• 제목/요약/키워드: Data packet

검색결과 1,636건 처리시간 0.034초

CELP Type Vocoder에서 RTP 확장 헤더 데이터를 이용한 연속적인 프레임 손실에 대한 PLC 성능개선 (The Performance Improvement of PLC by Using RTP Extension Header Data for Consecutive Frame Loss Condition in CELP Type Vocoder)

  • 홍성훈;배명진
    • 한국음향학회지
    • /
    • 제29권1호
    • /
    • pp.48-55
    • /
    • 2010
  • 패킷네트워크에서 사용하는 음성부호화기는 자체적으로 PLC (Packet Loss Concealment) 알고리즘을 사용하고 있지만 서비스에 적합할 만큼 좋지 않다. 더욱이 연속적인 패킷 손실에 대해서는 많이 취약하다. PLC 알고리즘은 크게 송신단 기반의 알고리즘과 수신단 기반의 알고리즘으로 나뉜다. 송신단 기반의 알고리즘은 추가정보를 전송하기 때문에 음질개선에 큰 성능을 갖는 반면 데이터 전송율이 높아지고 추가 지연이 발생하며 상호간의 호환이 불가능하다. 수신단 기반의 알고리즘은 수신된 데이터에 기반하기 때문에 추가지연이나 정보가 필요 없으나 음질개선에 한계가 있다. 본 논문에서는 RTP 헤더 정보 중 사용하지 않는 확장 헤더 데이터 (Extension Header Data: 32 bit)부분에 PLC를 위한 추가정보를 전송하는 방법을 제안한다. 이렇게 함으로써 송신단 기반의 알고리즘이 갖는 호환성 문제를 해결하고 음질 개선 성능을 향상 시킬 수 있다. 추가적으로 발생하는 지연 (delay)는 이미 수신단에서 네트워크상의 지연을 조정하기 위해 지터 버퍼 (jitter buffer)를 갖고 있기 때문에 제안하는 알고리즘으로 인해 발생하는 추가 지연은 없다. G.729 PLC를 위한 추가 정보는 LP 파라미터 합성용 MA필터 인덱스, 여기신호, 여기신호 이득 및 잔여신호 이득 파라미터로 프레임당 16 bit를 할당한다. 이는 RTP payload 전송 시 음성 데이터를 두 프레임인 20 ms 단위로 전송하기 때문이다. 성능 평가 결과 기존 대비 13.5%의 성능 향상을 보였다.

데이터 전송 구간에서 개인정보노출 취약점과 대응방안 (Countermeasures of Privacy Disclosure Vulnerability in Data Transfer Section)

  • 허건일;강지원;박원형
    • 한국IT서비스학회지
    • /
    • 제12권1호
    • /
    • pp.163-171
    • /
    • 2013
  • As the kind of IT service on the internet is more and more diversifying and increasing, IT service's adverse effects also consistently occurring. Among them the incident of private information exposure is becoming social issues, especially the exposure of private information entered on-line resume is very serious. This paper investigates whether or not data is encrypted in data transfer section of major on-line job-search sites of Korea by using the packet analyzer such as "Wireshark." This paper judges whether or not the vulnerability, private information exposure, exists from the result of the investigation above and suggests countermeasures.

데이터 통신망을 위한 공평성 성능 확보 방안 (Fairness Measures for Data Communication Networks)

  • 주운기;이형섭
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2004년도 춘계공동학술대회 논문집
    • /
    • pp.135-138
    • /
    • 2004
  • This paper considers a ring loading problem on RPR(Resilient Packet Ring), where RPR is recommended by IEEE802.17 Resilient Packet Ring working group for data optimized networks without the requirements of provisioning circuits. RPR is well suitable for metropolitan area network with two counter-rotating rings that multiple stations share the bandwidth, where the data and its corresponding control traffic is transmitted to the two opposite directional ring, respectively. One of the major concerns on RPR is to provide fairness among traffic requirements. The paper discusses several fairness measures and analysis ring loading problems for the fairness.

  • PDF

IMT-2000망을 위한 Mobile-IP기반 연동모델에 대한 연구 (A Study on Mobile-IP-based Interworking Model for IMT-2000 Network)

  • 박병섭;이동철
    • 한국콘텐츠학회논문지
    • /
    • 제2권2호
    • /
    • pp.85-90
    • /
    • 2002
  • 본 논문에서는 3GPP2 IMT-2000 서비스를 위해 기존 음성 및 인터넷 인프라를 수용할 수 있으며, IMT-2000망에서 Mobile-IP over IMT-2000 패킷 데이터 서비스를 제공할 수 있는 두가지 상호연동 모델을 제안한다. 구현 모델에서는 PDSN(Packet Data Sowing Node) 또는 IWF(Interworking Function)의 기능이 통합된 구조와 각 기지국에 분리된 2가지 모델로 설계한다. 이 모델을 구현하기 위해 Mobile-IP over IMT-2000 프로토콜 스택과 cdma2000을 사용하며, 이를 사용하여 채널 상태에 따른 운용 시나리오와 핸드오프 기법을 기술한다.

