• 제목/요약/키워드: Network Analyzer

검색결과 480건 처리시간 0.026초

리눅스 실시간 스펙트럼 분석기를 이용한 컴퓨터 기반 순음청력검사 시스템의 자동 보정 지원 (Support of Automatic Calibration for Computerized Puretone Audiometer Using Linux Real-time Spectrum Analyzer)

  • 이승희;신범주;송복득;김진동;전계록;왕수건
    • 한국전기전자재료학회논문지
    • /
    • 제25권10호
    • /
    • pp.837-843
    • /
    • 2012
  • Compared to conventional pure-tone audiometer(PTA), the computerized one has several advantages such as relatively lower price, better flexibility, and easy operation. In addition, the computerized PTA can be easily extended to support automatic calibration. In this study, the support of automatic calibration in the computerized PTA has been addressed using the Linux realtime spectrum analyzer and network. In terms of accuracy, the new automatic calibration machine was compared to the existing manually operated one. According to the comparison, normal operation and high accuracy were observed within the scope of the international standard.

차량차체 네트워크에서 CAN 신호 게이트웨이 설계 (A CAN Signal Gateway Design for Car Body Networks)

  • 한준수;강기호
    • 제어로봇시스템학회논문지
    • /
    • 제16권6호
    • /
    • pp.524-531
    • /
    • 2010
  • The automobile networks consist of the communication bus systems which become independent and heterogeneous each other. Most often, the CAN buses are implemented in a car in order to connect all the electronic control units in various ways. Thus, some gateways are necessary for exchanging the useful information between electronic control units on the buses. The automobile body networks group is divided into two kinds on a large scale, namely the low-speed bus and the high-speed bus. To interchange messages between the two, a CAN signal gateway is designed and implemented in a miniature scale. A network analyzer (called "Vehicle spy") and an oscilloscope monitor network situation to confirm the due operation of CAN signal gateway. The efficiency of the designed gateway is evaluated. The more message thread increased, the more efficiency decreased.

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • 제14권3호
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

회토류(Gd, Er)첨가가 Ba 페라이트의 투자율에 미치는 영향 (Effect of Rare Earth (Gd, Er) on the Permeabilities of Ba-Ferrite)

  • 정승우;김태원;최우성
    • 한국전기전자재료학회논문지
    • /
    • 제13권10호
    • /
    • pp.887-894
    • /
    • 2000
  • In this paper, we have studied the effect of earth (Gd, Er) on the various properties (microstructure, shrinkage, initial permeability, permeability as a function of frequency, etc) of Ba-ferrite. The permeabilities were analyzed by Impedance Analyzer(100KHz~40MHz) and Network Analyzer(30KHz~3㎓). As the result of XRD, all of the Ba-ferrite doped with rat earth was found to be Y-hexagonal phase. The resonance frequencies at the maximum imaginary value of complex permeability were observed near 2㎓. The complex permeabilities of the Ba-ferrite doped with Gd$_2$O$_3$at 3wt% and doped with Er$_2$O$_3$at 3wt% and 5wt% as a function of frequency showed the highest value at sintered temperature at 95$0^{\circ}C$/3h.

  • PDF

12GHz${\sim}$20GHz 주파수대역에 관한 동축케이블 내 전파특성에 관한 연구 (A study on the coaxial-cable propagation characteristic to Frequency bands 12GHz ${\sim}$ 20GHz)

  • 홍완표;김학섭;이종복
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.697-700
    • /
    • 2005
  • 일반적으로 고주파인 위성신호를 수신하려면 전송로상의 손실이 생기는데 이러한 손실을 거치지 않고 위성신호를 직접수신하여 고주파대역의 신호의 손실을 줄이기 일반적으로는 도파관을 사용하여야 하나 동관을 이용하여 12GHz${\sim}$20GHz 대역을 통과하는 전파의 특성을 측정하였고 11.71GHz${\sim}$12.01GHz 대에서는 측정이 되지 않는 차단 주파수 현상을 보였으며 13GHz 이상의 주파수에서는 원하는 신호가 측정되었다. 측정 장비로는 Aglient 사의 Network Analyzer에서 11GHz 이상의 신호를 만들어 각각 5C HFBT, 10C HFBT Cable과 동관으로 보낸후 Spectrum Analyzer로 들어오는 신호를 측정하였으며 이에 따른 전송 특성을 분석 하였다.

