• 제목/요약/키워드: Network data

검색결과 18,284건 처리시간 0.05초

데이터 통신망에서 음성통신에 대한 연구 (A Study on Voice Communication over Data Communication Network)

  • 우홍체
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2000년도 추계학술대회 학술발표 논문집
    • /
    • pp.471-475
    • /
    • 2000
  • Voice and data are transmitted over a single packetized data communications network which is designed for data communications. The public switched telephone network for voice and the packet data network for data are merging into a single data network to get efficiency and to reduce operational cost. However, integrating voice and data transmission over a single data network is not easy because voice should be transmitted without delay but data should be transmitted without error. Advances in technology begin to overcome basic differences. Several integration methods in voice and data will be examined and reviewed here. Moreover, trends and problems on integration will be also discussed.

  • PDF

무선 메쉬망에서의 안전하고 효율적인 키관리 스킴 (Secure and Efficient Key Management Scheme for Wireless Mesh Network)

  • ;;이상곤;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

네트워크 데이터 모델링을 위한 효과적인 성분 선택 (Effective Feature Selection Model for Network Data Modeling)

  • 김호인;조재익;이인용;문종섭
    • 방송공학회논문지
    • /
    • 제13권1호
    • /
    • pp.92-98
    • /
    • 2008
  • 네트워크 데이터 모델링은 침입 탐지 시스템의 성능 평가, 네트워크 모니터링, 네트워크 데이터 분석 기법 연구에 있어서 반드시 필요한 연구이다. 네트워크 데이터의 모델링에는 반드시 네트워크의 실제 데이터를 분석하고, 분석된 데이터를 이용하여 효과적으로 데이터를 구성하여야만, 실제 네트워크 데이터의 충분한 정보를 모델링 된 데이터에 반영할 수 있다. 본 연구에서는 대규모의 네트워크 데이터에서 실제 네트워크에서 사용 가능한 모든 성분에 대해 수량화하였으며, 수량화 된 데이터를 통계적 분석방법을 통하여 모델링 데이터에서 가장 효과적인 분류 기준으로 작용할 수 있는 성분을 분석하였다.

New Database Table Design Program of Real Time Network for High Speed Train

  • Cho, Chang-Hee;Park, Min-Kook;Kwon, Soon-Man;Kim, Yong-Ju;Kim, Sung-Shin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2164-2168
    • /
    • 2003
  • Real time control system such as in factory automation fields, defense field, aerospace, railway industries, financial trading and so forth, includes multiple computers on multiple nodes, and share data to process various actions and functions. This is similar to multitasking in a multiprocessor computer system. The task processing efficiency of such system is proportionally increased by process speed of each process computer. And also it is greatly influenced by communication latencies of each node. To provide proper operation of such real time system, a network that can guarantee deterministic exchange of certain amount of data within a limited time is required. Such network is called as a real time network. As for modern distributed control system, the timeliness of data exchange gives important factor for the dynamics of entire control system. In a real time network system, exchanged data are determined by off-line design process to provide the timeliness of data. In other word, designer of network makes up a network data table that describes the specification of data exchanged between control equipments. And by this off-line design result, the network data are exchanged by predetermined schedule. First, this paper explains international standard real time network TCN (Train Communication Network) applied to the KHST (Korean High Speed Train) project. And then it explains the computer program developed for design tool of network data table of TCN.

