• Title/Summary/Keyword: 페이로드

Search Result 136, Processing Time 0.025 seconds

Design and Implementation of RTP payload format for MPEG-4 Video Streams (MPEG-4 비디오 전송을 위한 RTP 페이로드 설계 및 구현)

  • Kwak, Seung-Hoon;Shin, Seung-Ho;Park, Dong-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1501-1504
    • /
    • 2001
  • MPEG-4 비디오 스트림을 전송하기 위해 RTP 프로토콜을 사용할 경우 RTP 패킷에 MPEG-4 비디오 스트림을 수용하기에 적절한 페이로드 포맷이 정의되어야 한다. RTP 페이로드에 MPEG-4 비디오 스트림을 수용하기 위한 기존의 방법은 MPEG-4 코덱으로부터 생성된 비디오 스트림의 형태에 따라 많은 종류의 페이로드 포맷이 정의되어야 하는 문제점이 있거나, 혹은 각 계층에서 생성된 스트림을 (in 패킷화하는 방법이 명료하지 않은 문제점 등이 있다. 이 논문에서는 MPEG-4 시스템을 사용 하지 않고, MPEG-4 비디오 기초스트림을 RTP 패킷에 담아 전송하기 위한 새로운 RTP 페이로드 포맷을 제안하였고, 제안된 포맷을 이용하여 MPEG-4 비디오를 전송하는 시스템을 설계 및 구현하였다. 제안된 RTP 페이로드 포맷은 비디오 객체(Video Object)에 대한 RTP 페이로드 포맷만을 정의하여 포맷의 종류를 최소화함으로써 포맷의 종류가 많아짐으로해서 생기는 부가적인 오버헤드를 감소시켰으며, 또한 하나의 RTP 패킷에는 단 하나의 비디오 객체에 대한 정보만을 저장하여 비디오 객체간의 독립성을 유지하였다. 제안된 포맷을 이용하여 구현된 MPEG가 비디오 전송시스템은 RTP 패킷의 크기를 pad-MTU와 같거나 작게 설계함으로써, IP 계층에서 RTP패킷의 단편화 현상이 발생하지 않고 효율적인 전송이 이루어지도록 하였다.

  • PDF

Design and Implementation of SCPR for Multimedia Information Security (멀티미디어 정보 보안을 위한 SCPR의 설계 및 구현)

  • 홍종준;이재용
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.49-57
    • /
    • 2002
  • Real-Time Protocol (RTP) is used for multimedia information transmission and RTP payload must be encrypted for providing multimedia information security. Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic and load. During many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Automatic Payload Signature Generation System (페이로드 시그니쳐 자동 생성 시스템)

  • Park, Cheol-Shin;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.615-622
    • /
    • 2013
  • Fast and accurate signature extraction is essential to improve the performance of the payload signature-based traffic analysis methods. However the slow manual process in extracting signatures make difficult to deal with the rapidly changing application in current Internet environment. Therefore, in this paper we propose a system automatically generating signatures from ground-truth traffic data. In addition, we improve the efficiency of signature extraction by recognizing the application protocol using a protocol filters and generating signatures automatically according to the application-specific protocol contents. In order to verify the validity of the system proposed in this paper, we compared the signatures automatically generated from our system with the signatures manually created for a few popular applications.

Design and Implementation of SCPR for Multimedia Information Security (멀티미디어 정보 보안을 위한 SCPR의 설계 및 구현)

  • 홍종준;이재용
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2002
  • Real-Time Protocol (RTP) is used for multimedia information transmission and RTP payload must be encrypted for providing multimedia information security. Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic and load. Doting many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

Mathematical Model of Variable-Length Payloads for EDCA and Multi-User MIMO Based Wireless LAN (향상된 분산 채널 접근 기법 및 다중사용자 MIMO 기반 무선랜 환경에서 가변 길이 페이로드에 대한 수학적 모델)

  • Chung, Chulho;Chung, Taewook;Kang, Byungcheol;Kim, Jaeseok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1117-1119
    • /
    • 2015
  • In this letter, we propose a mathematical model of variable-length payloads transmitted in EDCA and transmitted using MU-MIMO. Assuming fixed-length or the use of mean value of payload length leads to discordant results while calculating the total payload length of variable-length frames transmitted within a fixed duration. Using the proposed model results in accurate results (less than 3% relative errors) for total payload length under variable-length traffic.

