• Title/Summary/Keyword: Packet Analyze System

Search Result 143, Processing Time 0.025 seconds

Analysis of traffic capacity of the packet handler subsystem (PHS) (패킷 핸들러의 트래픽 용량 분석에 대한 연구)

  • 홍정식;이해상;홍정완;이창훈;전경표
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1990.04a
    • /
    • pp.289-298
    • /
    • 1990
  • A conceptual model of tentative packet handler subsystem (PHS) of TDX-10 is presented. This model is used to analyze the capacity of PHS especially when packet bus (PBUS) is bottleneck. In the viewpoint of performance analysis, cyclic server system and token bus LAN are utilized in modeling PHS.

  • PDF

Performance Analysis of LAN Interworking Unit for Capacity Dimensioning of Internet Access Links

  • Park, Chul-geun;Han, Dong-hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.692-699
    • /
    • 2000
  • We build and analyze some types of queueing model to discuss capacity dimensioning of access links of a LAN interworking unit connected to the Internet backbone network. We assume that the IWU has a FIFO buffer to transmit IP packets to the Internet through the backbone. In order to analyze the system, we use a Poisson process and an MMPP process as input traffic models of IP packets and we use a general service time distribution as a service time model. But we use both an exponential service time and a deterministic service time in numerical examples for simple and efficient performance comparisons. As performance measures, we obtain the packet loss probability and the mean packet delay. We present some numerical results to show the effect of arrival rate, buffer size and link capacity on packet loss and mean delay.

  • PDF

Simulation and Analysis of Base Station Buffer in UMTS Systems (UMTS 시스템에서 기지국 버퍼에 대한 실험 및 분석)

  • Kim, Nam-Gi;Park, In-Yong;Jeong, Hye-Yeong;Yun, Hyeon-Su
    • The KIPS Transactions:PartA
    • /
    • v.9A no.3
    • /
    • pp.317-326
    • /
    • 2002
  • The mobile telecommunication system has been growing exponentially after 1990s due to the high population in a city and the growth of mobile user. In this time, the current mobile system mainly concentrates on the voice communication. However, in the next generation, mobile users want to get very diverse services via mobile terminal such as the Internet access, web access, multimedia communication, and etc. For this reason, the next generation system, such as the UMTS system, has to support the packet data service and it will play the major role in the system. In different from the voice service, the packet data service should store packet data in a buffer at base station before it forwards. Consequently, the performance closely related to the buffer management and its operation. However, until now, there are rare study on the buffer behavior and management. In this paper, we will observe the buffer behavior in the UMTS systems by using simulation and analyze the results. For this research, we generate packet data traffics and model the UMTS system for a simulation. Then we analyze the buffer state by a simulation and calculate the buffer overflow probability by mathematical methods.

Performance Comparisons of Two DCF Methods in the IEEE 802.11 Protocol (IEEE 802.11 프로토콜에서 두 DCF 방식의 성능 비교)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1320-1328
    • /
    • 2007
  • In recent year, the popularity of WLAN has generated much interests on improvement and performance analysis of the IEEE 802.11 protocol. In this paper, we analyze two medium access methods of the IEEE 802.11 MAC protocol by investigating the MAC layer packet service times when arrival packet sizes have a general probability distribution. We use the M/G/1/K queueing model to analyze the throughput and the delay performance of IEEE 802.11 MAC protocol in a wireless LAN. We compare the performances of Basic access method and RTS/CTS access method. We take some numerical examples for the system throughput and the queue dynamics including the mean packet delay and packet blocking probability.

A Simple Model for TCP Loss Recovery Performance over Wireless Networks

  • Kim, Beomjoon;Lee, Jaiyong
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.235-244
    • /
    • 2004
  • There have been a lot of approaches to evaluate and predict transmission control protocol (TCP) performance in a numerical way. Especially, under the recent advance in wireless transmission technology, the issue of TCP performance over wireless links has come to surface. It is because TCP responds to all packet losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. By several previous works, although it has been already proved that overall TCP performance is largely dependent on its loss recovery performance, there have been few works to try to analyze TCP loss recovery performance with thoroughness. In this paper, therefore, we focus on analyzing TCP's loss recovery performance and have developed a simple model that facilitates to capture the TCP sender's behaviors during loss recovery period. Based on the developed model, we can derive the conditions that packet losses may be recovered without retransmission timeout (RTO). Especially, we have found that TCP Reno can retransmit three packet losses by fast retransmits in a specific situation. In addition, we have proved that successive three packet losses and more than four packet losses in a window always invoke RTO easily, which is not considered or approximated in the previous works. Through probabilistic works with the conditions derived, the loss recovery performance of TCP Reno can be quantified in terms of the number of packet losses in a window.

