• Title/Summary/Keyword: Data packet

Search Result 1,636, Processing Time 0.025 seconds

Design Methodology of System-Level Simulators for Wideband CDMA Cellular Standards (광대역 CDMA 셀룰러 표준을 위한 시스템 수준 시뮬레이터의 설계 방법론)

  • Park, Sungkyung
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.41-51
    • /
    • 2013
  • This tutorial paper presents the design methodology of system-level simulators targeted for code division multiple access (CDMA) cellular standards such as EV-DO (Evolution-Data Only) and broadcast multicast service (BCMCS). The basic structure and simulation flow of system-level simulators are delineated, following the procedure of cell layout, mobile drops, channel modeling, received power calculation, scheduling, packet error prediction, and traffic generation. Packet data transmissions on the forward link of CDMA systems and EV-DO BCMCS systems are considered for modeling simulators. System-level simulators for cellular standards are modeled and developed with high-level languages and utilized to evaluate and predict air interface performance metrics including capacity and coverage.

A Study on Performance Improvement and Development of Integrity Verification Software of TCP/IP output data of VCS Correlation Block (VCS 상관블록의 TCP/IP 출력데이터의 무결성 검사 소프트웨어의 개발과 성능개선에 관한 연구)

  • Yeom, Jae-Hwan;Roh, Duk-Gyoo;Oh, Chung-Sik;Jung, Jin-Seung;Chung, Dong-Kyu;Oh, Se-Jin
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.211-219
    • /
    • 2012
  • In this paper, we described the software development for verifying the integrity of output data of TCP/IP for VLBI Correlation Subsystem (VCS) correlation block and proposed the performance improvement method in order to prevent the data loss of correlation output. The VCS correlation results are saved at the Data Archive system through TCP/IP packet transmission. In this paper, the integrity verification software is developed so as to confirm the integrity of correlation result saved at the data archive system using TCP/IP packet information of VCS. The 3-step integrity verification process is proposed by using the developed software, its effectiveness was confirmed in consequence of correlation experiments. In addition, TCP/IP packet transmission must be completed within minimum integration period. However, there is not only TCP/IP packet loss occurred but also the problem of correlation result integrity affected in account of a large quantity of packets and data during short integration time. In this paper, the reason of TCP/IP packet loss is analyzed and the modified methods for FPGA(Field Programmable Gate Array) of VCS are proposed, the integrity problem of correlation results will be solved.

Design of Packet Analyzer Using SharpPcap (SharpPcap 기반의 대화형 패킷 분석기의 설계)

  • Yoo, Jaeheon;Choi, Seongryong;Kim, Minchul;Kim, Jinmo;Hwang, Soyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.177-180
    • /
    • 2015
  • As network technology advances hacking techniques are also evolving. This paper proposes design of a packet analyzer to monitor and analyze data packets in networks. The proposed packet analyzer offers functions such as packet sniffing, filtering and statistics. We implemented a prototype packet analyzer in C# .NET development environment using SharPcap.

  • PDF

A Construction and Operation Analysis of Group Management Network about Control Devices based on CIM Level 3 (CIM 계층 3에서 제어 기기들의 그룹 관리 네트워크 구축과 운영 해석)

  • 김정호
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.87-101
    • /
    • 1999
  • To operate the automatic devices of manufacturing process more effectively and to solve the needs of the resource sharing, network technology is applied to the control devices located in common manufacturing zone and operated by connecting them. In this paper, functional standard of the network layers are set as physical and data link layer of IEEE 802.2, 802.4, and VMD application layer and ISO-CIM reference model. Then, they are divided as minimized architecture, designed as group objects which perform group management and service objects which organizes and operates the group. For the stability in this network, this paper measures the variation of data packet length and node number and analyzes the variated value of the waiting time for the network operation. For the method of the analysis, non-exhausted service method are selected, and the arrival rates of the each data packet to the nodes that are assumed to form a Poission distribution. Then, queue model is set as M/G/1, and the analysis equation for waiting time is found. For the evalution of the performance, the length of the data packet varies from 10 bytes to 100 bytes in the operation of the group management network, the variation of the wating time is less than 10 msec. Since the waiting time in this case is less than 10 msec, response time is fast enough. Furthermore, to evaluate the real time processing of the group management network, it shows if the number of nodes is less than 40, and the average arrival time is less than 40 packet/sec, it can perform stable operation even taking the overhead such as software delay time, indicated packet service, and transmissin safety margin.