  • PDF

B-Bi-Zn 첨가가 hexagonal-ferrite 특성에 미치는 영향 (Effect of B-Bi-Zn Addition on the Permeabilities of Hexagonal-ferrite)

  • 정승우;백승철;김성수;최우성
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2000년도 하계학술대회 논문집
    • /
    • pp.204-207
    • /
    • 2000
  • In this paper, we have studied the effect of doped with B-Bi-Zn on properties (microstructure, density, shrinkage, permeability as a function of frequency, etc.) of hexagonal-ferrite for high frequency chip-inductor material about several GHz. The permeability were analyzed by impedance analyzer(100 kHz~40 MHz) and network analyzer(30 MHz~3 GHZ). As a result of the characteristics, the B-Bi-Zn glass ceramic was used to lower the sintering temperature for additive as a function of frequency from 100 kHz to 1.8 GHz showed constant tends. The maximum imaginary value of complex permeability was observed near the resonance frequency of 2 GHz.

  • PDF

DC-DC 벅 컨버터의 차동모드 노이즈 분석을 위한 고주파 등가회로 모델 (High-Frequency Equivalent Circuit Model for Differential Mode Noise Analysis of DC-DC Buck Converter)

  • 신주현;김우중;차한주
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제6권4호
    • /
    • pp.473-480
    • /
    • 2020
  • In this paper, we proposed a high frequency equivalent circuit considering parasitic impedance components for differential noise analysis on the input stage during DC-DC buck converter switching operation. Based on the proposed equivalent circuit model, we presented a method to measure parasitic impedance parameters included in DC bus plate, IGBT, and PCB track using the gain phase method of a network analyzer. In order to verify the validity of this model, a DC-DC prototype consisting of a buck converter, a signal analyzer, and a LISN device, and then resonance frequency was measured in the frequency range between 150 kHz and 30 MHz. The validity of the parasitic impedance measurement method and the proposed equivalent model is verified by deriving that the measured resonance frequency and the resonance frequency of the proposed high frequency equivalent model are the same.

WORM-HUNTER: A Worm Guard System using Software-defined Networking

  • Hu, Yixun;Zheng, Kangfeng;Wang, Xu;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.484-510
    • /
    • 2017
  • Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a closed loop defense system of worms based on a Software-Defined Networking (SDN) technology, called Worm-Hunter. The flexibility of SDN in network building is introduced to structure the network infrastructures of Worm-Hunter. By using well-designed flow tables, Worm-Hunter is able to easily deploy different honeynet systems with different network structures and dynamically. When anomalous traffic is detected by the analyzer in Worm-Hunter, it can be redirected into the honeynet and then safely analyzed. Throughout the process, attackers will not be aware that they are caught, and all of the attack behavior is recorded in the system for further analysis. Finally, we verify the system via experiments. The experiments show that Worm-Hunter is able to build multiple honeynet systems on one physical platform. Meanwhile, all of the honeynet systems with the same topology operate without interference.

비방사 마이크로 스트립 선로를 이용한 밀리미터 대역의 세라믹 필터 개발 (Development of Ceramic Filter Using Non Radiative Microstrip Line In Millimeter-Wave)

  • 신천우;김태헌
    • 한국통신학회논문지
    • /
    • 제32권6A호
    • /
    • pp.648-656
    • /
    • 2007
  • 본 논문은 S-라인(비방사 마이크로 스트립)을 이용하여 무선 가입자 회선(WLL) 및 지역 다지점 분배 서비스(LMDS) 등 광대역 무선 가입자 망으로의 기술 적용을 위한 밀리미터 대역의 중심주파수 37GHz에서 세라믹을 이용한 대역 통과 필터에 관한 것이다. 아래 위가 도체로 덮인 유전체 기판 위의 선로 사이에 세라믹 공진기를 삽입시켜, 구조적 공진 특성을 이용함으로써 필터 특성을 얻어내는 방법으로 제작하였다. 이러한 필터 구조와 특성을 근거로 한 시뮬레이션을 하여, 1단 세라믹 공진기의 공진주파수를 찾는 공식과 4단 세라믹 공진기의 대역을 구하는 공식을 일반화 하였다. 또한, 4단 세라믹 공진기의 시뮬레이션 결과를 바탕으로 제작된 실험 구조물을 Network Analyzer를 사용하여 실험을 실시하였으며, 시뮬레이션 결과의 대역은 36.58GHz-37.650GHz, 리플과 손실은 -ldB 이내. Cutoff 특성은 S(2,1)그래프의 대역 좌우로 -35dB밑으로 1GHz이내인 것에 대하여 실험 결과의 대역은 36.6GHz-37.65GHz, 손실은 -ldB이내, 리플은 -3dB이내, Cutoff 특성은 S(2,1)그래프의 대역 좌우로 -30dB밑으로 1GHz 이내인 특성을 나타내었다.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.