• Title/Summary/Keyword: CAN network

Search Result 19,573, Processing Time 0.047 seconds

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

Network Search Algorithm for Fast Comeback to Home Network in Roaming Environment (이동통신 로밍 환경에서 빠른 홈망 복귀를 위한 망탐색 알고리즘)

  • Ha, Won-Ki;Koh, Seok-Joo
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.149-152
    • /
    • 2012
  • In the roaming case, the cost of using the visited network is larger than that of home network. So, if a mobile terminal is connected to the visited network, even though it actually came back to the home network, the user may unduly pay for communication. Such a problem frequently occurs when many networks are overlapped in the same region, as shown in the case of Poland. In this paper, we propose a network search algorithm to support the fast comeback to home network in the roaming environment. In the proposed scheme, which is based on the 3GPP specification, the mobile terminal tries to search the home network by using a database of network information, as fast as possible. For performance evaluation, we construct a virtual testbed with real terminal and network equipment to emulate the service providers in Poland. From the experimental results, we can see that the proposed scheme can reduce the time of comeback to the home network by 3~60 minutes, compared the existing 3GPP scheme.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

A Comparative Study of Information Delivery Method in Networks According to Off-line Communication (오프라인 커뮤니케이션 유무에 따른 네트워크 별 정보전달 방법 비교 분석)

  • Park, Won-Kuk;Choi, Chan;Moon, Hyun-Sil;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.131-142
    • /
    • 2011
  • In recent years, Social Network Service, which is defined as a web-based service that allows an individual to construct a public or a semi-public profile within a bounded system, articulates a list of other users with whom they share connections, and traverses their list of connections. For example, Facebook and Twitter are the representative sites of Social Network Service, and these sites are the big issue in the world. A lot of people use Social Network Services to connect and maintain social relationship. Recently the users of Social Network Services have increased dramatically. Accordingly, many organizations become interested in Social Network Services as means of marketing, media, communication with their customers, and so on, because social network services can offer a variety of benefits to organizations such as companies and associations. In other words, organizations can use Social Network Services to respond rapidly to various user's behaviors because Social Network Services can make it possible to communicate between the users more easily and faster. And marketing cost of the Social Network Service is lower than that of existing tools such as broadcasts, news papers, and direct mails. In addition, Social network Services are growing in market place. So, the organizations such as companies and associations can acquire potential customers for the future. However, organizations uniformly communicate with users through Social Network Service without consideration of the characteristics of the networks although networks have different effects on information deliveries. For example, members' cohesion in an offline communication is higher than that in an online communication because the members of the offline communication are very close. that is, the network of the offline communication has a strong tie. Accordingly, information delivery is fast in the network of the offline communication. In this study, we compose two networks which have different characteristic of communication in Twitter. First network is constructed with data based on an offline communication such as friend, family, senior and junior in school. Second network is constructed with randomly selected data from users who want to associate with friends in online. Each network size is 250 people who divide with three groups. The first group is an ego which means a person in the center of the network. The second group is the ego's followers. The last group is composed of the ego's follower's followers. We compare the networks through social network analysis and follower's reaction analysis. We investigate density and centrality to analyze the characteristic of each network. And we analyze the follower's reactions such as replies and retweets to find differences of information delivery in each network. Our experiment results indicate that density and centrality of the offline communicationbased network are higher than those of the online-based network. Also the number of replies are larger than that of retweets in the offline communication-based network. On the other hand, the number of retweets are larger than that of replies in the online based network. We identified that the effect of information delivery in the offline communication-based network was different from those in the online communication-based network through experiments. So, you configure the appropriate network types considering the characteristics of the network if you want to use social network as an effective marketing tool.

Implementing Cipher APIs in Inter IXP 2400

  • Lee, Sang-Su;Han, Min-Ho;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.374-376
    • /
    • 2005
  • In this paper, we presented our implementation of 3DES and HMAC-MD5 processing functionality in Intel? IXP 2400 platform. It can be used as encryption and authentication engine for VPNs such as IPsec and SSL.

  • PDF

TDX-1스윗칭 네트워크의 통화량

  • 오돈성;박권철
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1986.04a
    • /
    • pp.142-145
    • /
    • 1986
  • The traffic characteristics of digital switch network depend on the structure, blocking probability, path searching method and etc. This paper presents the study of TDX-1 switch network traffic capacity by considering some decisive factors such as call processing software, switch network structure and control scheme. Conclusively the study shows that the switch network of TDX-1 can handle approximatly up to 1650 Erlang.

  • PDF

CAN Based Networked Intelligent Multi-Motor Control System Using DSP2812 Microprocessor (DSP2812 마이크로프로세서를 이용한 CAN기반 지능형 복수전동기 제어시스템개발)

  • Hong, Won-Pyo;Jung, Gi-Uhn
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.8
    • /
    • pp.109-115
    • /
    • 2005
  • This paper addresses the CAN based networked intelligent multi-motor control system using DSP2812 microprocessor. CAN built in DSP2812 microprocessor is used to control and monitor the multi-motor system with the inverter driving system CAN network implementation schemes and the algorithm for multi-motor control and monitoring is also developed. We configure the multi-motor control experimental system to verify the proposed algerian and the reliability of CAN networks system in the various operation of two induction motors. The experimental results show that CAN based networked intelligent multi-motor control system using DSP2812 microprocessor can carry out the real-time network based control in various speed range and the position control of induction motors.

A Study on User Authentication for Roaming in Mobile Device (모바일 디바이스의 로밍을 위한 사용자 인증에 관한 연구)

  • Kang, Seo-Il;Park, Choon-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.343-350
    • /
    • 2008
  • In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc${\cdots}$) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.

Dynamic Model for Open Innovation Network (개방형 혁신 네트워크의 동태적 모형)

  • Park, Chulsoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.1
    • /
    • pp.5-19
    • /
    • 2015
  • Literatures on open innovation have two major limitations. First, either on a firm level or on an industry level did they analyze the open innovation issues. The results of a firm's innovation can be diffused through the whole network and the firm can learn back from the network knowledge. Prior literatures did not consider the feedback loop among firms and network in which the firms are involved. Second, most open innovation research had a static perspective on firm's innovation performance. Since the diffusion, spill-over and learning among network members are involved over time, the open innovation is intrinsically dynamic. From the dynamic perspective, we can appreciate the fundamental attributes of the open innovation network which involves diverse firms, research institutes, and universities. In order to overcome the limitations, we suggest a dynamic model for open innovation network. We build an agent-based model which consists of heterogeneous firms. The firms are connected through a scale-free network which is formed by preferential attachment. Through the diverse scenario of simulation, we collect massive data on the firm level and analyze them both on firm and industry level. From the analysis, we found that, on industry level, the overall performance of open innovation increases as the internal research capability, absorptive capacity, and learning curve coefficient increase. Noticeably, as the deprecation rate of knowledge increases, the variability of knowledge increases. From the firm level analysis, we found that the industry-level variables had a significant effect on the firm's innovation performance lasting through all the time, whereas the firm-level variables had only on the early phase of innovation.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.