  • PDF

Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks

  • Jo, Jae-Ho;Cho, Jin-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권4호
    • /
    • pp.171-183
    • /
    • 2008
  • Nowadays, wireless packet data services are provided over Wireless MAN (WMAN) at a high data service rate, while 3G cellular networks provide wide-area coverage at a low data service rate. The integration of mobile WiMAX and 3G networks is essential, to serve users requiring both high-speed wireless access as well as wide-area connectivity. In this paper, we propose a cross-layer optimization scheme for a vertical handover between mobile WiMAX and 3G cellular networks. More specifically, L2 (layer 2) and L3 (layer 3) signaling messages for a vertical handover are analyzed and reordered/combined, to optimize the handover procedure. Extensive simulations using ns-2 demonstrate that the proposed scheme enhances the performance of a vertical handover between mobile WiMAX and 3G networks: low handover latency, high TCP throughput, and low UDP packet loss ratio.

A Low Complexity PTS Technique using Threshold for PAPR Reduction in OFDM Systems

  • Lim, Dai Hwan;Rhee, Byung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2191-2201
    • /
    • 2012
  • Traffic classification seeks to assign packet flows to an appropriate quality of service (QoS) class based on flow statistics without the need to examine packet payloads. Classification proceeds in two steps. Classification rules are first built by analyzing traffic traces, and then the classification rules are evaluated using test data. In this paper, we use self-organizing map and K-means clustering as unsupervised machine learning methods to identify the inherent classes in traffic traces. Three clusters were discovered, corresponding to transactional, bulk data transfer, and interactive applications. The K-nearest neighbor classifier was found to be highly accurate for the traffic data and significantly better compared to a minimum mean distance classifier.

Throughput of Coded DS CDMA/Unslotted ALOHA Networks with Variable Length Data Traffic and Two User Classes in Rayleigh Fading FSMC Model

  • Tseng, Shu-Ming;Chiang, Li-Hsin;Wang, Yung-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4324-4342
    • /
    • 2014
  • Previous papers analyzed the throughput performance of the CDMA ALOHA system in Rayleigh fading channel, but they assume that the channel coefficient of Rayleigh fading was the same in the whole packet, which is not realistic. We recently proposed the finite-state Markov channel (FSMC) model to the throughput analysis of DS uncoded CDMA/unslotted ALOHA networks for fixed length data traffic in the mobile environment. We now propose the FSMC model to the throughput analysis of coded DS CDMA/unslotted ALOHA networks with variable length data traffic and one or two user classes in the mobile environment. The proposed DS CDMA/unslotted ALOHA wireless networks for two user classes with access control can maintain maximum throughput for the high priority user class under high message arrival per packet duration.

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering

  • Zeng, Yi;Chen, Thomas M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권2호
    • /
    • pp.134-146
    • /
    • 2009
  • Traffic classification seeks to assign packet flows to an appropriate quality of service(QoS) class based on flow statistics without the need to examine packet payloads. Classification proceeds in two steps. Classification rules are first built by analyzing traffic traces, and then the classification rules are evaluated using test data. In this paper, we use self-organizing map and K-means clustering as unsupervised machine learning methods to identify the inherent classes in traffic traces. Three clusters were discovered, corresponding to transactional, bulk data transfer, and interactive applications. The K-nearest neighbor classifier was found to be highly accurate for the traffic data and significantly better compared to a minimum mean distance classifier.

VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구 (A study on the risk of taking out specific information by VoIP sniffing technique)

  • 이동건;최웅철
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks

  • Liu, Kai;Zhang, Yupeng;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.778-798
    • /
    • 2014
  • This paper proposes a novel exposed-terminal-eliminated medium access control (ETE-MAC) protocol by combining channel reservation, collision avoidance and concurrent transmissions to improve multi-access performance of the multihop wireless networks. Based on the proposed slot scheduling scheme, each node senses the control channel (CCH) or the data channel (DCH) to accurately determine whether it can send or receive the corresponding packets without collisions. Slot reservation on the CCH can be simultaneously executed with data packet transmissions on the DCH. Therefore, it resolves the hidden-terminal type and the exposed-terminal type problems efficiently, and obtains more spatial reuse of channel resources. Concurrent packet transmissions without extra network overheads are maximized. An analytical model combining Markov model and M/G/1 queuing theory is proposed to analyze its performance. The performance comparison between analysis and simulation shows that the analytical model is highly accurate. Finally, simulation results show that, the proposed protocol obviously outperforms the link-directionality-based dual-channel MAC protocol (DCP) and WiFlex in terms of the network throughput and the average packet delay.