Structural test of KSLV-I Payload fairing (KSLV-I 페이로드 페어링 구조시험)

  • Lee, Jong-Woong;Kong, Cheol-Won;Eun, Se-Won;Nam, Gi-Won;Jang, Young-Soon;Shim, Jae-Yeul;Lee, Young-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.11
    • /
    • pp.900-907
    • /
    • 2013
  • Payload fairing(PLF) protects satellites and related equipment from the external environment. They are separated before the satellite separation. Payload fairing made of composite sandwich materials due to their considerable bending stiffness and strength-to-weight ratio. Payload fairing have compression, shear and bending load during the flight. In this study, To check the strength of PLF and connected part, structural test of PLF accomplished using an actuator and a fixture. Purpose of structural test is to verify the strength of PLF in force of separation spring and combination structural load applied. Test result shows that the PLF have an acceptable margin of safety for the combination structural load and force of separation spring.

High-Speed Pattern Matching Algorithm using TCAM (TCAM을 이용한 고성능 패턴 매치 알고리즘)

  • Sung Jungsik;Kang Seok-Min;Lee Youngseok;Kwon Taeck-Geun;Kim Bongtae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.503-510
    • /
    • 2005
  • With the increasing importance of network protection from cyber threats, it is requested to develop a multi-gigabit rate pattern matching method for protecting against malicious attacks in high-speed network. This paper devises a high-speed pattern matching algorithm with TCAM by using an m-byte jumping window pattern matching scheme. The proposed algorithm significantly reduces the number of TCAM lookups per payload by m times with the marginally enlarged TCAM size which can be implemented by cascading multiple TCAMs. Due to the reduced number of TCAM lookups, we can easily achieve multi-gigabit rate for scanning the packet payload. It is shown by simulation that for the Snort nile with 2,247 patterns, our proposed algorithm supports more than 10 Gbps rate with a 9Mbit TCAM.

Structural Test for Assembly Frame of Payload Fairing (페이로드 페어링 체결 프레임에 대한 구조시험)

  • Lee, Jong-Woong;Jang, Young-Soon;Yi, Yeong-Moo;Kong, Cheol-Won
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.12
    • /
    • pp.1129-1134
    • /
    • 2007
  • Payload fairing protects satellites and electrical equipments from the external environment. Payload fairing is jettisoned before satellite separation. Assembly frame for the separation of payload fairing were assembled with shear bolts. The role of shear bolts is to support structural load during flight and they are cut by explosion of pyro. The assembly frame which is connected by shear bolts is separated after the cutting of shear bolts. In this paper, structural tests and analysis were done for the design of the shear bolt. Compression, bending and shear load apply to the hardware including assembly frame. Test results showed that design of the shear bolt satisfied both structural strength for the support of flight load and required low strength for the cutting of shear bolts.

A Transaction Analysis Model for OpenADR 2.0b Payload (OpenADR 2.0b 페이로드 트랜잭션 분석 모델 연구)

  • Choi, Min-Young;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2017
  • OpenADR is a national standard communication protocol of demand response service. OpenADR uses XML message, called a payload, to support logical transaction of demand response service. For this purpose, OpenADR defines a XML element as transaction identifier which is called requestID. Unfortunately, OpenADR 2.0b profile specification describes some information about requestID but, it is not enough for understanding properly. Ambiguous definition of payload transaction makes vulnerabilities of implementing VEN & VTN and confuses mapping OpenADR 2.0b protocol into other smart grid protocols. Therefore, this paper redefines payload transaction to solve an ambiguous information of OpenADR 2.0b profile specification, proposes a model of analyzing payload transaction, and shows how to detect a payload transaction vulnerability in real-world.