  • PDF

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

Deep learning-based recovery method for missing structural temperature data using LSTM network

  • Liu, Hao;Ding, You-Liang;Zhao, Han-Wei;Wang, Man-Ya;Geng, Fang-Fang
    • Structural Monitoring and Maintenance
    • /
    • 제7권2호
    • /
    • pp.109-124
    • /
    • 2020
  • Benefiting from the massive monitoring data collected by the Structural health monitoring (SHM) system, scholars can grasp the complex environmental effects and structural state during structure operation. However, the monitoring data is often missing due to sensor faults and other reasons. It is necessary to study the recovery method of missing monitoring data. Taking the structural temperature monitoring data of Nanjing Dashengguan Yangtze River Bridge as an example, the long short-term memory (LSTM) network-based recovery method for missing structural temperature data is proposed in this paper. Firstly, the prediction results of temperature data using LSTM network, support vector machine (SVM), and wavelet neural network (WNN) are compared to verify the accuracy advantage of LSTM network in predicting time series data (such as structural temperature). Secondly, the application of LSTM network in the recovery of missing structural temperature data is discussed in detail. The results show that: the LSTM network can effectively recover the missing structural temperature data; incorporating more intact sensor data as input will further improve the recovery effect of missing data; selecting the sensor data which has a higher correlation coefficient with the data we want to recover as the input can achieve higher accuracy.

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • 항공우주시스템공학회지
    • /
    • 제14권6호
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

네트워크를 이용한 제어 시스템의 안정도 및 스케줄링에 관한 연구 (Stability and a scheduling method for network-based control systems)

  • 김용호;권욱현;박홍성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 한국자동제어학술회의논문집(국내학술편); 포항공과대학교, 포항; 24-26 Oct. 1996
    • /
    • pp.1432-1435
    • /
    • 1996
  • This paper obtains maximum allowable delay bounds for stability of network-based control systems and presents a network scheduling method which makes the network-induced delay be less than the maximum allowable delay bound. The maximum allowable delay bounds are obtained using the Lyapunov theorem. Using the network scheduling method, the bandwidth of a network can be allocated to each node and the sampling period of each sensor and controller can be determined. The presented method can handle three kinds of data (periodic, real-time asynchronous, and non real-time asynchronous data) and guarantee real-time transmissions of real-time synchronous data and periodic data, and possible transmissions of non real-time asynchronous data. The proposed method is shown to be useful by examples in two types of network protocols such as the token control and the central control.

  • PDF

데이터 이름 기반 네트워킹의 데이터 캐싱 관리 기법 (A Data Caching Management Scheme for NDN)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.291-299
    • /
    • 2016
  • To enhance network efficiency, named-data networking (NDN) implements data caching functionality on intermediate network nodes, and then the nodes directly respond to request messages for cached data. Through the processing of request messages in intermediate node, NDN can efficiently reduce the amount of network traffic, also solve network congestion problems near data sources. Also, NDN provides a data authenticate mechanism so as to prevent various Internet accidents caused from the absence of an authentication mechanism. Hence, through applying NDN to various smart IT convergence services, it is expected to efficiently control the explosive growth of network traffic as well as to provide more secure services. Basically, it is important factors of NDN which data is cached and where nodes caching data is located in a network topology. This paper first analyzes previous works caching content based on the popularity of the content. Then ii investigates the hitting rate of caches in each node of a network topology, and then propose an improved caching scheme based on the result of the analyzation. Finally, it evaluates the performance of the proposal.

신경회로망에 의한 용접 결함 종류의 정량적인 자동인식 시스템 개발에 관한 연구 (A Study on Development of Automatically Recognizable System in Types of Welding Flaws by Neural Network)

  • 김재열
    • 한국생산제조학회지
    • /
    • 제6권1호
    • /
    • pp.27-33
    • /
    • 1997
  • A neural network approach has been developed to determine the depth of a surface breaking crack in a steel plate from ultrasonic backscattering data. The network is trained by the use of feedforward three-layered network together with a back-scattering algorithm for error correction. The signal used for crack insonification is a mode converted 70$^{\circ}$transverse wave. A numerical analysis of back scattered field is carried out based on elastic wave theory, by the use of the boundary element method. The numerical data are calibrated by comparison with experimental data. The numerical analysis provides synthetic data for the training of the network. The training data have been calculated for cracks with specified increments of the crack depth. The performance of the network has been tested on other synthetic data and experimental data which are different from the training data.

  • PDF