  • PDF

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

A Study on transmission of layered images using Wavelet transform over ATM (ATM 망에서 웨이브릿 변환을 이용한 계층부호화 영상 전송에 관한 연구)

  • Lee, Han-Young;Song, Jae-Youn
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.35-38
    • /
    • 1998
  • We need the packet transmission of voice, data and video according to the development of ATM technology and packet network. In ATM, packet is parted to the constant length data, we called cell, the method is needed to minimize data loss. Because over ATM, we discard error cell without correction in transmission. So, about video, there is layered coding method. We simulated the coding using wavelet transform, which is structurally layed coded, so need not the additional coder.

  • PDF

Performance Analysis of Packet Scheduling Algorithm Based on Delay and Fairness (지연과 공정성을 고려한 패킷 스케쥴링 알고리즘 성능분석)

  • Lim Seog-Ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.6
    • /
    • pp.513-520
    • /
    • 2005
  • High-speed Portable Internet system provides 1-3 Mbps data transmission speed to terminals moving up to 60 km/sec. Since High-speed Portable Internet system supports services requiring different QoS, it needs an efficient scheduling method based on those different QoSs. This paper shows the performance comparisons of several different packet scheduling schemes for minimizing the mean delay over the downlink of High-speed Portable Internet system to support the packet data service. Simulation results show that proposed scheme superior to other schemes at side throughput and data loss rate.

  • PDF

Design of Management Model Integrating Wired and Wireless Network (유무선 네트워크 통합 관리 Model 설계)

  • 이주영;신복덕;하경재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.493-495
    • /
    • 2004
  • 본 논문에서는 유선네트워크와 Mobile Node간의 연결로 구성되는 무선네트워크에서 Mobile Node의 이동위치에 따라 Data통신 Packet을 조회하고 관리 및 통계할 수 있는 유무선 네트워크 통합 관리 Model을 설계하였다. 무선네트워크 관리에 필요한 MIB 항목이 SNMP에 명확히 표준화되어 있지 못하므로 무선네트워크의 자원을 정확히 관리하기 위해서 Mobile Node의 이동위치에 따른 Data통신 Packet을 저장할 수 있는 메카니즘과 MIB 항목의 정의가 필요하다. 따라서 무선네트워크의 Data통신 Packet을 관리하기 위해 필요한 SNMP의 구성방법과 관리에 필요한 새로운 MIB 항목을 정의하고 우선 SNMP Agent를 구성하여 Mobile Node에 탑재하였다. Mobile Node의 정보, 전달성격, 이동경로 및 이동패턴을 본 논문에서 정의한 MIB에 저장하고 효율적으로 무선네트워크 자원을 관리할 수 있도록 한다.

  • PDF

Architecture Design for Guaranteeing Quality of Data Communication in NGcN (차세대 통합망에서 데이터 통신의 품질을 보장하기 위한 기법)

  • Ryu Sang-Hoon;Baik Doo-Kwon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.1-4
    • /
    • 2005
  • Information communication environment integrates communication, broadcasting and internet, and Digital Convergence service emerges in result. Thus, the effective routers are needed so that they can transmit a huge number of data to core internet through appropriate base center. Therefore, the network guaranteeing QoS in transport layer supports interoperability with different wireless networks. So as to users receive necessary information anywhere seamlessly, the network architecture focuses on packet transmission and it is efficient for the control layer switches and controls packets between different networks. Since individual users take advantage of different services and data, the effective router architecture must be designed. Hence in this paper we design monitoring technique to solve security problem and to support premium service to ultimate users. Thereafter, we run opnet simulation and show the improvement of proposed router architecture.

  • PDF

A Study on Traffic Distribution Processing using the Round Robin Monitoring System

  • Kim Seok-Soo
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.2
    • /
    • pp.90-92
    • /
    • 2005
  • As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network Structure (data generator, virtual server, Server 1, 2, 3), and finds out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume.