 제7항에 있어서,상기 안전 고유 식별자는상기 제1 통신 장치의 고유 식별자와 상기 제2 통신 장치의 고유 식별자의 조합으로 구성된통신 방법.
- 제9항에 있어서,상기 제1 통신 장치의 고유 식별자는 목적지 디바이스 식별자 및 목적지 MAC 주소로 구성된상기 제2 통신 장치의 고유 식별자는 소스 디바이스 식별자 및 소스 MAC 주소로 구성되고,통신 방법.
- 제10항에 있어서,상기 안전 고유 식별자는상기 소스 디바이스 식별자와 상기 목적지 디바이스 식별자를 조합하여 생성된 디바이스 식별자와상기 소스 MAC 주소와 상기 목적지 디바이스 MAC 주소를 조합하여 생성된 MAC 주소를 결합하여 생성된통신 방법.
- 제6항 또는 제8항 중 어느 한 항에 있어서,상기 패킷에 오류가 있다고 판단한 경우에, 리셋을 위한 사용자 입력을 수신할 때까지 통신을 중단하는 상태로 동작 상태를 변경하는 단계를 더 포함하는통신 방법.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014559812A JP6193896B2 (ja) | 2012-03-02 | 2012-10-22 | 通信装置及び通信方法 |
EP12869882.6A EP2822204B1 (en) | 2012-03-02 | 2012-10-22 | Communication device and communication method |
ES12869882T ES2727674T3 (es) | 2012-03-02 | 2012-10-22 | Dispositivo de comunicación y método de comunicación |
KR1020147027919A KR101639930B1 (ko) | 2012-03-02 | 2012-10-22 | 통신 장치 및 통신 방법 |
CN201280072946.8A CN104272625B (zh) | 2012-03-02 | 2012-10-22 | 通信设备及通信方法 |
US14/382,535 US10142058B2 (en) | 2012-03-02 | 2012-10-22 | Communication device and communication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261605768P | 2012-03-02 | 2012-03-02 | |
US61/605,768 | 2012-03-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013129752A1 true WO2013129752A1 (ko) | 2013-09-06 |
Family
ID=49082917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2012/008654 WO2013129752A1 (ko) | 2012-03-02 | 2012-10-22 | 통신 장치 및 통신 방법 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10142058B2 (ko) |
EP (1) | EP2822204B1 (ko) |
JP (1) | JP6193896B2 (ko) |
KR (1) | KR101639930B1 (ko) |
CN (1) | CN104272625B (ko) |
ES (1) | ES2727674T3 (ko) |
WO (1) | WO2013129752A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170091445A1 (en) * | 2015-09-26 | 2017-03-30 | Intel Corporation | Technologies for software attack detection using encoded access intent |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10404625B2 (en) * | 2013-10-29 | 2019-09-03 | Intel Corporation | Ethernet enhancements |
DE102016102282B4 (de) * | 2016-02-10 | 2024-01-04 | Phoenix Contact Gmbh & Co. Kg | Verfahren und Vorrichtung zum Überwachen einer Datenverarbeitung und -übertragung in einer Sicherheitskette eines Sicherheitssystems |
EP3570499B1 (de) * | 2018-05-15 | 2021-04-07 | Siemens Aktiengesellschaft | Verfahren zur funktional sicheren verbindungsidentifizierung |
US11218360B2 (en) | 2019-12-09 | 2022-01-04 | Quest Automated Services, LLC | Automation system with edge computing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030029980A (ko) * | 2001-07-13 | 2003-04-16 | 마츠시타 덴끼 산교 가부시키가이샤 | 송신 장치, 수신 장치, 송신 방법, 수신 방법, 데이터전송 방법 및 데이터 전송 장치 |
KR20080050908A (ko) * | 2006-12-04 | 2008-06-10 | 삼성전자주식회사 | 에러 검출 코드를 이용한 데이터 트레이닝 방법 및 이에적합한 시스템 |
KR20120010961A (ko) * | 2010-07-27 | 2012-02-06 | 한국전자통신연구원 | 멀티캐스트 관리 방법 및 장치 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6151253A (ja) * | 1984-08-20 | 1986-03-13 | Nec Corp | 誤り訂正回路 |
