• Title/Summary/Keyword: Data packet

Search Result 1,641, Processing Time 0.027 seconds

Design of a Carousel Manager for Data Broadcasting Services (양방향 데이터방송 서비스를 위한 캐러셀 관리자 설계)

  • Kang Min-Goo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.78-84
    • /
    • 2005
  • Various kinds of data broadcasting services can be offered using a return-channel in digital broadcasting TV compared to analog services. In these data broadcasting environments, several data(associated with TV broadcasting programs, or not) are provided to the TV audiences except for audio/video broadcasting data. In this paper, a structure of data manager for data/object carousel, based on data broadcasting protocols, was proposed for data broadcasting services using a return-channel, and were supported to the production technologies of DTV contents. These contents application techniques for DTV will be implemented with this data manager in MPEG2-TS data broadcasts using PID(Packet ID).

  • PDF

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network

  • Hong, Youn-Sik;Hur, Hye-Sun
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.76-81
    • /
    • 2006
  • A PDA is used mainly for downloading data from a stationary server such as a desktop PC in an infrastructure network based on wireless LAN. Thus, the overall performance depends heavily on the performance of such downloading with PDA. Unfortunately, for a PDA the time taken to receive data from a PC is longer than the time taken to send it by 53%. Thus, we measured and analyzed all possible factors that could cause the receiving time of a PDA to be delayed with a test bed system. There are crucial factors: the TCP window size, file access time of a PDA, and the inter-packet delay that affects the receiving time of a PDA. The window size of a PDA during the downstream is reduced dramatically to 686 bytes from 32,581 bytes. In addition, because flash memory is embedded into a PDA, writing data into the flash memory takes twice as long as reading the data from it. To alleviate these, we propose three distinct remedies: First, in order to keep the window size at a sender constant, both the size of a socket send buffer for a desktop PC and the size of a socket receive buffer for a PDA should be increased. Second, to shorten its internal file access time, the size of an application buffer implemented in an application should be doubled. Finally, the inter-packet delay of a PDA and a desktop PC at the application layer should be adjusted asymmetrically to lower the traffic bottleneck between these heterogeneous terminals.

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

An Analysis of Packet Collision Probability due to Inter-piconet Interference in the Bluetooth Low Energy Networks (저전력 블루투스 네트워크에서 피코넷 간 간섭으로 인한 패킷충돌 확률 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.3-11
    • /
    • 2017
  • Research and development are being conducted to apply low-power Bluetooth (BLE) technology to IoT (Internet of Things) applications. The characteristic of this application environment is that many piconets can operate in the same space. Therefore, interference between homogeneous networks is likely to occur. In the BLE data channel, adaptive frequency hopping (AFH) scheme is used among the 37 frequency channels, and the master and the slave communicate while changing the carrier frequency. If there are multiple BLE piconets in the same space, there is a risk of frequency collision and packet errors will occur. In this paper, we analyze the packet collision probability due to cochannel interference in multiple asynchronous BLE piconet environments. Specifically, we analyzed packet collision probability according to the number of concurrently operating BLE piconets with the ratio of connection interval to connection event length as the main parameters. The analysis result can be used to set connection event related parameters for a desired packet collision probability according to the number of users having BLE devices in a given space.

A Congestion release Advertisement Method to Improve the IEEE 802.17 Resilient Packet Ring (체증해제 통보에 방식에 의한 IEEE 802.17 레질런트 패킷 링의 성능개선 연구)

  • Kim Tae-joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.581-590
    • /
    • 2005
  • The IEEE 802.17 Resilient Packet Ring Working Group develops standards to support the development and deployment of Resilient Packet Ring networks in Local, Metropolitan, and Wide Area Networks for resilient and efficient transfer of data Packets at rates scalable to many gigabits Per second. It was known that the fairness algorithm of the IEEE 802.17 Resilient Packet Ring suffers from throughput degradation under an unbalanced overload. This Paper proposes a congestion release advertisement method to improve this throughput degradation and discusses its performance. Under the proposed method, a congested node decides whether its congestion is released or not. If released, it advertises the congestion release to upstream nodes, and then upstream nodes transmit their traffic without uy regulation. The proposed method is compatible with the legacy fairness algorithm.

