• Title/Summary/Keyword: Network Analyzer

Search Result 480, Processing Time 0.025 seconds

Traffic Analysis and Modeling for Network Games (네트워크 게임 트래픽 분석 및 모델링)

  • Park Hyo-Joo;Kim Tae-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.635-648
    • /
    • 2006
  • As the advances of Internet infra structure and the support of console and mobile for network games, the industry of online game has been growing rapidly, and the online game traffic in the Internet has been increasing steadily. For design and simulation of game network, the analysis of online game traffic have to be preceded. Therefore a number of papers have been proposed for the purpose of analyzing the traffic data of network games and providing the models. We make and use GameNet Analyzer as a dedicated tool for game traffic measurement and analysis in this paper. We measure the traffic of FPS Quake 3, RTS Starcraft and MMORPG World of Warcraft (WoW), and analyze the packet size, packet IAT(inter-arrival time), data rate and packet rate according to the number of players and in-game behaviors. We also present the traffic models using measured traffic data. These analysis and models of game traffic can be used for effective network simulation, performance evaluation of game network and the design of online games.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Method for High Frequency Modeling of Transformers Using the S-Parameter (S-Parameter를 이용한 변압기의 고주파 모델링 기법)

  • Jung, Hyeonjong;Yoon, Seok;Kim, Yuseon;Bae, Seok;Lim, Yeongseog
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.9
    • /
    • pp.677-684
    • /
    • 2018
  • In this paper, we propose a method for high-frequency modeling of transformers using the S-parameter. The open and short circuits of the primary and secondary sides were configured, and the reflection coefficient in each circuit was measured using a vector network analyzer. The equivalent circuit elements were extracted from the measured results to model the high-frequency equivalent circuit, and the validity of the method was verified by comparing the measured S-parameters in a 2-port network with the simulation results.

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

DEVELOPMENT OF SIMULATION PLATFORM USED FOR PERFORMANCE EVALUATION OF INFORMATION NETWORK AND ITS APPLICATION

  • Rieko, Aizawa;Yojiro, Ohta;Eiji, Miyagaki;Nakano, Kazuo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.110-115
    • /
    • 2001
  • Today, effective utilization of sophisticated networks greatly influences the activities of a business, making performance evaluations of computer network systems a necessity, We have developed a special computer network simulator capable of automatically generating a model based on data accumulated by a network analyzer to guide the user in selecting ideal parameters. The simulator was developed to provide user-friendly analysis for engineers involved in the actual network design. This paper gives an overview of the simulator and describes an example application of evaluating a network design that anticipates the future increase in traffic for a company introducing voice over frame relay (VoFR) into a wide area network (WAW).

  • PDF

Two-Port Vector Network Analysis System with a Vector Signal Channel (벡터 전압 수신기를 이용한 2-포트 산란 계수 분석 시스템)

  • Lee, Dong-Joon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.5
    • /
    • pp.541-548
    • /
    • 2013
  • This paper presents a vector network analysis system for 2-port scattering parameters of microwave devices using some basic microwave instruments/devices such as signal generators, vector voltmeter, directional couplers and frequency mixers. The analytical model and implementation method for scattering parameter measurements - which can replace the vector network analyzers - are presented. The performance of the implemented system is evaluated through 1- and 2-port scattering parameter measurements, respectively. The vector volt signals which determine the scattering parameters are detected in two distinct methods depending on the frequency band of interests; a direct-detection method with a single signal generator and vector voltmeter for relatively low band and a heterodyne method to frequency down-mix associated with an additional signal source as well as frequency mixers for high band are used, respectively. Using these two methods, scattering parameters of UHF and X bands are evaluated and their performances are verified through a comercial vector network analyzer.

Design and implementation of a connectivity analyzer for the hybrid vehicular network (하이브리드 차량 네트워크를 위한 연결성 분석기의 설계 및 구현)

  • Lee, Junh-Hoon;Kim, Cheol-Min;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2008
  • This paper designs and Implements a connectivity analyzer for the hybrid vehicular network based on the real-life movement history data achieved from the Taxi telematics system currently in operation, aiming at providing a useful guideline and information to build a telematics network. The simulator traces the location of each vehicle, sets the vehicle type, either gateway or normal, decides whether it can be connected to a mobile gateway, keeps track of status of the vehicle, and calculates the duration of disconnected state. With this analysis considering the transmission range and gateway ratio, we can decide the cost-effective number of mobile gateways having both cellular and ad-hoc network interfaces, and buffer space requirement based on the measured disconnection time and message generation ratio.

  • PDF

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • 유용준;이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.13-19
    • /
    • 2004
  • 본 논문은 SIMVA(Simulation Vulnerability Analyzer)를 이용한 시뮬레이션 기반의 네트워크 취약성 분석을 주목적으로 한다 SIMVA는 네트워크 상태를 감시하고, 이를 토대로 취약성을 분석하기 위하여 개발된 S/W로서, SES/MB (System Entity Structure / Model Base) 프레임워크 및 DEVS(Discrete Event System Specification) 이론을 적용하여 네트워크 보안 모델링을 수행할 수 있으며, 취약성 메트릭스를 통하여 정량적으로 취약성을 분석할 수 있다. 본 연구에서는 SIMVA를 이용하여 최근 네트워크 보안 문제에 심각한 영향을 미치는 슬래머 웜 공격 시나리오에 대한 취약성 분석을 수행함으로써 SIMVA의 검증 및 적용 가능성을 제시한다.

  • PDF

Complex Permittivity of Foam Materials at X-Band (X-대역에서의 Foam 재료의 복소 유전율)

  • 방재훈;안병철
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.72-75
    • /
    • 2000
  • This paper investigates the complex permittivity of foam materials using the rectangular waveguide. The transmission coefficients of materials inserted in the waveguide are measured with a network analyzer and calculated from the equivalent transmission line model. We use the trial and error method in the acquisition of the complex permittivity.

  • PDF