AU716341B2 (en) * | 1996-06-12 | 2000-02-24 | Au Optronics Corporation | Monitoring system of multimedia communication terminal |
US6201811B1 (en) | 1998-03-24 | 2001-03-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Transferring Identifier information in a telecommunications system |
US6608861B1 (en) * | 1998-10-05 | 2003-08-19 | Motorola, Inc. | Data terminal and coding method for increased data packet reliability in a frequency hopping system |
JP3883562B2 (ja) * | 2003-08-20 | 2007-02-21 | 日本電信電話株式会社 | パケット通信方法およびパケット通信装置 |
JP4112520B2 (ja) * | 2004-03-25 | 2008-07-02 | 株式会社東芝 | 訂正符号生成装置、訂正符号生成方法、誤り訂正装置、および誤り訂正方法 |
DE102004018556B4 (de) * | 2004-04-14 | 2010-06-10 | Atmel Automotive Gmbh | Verfahren zur Datenkommunikation zwischen einer Basisstation und einem Transponder |
CN101107864A (zh) | 2005-01-24 | 2008-01-16 | 汤姆森许可贸易公司 | 使用crc奇偶校验码的视频差错检测技术 |
WO2007011007A1 (en) | 2005-07-15 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | Link management system |
US20080195912A1 (en) * | 2007-02-14 | 2008-08-14 | Nokia Corporation | Method of communicatoin |
US8769129B2 (en) * | 2007-11-14 | 2014-07-01 | Juniper Networks, Inc. | Server initiated secure network connection |
JP5163298B2 (ja) * | 2008-06-04 | 2013-03-13 | 富士通株式会社 | 情報処理装置、データ伝送装置及びデータ伝送方法 |
JP4985565B2 (ja) | 2008-06-30 | 2012-07-25 | 富士通株式会社 | 送受信回路、受信回路及び送受信回路の制御方法 |
CN101355403B (zh) | 2008-09-09 | 2011-04-20 | 山东大学 | 通用成帧协议中检错纠错的装置及其控制方法 |
US8274980B2 (en) * | 2009-02-26 | 2012-09-25 | International Business Machines Corporation | Ethernet link aggregation |
JP2010206394A (ja) * | 2009-03-02 | 2010-09-16 | Mitsubishi Electric Corp | 安全ネットワーク装置および安全ネットワーク |
JP5419493B2 (ja) * | 2009-03-03 | 2014-02-19 | キヤノン株式会社 | データ処理装置、データ処理装置の制御方法、およびプログラム |
US9094175B2 (en) * | 2010-07-16 | 2015-07-28 | Qualcomm, Incorporated | Method and apparatus for saving power by using signal field of preamble |
WO2012012848A1 (en) * | 2010-07-30 | 2012-02-02 | Automatic Technology (Australia) Pty Ltd | Integrated controller for closure operator unit |
-
2012
- 2012-10-22 CN CN201280072946.8A patent/CN104272625B/zh active Active
- 2012-10-22 JP JP2014559812A patent/JP6193896B2/ja active Active
- 2012-10-22 EP EP12869882.6A patent/EP2822204B1/en active Active
- 2012-10-22 ES ES12869882T patent/ES2727674T3/es active Active
- 2012-10-22 US US14/382,535 patent/US10142058B2/en active Active
- 2012-10-22 KR KR1020147027919A patent/KR101639930B1/ko active IP Right Grant
- 2012-10-22 WO PCT/KR2012/008654 patent/WO2013129752A1/ko active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030029980A (ko) * | 2001-07-13 | 2003-04-16 | 마츠시타 덴끼 산교 가부시키가이샤 | 송신 장치, 수신 장치, 송신 방법, 수신 방법, 데이터전송 방법 및 데이터 전송 장치 |
KR20080050908A (ko) * | 2006-12-04 | 2008-06-10 | 삼성전자주식회사 | 에러 검출 코드를 이용한 데이터 트레이닝 방법 및 이에적합한 시스템 |
