• Title/Summary/Keyword: 네트워크 시각 프로토콜

Search Result 30, Processing Time 0.024 seconds

Interactive Assistance Continuous Quality Evaluation for Subjective 3D QoE Assessment (주관적 3D QoE 평가를 위한 IACQE 방법 연구)

  • Kim, Tae-Wan;Kang, Ji-Woo;Lee, Sang-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.161-162
    • /
    • 2012
  • 본 논문에서는 주관적 3D quality of experience (QoE) 평가에 적합한 IACQE (Interactive Assistance Continuous Quality Evaluation) 방법을 제안한다. 이 방법은 크게 3D 평가 영상이 재생되는 디스플레이와 평가 도구사이의 device interaction, 평가 도구와 평가 참여자사이의 human interaction process로 구성된다. Device interaction process는 무선 네트워크 프로토콜 (WLAN and WiFi)을 통해 3D 디스플레를 동작시키는 서버와 평가 도구 사이의 정확한 동기화 및 평가결과 기록 등의 작업을 수행하며, human interaction process는 평가 도구로 사용하는 tablet-pc의 촉각, 시각, 청각적인 자극을 통해 기존의 주관적 3D QoE 평가에서 나타날 수 있는 문제점들을 최소화 한다.

  • PDF

A Study on analysis and visualization of data communication protocol by using Sniffing technology. (스니핑 기술을 이용한 데이터 통신 프로토콜 분석 및 시각화에 대한 연구)

  • Song, MooSong;cho, EunJin;Han, HaeRi;Park, Jinho;Kim, Youngjong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.223-224
    • /
    • 2019
  • 데이터가 오고 가는 네트워크를 사용하는 곳들에서는 패킷을 필히 수집하고 분석한다. 하지만 패킷 스캐닝을 통해 공격 대상에 대한 정보를 수집하고 2차적 공격 시나리오를 구상하는데 악용하는 경우가 발생한다. 본 시스템은 IP/TCP를 중심으로 패킷분석에 대한 전문적인 지식이 없어도 쉽게 확인 가능한 프로그램을 제공할 예정이다.

Transmission for IEC 61850 Sampled Values Using Current and Voltage Sensors of Raspberry Pi (라즈베리파이 전류와 전압 센서를 이용한 IEC 61850 샘플 값 전송)

  • Hwang, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.157-162
    • /
    • 2018
  • This study uses sensors and Raspberry Pi to measure the values of current and voltage and transmits the measured sampled values to a network, carrying them in the frame of IEC 61850-9-2. A laboratory model was composed to send the sampled values, using the frame of IEC 61850-9-2. This study conducted a protocol analysis, using Wireshark for the accurate verification of the occurrence of the frame of IEC 61850-9-2. A visual analysis was conducted by displaying the received sampled values of current and voltage on the monitor in graphs. In addition, this study tested if the sampled values of IEC 61850-9-2 sent and received through the network equipment would meet the performance requirements of the message types of IEC 61850.

Design and Implementation of High-quality Video Service with Adaptive Transport for Multi-party Collaborative Environments (다자간 원격 협업을 위한 적응형 전송 기능을 가진 고화질 영상 서비스의 설계 및 구현)

  • Han, Sang-Woo;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1B
    • /
    • pp.26-38
    • /
    • 2006
  • To construct seamless collaborative environments, what all participants intent should be delivered, and visual elements such gesture, facial expression, and ambiance should be shared with all participants. In this paper, we propose high-quality video service to support DV(digital video) and HDV(high-definition DV) based on Access Grid(AG) which is a prevalent collaborative system. The proposed service is designed for employing versatile media tools and codecs with SDP(session description protocol) and SAP(session announcement protocol). We also design network-adaptive video transmission module to mitigate the impact of network fluctuation. This periodically monitors multicast performance and controls frame rate on sender side considering network condition. The experimental results over the test bed show that proposed service enhances quality of AG video service and provides seamless high-quality video transport by mitigating the impact of network fluctuation.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

An Energy-efficient Pair-wise Time Synchronization Protocol for Wireless Networks (에너지 효율적인 무선 네트워크용 상호 시각 동기화 프로토콜)

  • Bae, Shi-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.10
    • /
    • pp.1808-1815
    • /
    • 2016
  • TPSN(Timing-sync Protocol for Sensor Networks), the representative of time synchronization protocol, has been already developed to provide time synchronization among nodes in wireless sensor networks. Even though the TPSN's method has been referenced by so many other time synchronization schemes for resource-constrained networks like wireless sensor networks or low power personal area networks, it has some inefficiency in terms of power consumption and network-wide synchronization time (or called convergence time). The main reason is that each node in TPSN needs waiting delay to solve the collision problem due to simultaneous transmission among competing nodes, which causes more power consumption and longer network convergence time for a network-wide synchronization. In this paper an improved scheme is proposed by changing message exchange method among nodes. The proposed scheme not only shortens network-wide synchronization time, but also reduce collision traffic which lead to needless power consumption. The proposed scheme's performance has been evaluated and compared with an original scheme by simulation. The results are shown to be better than the original algorithm used in TPSN.

A resource reservation method adjusting the delay budgets of a traffic flow allocated to the RSVP-capable routers (RSVP-라우터에 할당되는 트래픽 흐름의 지연규격을 조정하는 자원예약 방식)

  • Kim, Tae-Joon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.7
    • /
    • pp.966-976
    • /
    • 2008
  • Providing Quality-of-Service(QoS) guarantee requires the reservation of resource needed to accommodate the traffic flow of service for which resource reservation protocol(RSVP) was introduced. However, if any RSVP-capable router on the path fails to accommodate the traffic flow due to lack of resource, the flow is not allowed no matter how much surplus resources other routers on the path have. In order to solve this problem, this paper proposes a resource reservation method that can adjust adaptively the delay budget of traffic flow allocated to each RSVP-capable router in which the router uses the recently developed general-time fair queuing scheduler. The results of the simulation applying the proposed method to an evaluation network show that it may yield the gain of up to 90% compared to that in the original one in terms of the number of admitted flows.

  • PDF

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF

Augmented Reality Framework to Visualize Information about Construction Resources Based on Object Detection (웨어러블 AR 기기를 이용한 객체인식 기반의 건설 현장 정보 시각화 구현)

  • Pham, Hung;Nguyen, Linh;Lee, Yong-Ju;Park, Man-Woo;Song, Eun-Seok
    • Journal of KIBIM
    • /
    • v.11 no.3
    • /
    • pp.45-54
    • /
    • 2021
  • The augmented reality (AR) has recently became an attractive technology in construction industry, which can play a critical role in realizing smart construction concepts. The AR has a great potential to help construction workers access digitalized information about design and construction more flexibly and efficiently. Though several AR applications have been introduced for on-site made to enhance on-site and off-site tasks, few are utilized in actual construction fields. This paper proposes a new AR framework that provides on-site managers with an opportunity to easily access the information about construction resources such as workers and equipment. The framework records videos with the camera installed on a wearable AR device and streams the video in a server equipped with high-performance processors, which runs an object detection algorithm on the streamed video in real time. The detection results are sent back to the AR device so that menu buttons are visualized on the detected objects in the user's view. A user is allowed to access the information about a worker or equipment appeared in one's view, by touching the menu button visualized on the resource. This paper details implementing parts of the framework, which requires the data transmission between the AR device and the server. It also discusses thoroughly about accompanied issues and the feasibility of the proposed framework.

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.