A New Packet-level Load-balancing Scheme for Fat-Trees (Fat-Tree에서의 새로운 패킷 단위 부하분산 방식)

  • Lim, Chansook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.53-58
    • /
    • 2013
  • A Fat-Tree topology has multiple paths between any pair of hosts. The delay for the multiple paths with an equal number of hops depends mainly on the queuing delay. However, most of the existing load-balancing schemes do not sufficiently exploit the characteristics of Fat-Tree. In most schemes load-balancing is performed at a flow level. Packet-level load-balancing schemes usually require the availability of special transport layer protocols to address packet reordering. In this paper, we propose a new packet-level load-balancing scheme which can enhance network utilization while minimizing packet reordering in Fat-Trees. Simulation results show that the proposed scheme provides as high TCP throughput as a randomized flow-level Valiant load balancing scheme for a best case.

A Study on SR Packet MAC Protocol for Energy Saving in Wireless Sensor Network (무선 센서 네트워크에서의 에너지 절감을 위한 SR패킷 MAC 프로토콜에 관한 연구)

  • Park, Jae-Sung;Lee, Jong-Yong;Lee, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1646-1652
    • /
    • 2010
  • The communication in wireless sensor network is divided into several layers, because of each of them do their role, the wireless communication is possible, the MAC (Medium Access Control) layer of the one of sensor network communications layer is used to the data errors, control flow, and manage resources. Using MAC Protocol, it ensures the communication between sensor node. In this paper, highlighted the energy efficiency of the S-MAC, T-MAC protocol it emphasized the efficiency of energy by lessening the woken time of all nods effectively, transmitting and receiving the control packet on only necessary nods through use of a method that RTS packet is added to SYNC packet and making other nods sleep. On sending SYNC+RTS packet and receiving the packet, nod noticed that it wasn't necessary to be awaked on this period, would be in Sleep mode, demonstrated mathematically that energy is more effective than existing protocol, and simulated with MATLAB.

Packet Error Rate Characteristics of an Optical Packet Switching Node with an Optical Packet Address Processor Using an EDFA Preamplifier (광 패킷 어드레스 처리기에 EDFA 전치 증폭기를 사용한 광 패킷 교환 노드의 패킷 오율 특성)

  • 윤찬호;백승환;신종덕
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.7
    • /
    • pp.1777-1784
    • /
    • 1998
  • The packet error rates of an optical packet switching node with an optical address processor using an EDFA in order to detect M-ary correlation pulses at a fiber-optical delay line matched filter output have been evaluated. Effects of A PIN diode NEP, the gain and noise figure of the EDFA, and the bandwidth of an optical filter on the packet error rate of the switching node have been compared. There is negligible error rate change depending upon the variation of the PIN diode NEP and the EDFA gain. If the bandwidth of the optical filter is below 10 times of the data rate, there is no appreciable effect on the error rate. If the noise figure of the EDFA increases, however, the power penalty increases as much as the noise figure increment at all the bit rates and for address code sets considered in this work.

  • PDF

End-to-End Performance of Packet Aggregation Transmission on MANET under DDoS Attacks (DDoS 공격이 있는 MANET에서 패킷취합전송의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.689-694
    • /
    • 2014
  • DDoS attacks on MANET makes disable any node which support network function, cause critical results as a stopping of entire network service or separation to some parts. Packet aggregation, which gather some pieces of short length into a certain length of data, improves transmission performances on MANETs. In this paper, some effects on transmission performance of packet aggregation transmission be caused by DDoS Attacks are measured and analyzed in point of end-to-end level. MANET simulator, based on NS-2, is used for measurement end-to-end performances. MOS, connection rate, delay and packet loss rate is used as performance parameters. VoIP traffic is used for object service measurement. Finally, it is suggested that number of packet aggregation is more then 4 for keeping the transmission quality over MANETs under DDoS attacks.