KR20120010961A (ko) * | 2010-07-27 | 2012-02-06 | 한국전자통신연구원 | 멀티캐스트 관리 방법 및 장치 |
Non-Patent Citations (1)
Title |
---|
NAGAMI, K. ET AL.: "Toshiba's Flow Attribute Notification Protocol (FANP) Specification", IETF RFC 2129., April 1997 (1997-04-01), XP015007913 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170091445A1 (en) * | 2015-09-26 | 2017-03-30 | Intel Corporation | Technologies for software attack detection using encoded access intent |
US10621336B2 (en) * | 2015-09-26 | 2020-04-14 | Intel Corporation | Technologies for software attack detection using encoded access intent |
Also Published As
Publication number | Publication date |
---|---|
KR101639930B1 (ko) | 2016-07-14 |
EP2822204B1 (en) | 2019-03-13 |
EP2822204A1 (en) | 2015-01-07 |
ES2727674T3 (es) | 2019-10-17 |
EP2822204A4 (en) | 2015-09-09 |
CN104272625B (zh) | 2020-07-14 |
JP2015508978A (ja) | 2015-03-23 |
CN104272625A (zh) | 2015-01-07 |
KR20140144203A (ko) | 2014-12-18 |
JP6193896B2 (ja) | 2017-09-06 |
US10142058B2 (en) | 2018-11-27 |
US20150113363A1 (en) | 2015-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013129752A1 (ko) | 통신 장치 및 통신 방법 | |
EP3128699B1 (en) | Network communication system, fraud detection electronic control unit and fraud handling method | |
WO2019117349A1 (ko) | LoRaWAN 기반 대규모 시설물 관리를 위한 사물인터넷 네트워크 관리방법 및 이를 적용한 사물인터넷 네트워크 서버 및 단말 | |
US20090103441A1 (en) | Communication apparatus and switching device | |
WO2014081205A1 (ko) | 불법 ap 검출 시스템 및 그의 검출 방법 | |
US11637743B2 (en) | Communications device and method of communications | |
EP2548330B1 (en) | Method of conducting safety-critical communications | |
WO2013129751A1 (ko) | 통신 장치 및 통신 방법 | |
US20070242682A1 (en) | Information processing device, information processing method, program, and recording medium | |
WO2013129750A1 (ko) | 통신 장치 및 통신 방법 | |
WO2021107382A1 (ko) | 화재 감지 시스템 | |
WO2022085057A1 (ja) | 中継装置、通信ネットワークシステム及び通信制御方法 | |
Zhou et al. | Design and implementation of functional safety fieldbus communication protocol | |
WO2013129753A1 (ko) | 통신 장치 및 통신 방법 | |
WO2023027200A1 (ko) | 통신 네트워크, 이에 연결된 노드를 식별하는 방법 및 장치 | |
US20090300187A1 (en) | Transmission device having connection confirmation function | |
WO2017105087A1 (ko) | 통신 시스템에서 데이터 송수신 방법 및 장치 | |
WO2023286908A1 (ko) | 비트를 변조하는 방법 및 장치와, 메시지를 표현하는 방법 및 장치 | |
KR101389604B1 (ko) | 통신 장치 및 통신 방법 | |
WO2018074631A1 (ko) | Can 통신을 이용한 통합방송시스템 | |
WO2017043771A1 (ko) | 지능형 원격 검침 시스템용 프로토콜 처리 장치 및 방법 | |
WO2014082193A1 (zh) | 不平衡区用户设备随机接入方法、基站及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12869882 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014559812 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14382535 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012869882 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20147027919 Country of ref document: KR Kind code of ref document: A |