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

Performance of Adaptive Modulation and Coding with Transmit Diversity in Rayleigh fading Channel (레일리 페이딩 채널에서 전송 안테나 다이버시티 기법을 적용한 Adaptive Modulation and Coding의 성능 분석)

  • 김인경;김주응;강창언;홍대식
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.73-76
    • /
    • 2001
  • A key requirement for packet based wireless communication systems is to provide a high data rate packet service and improved throughput. To achieve a high throughput, adaptive methods for adjustment of the modulation and coding can be used. In this paper, we propose and analyze a scheme which is a combination of an adaptive modulation and coding(AMC) and transmit diversity(TD). Two different TD schemes are analysed: STTD and STD. Proposed system provides significant improvement in the average throughput.

  • PDF

A Model for Performance Analysis of the Information Processing System with Time Constraint (시간제약이 있는 정보처리시스템의 성능분석 모형)

  • Hur, Sun;Joo, Kook-Sun;Jeong, Seok-Yun;Yun, Joo-Deok
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.2
    • /
    • pp.138-145
    • /
    • 2010
  • In this paper, we consider the information processing system, which organizes the collected data to meaningful information when the number of data collected from multiple sources reaches to a predetermined number, and performs any action by processing the collected data, or transmits to other devices or systems. We derive an analytical model to calculate the time until it takes to process information after starting to collect data. Therefore, in order to complete the processing data within certain time constraints, we develop some design criteria to control various parameters of the information processing system. Also, we analyze the discrete time model for packet switching networks considering data with no particular arrival nor drop pattern. We analyze the relationship between the number of required packets and average information processing time through numerical examples. By this, we show that the proposed model is able to design the system to be suitable for user's requirements being complementary the quality of information and the information processing time in the system with time constraints.

An Action Pattern Analysis System of the Embedded Type about Network Users (네트워크 사용자에 대한 임베디드형 행동패턴 분석시스템)

  • Jeong, Se-Young;Lee, Byung-Kwon
    • The KIPS Transactions:PartA
    • /
    • v.17A no.4
    • /
    • pp.181-188
    • /
    • 2010
  • In this study, we suggest the system to analyze network users' action patterns by using Data-Mining Technique. We installed Network Tap to implement the analysis system of network action and copied the network packet. The copied packet is stored at the database through MainMemoryDB(MMDB) of the high-speed. The stored data analyze the users' action patterns by using Data-Mining Technique and then report the results to the network manager on real-time. Also, we applied the standard XML document exchange method to share the data between different systems. We propose this action pattern analysis system operated embedded type of SetToBox to install easily and support low price.

Large scale interactive display system for touch interaction in stereopsis (입체 영상에서 터치 인터랙션을 위한 대규모 인터랙티브 디스플레이 시스템)

  • Kang, Maeng-Kwan;Kim, Jung-Hoon;Jo, Sung-Hyun;Joo, Woo-Suck;Yoon, Tae-Soo;Lee, Dong-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.252-255
    • /
    • 2010
  • In this thesis, it suggests large scale interactive display system which is able to various touch interaction and bases on infrared LED BAR and using 3D. Interaction layer formed on space from screen which is able to feel 3D using suggested IR LED BAR. It gets the image in real time what is composed in interaction section using infrared camera with band pass filter. The image finds touch interaction coordinate through image processing module and saves as packet. It send packet to server through network data communication. It analyze packet by metaphor analysis module and save as metaphor event and send it to contents. On contents, it practices to metaphor event result in real time so it makes use touch interaction in stereopsis. According to this process, it does not need touch the screen at firsthand but it is possible system and touch interaction so touch interaction is possible while use 3D.

  • PDF