• Title/Summary/Keyword: Packet analysis

Search Result 970, Processing Time 0.022 seconds

A Design and Analysis of Authentication Scheme for Tolerating Packet Loss in the Multicast Environment (멀티캐스트 환경에서의 패킷 손실을 고려한 인증기법 설계 및 분석)

  • 임정미;박철훈;유선영;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.163-172
    • /
    • 2003
  • Proposed in this paper is an authentication mechanism for multimedia streaming data in the Intemet multicast environment. The multicast authentication mechanism is coupled with the packet-level forward error correction code which has been recently applied for a reliable multicast transport transmission. Associated with this, Reed-Solomon erasure code is chosen for tolerating packet loss so that each of the received packets can be authenticated independently of the lost packets.

A Comparative Study and Analysis of LoRaWAN Performance in NS3

  • Arshad Farhad;Jae-Young Pyun
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.45-51
    • /
    • 2024
  • Long Range Wide Area Network (LoRaWAN) is a widely adopted Internet of Things (IoT) protocol due to its high range and lower energy consumption. LoRaWAN utilizes Adaptive Data Rate (ADR) for efficient resource (e.g., spreading factor and transmission power) management. The ADR manages these two resource parameters on the network server side and end device side. This paper focuses on analyzing the ADR and Gaussian ADR performance of LoRaWAN. We have performed NS3 simulation under a static scenario by varying the antenna height. The simulation results showed that antenna height has a significant impact on the packet delivery ratio. Higher antenna height (e.g., 50 m) has shown an improved packet success ratio when compared with lower antenna height (e.g., 10 m) in static and mobility scenarios. Based on the results, it is suggested to use the antenna at higher allevation for successful packet delivery.

An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks

  • Liu, Kai;Zhang, Yupeng;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.778-798
    • /
    • 2014
  • This paper proposes a novel exposed-terminal-eliminated medium access control (ETE-MAC) protocol by combining channel reservation, collision avoidance and concurrent transmissions to improve multi-access performance of the multihop wireless networks. Based on the proposed slot scheduling scheme, each node senses the control channel (CCH) or the data channel (DCH) to accurately determine whether it can send or receive the corresponding packets without collisions. Slot reservation on the CCH can be simultaneously executed with data packet transmissions on the DCH. Therefore, it resolves the hidden-terminal type and the exposed-terminal type problems efficiently, and obtains more spatial reuse of channel resources. Concurrent packet transmissions without extra network overheads are maximized. An analytical model combining Markov model and M/G/1 queuing theory is proposed to analyze its performance. The performance comparison between analysis and simulation shows that the analytical model is highly accurate. Finally, simulation results show that, the proposed protocol obviously outperforms the link-directionality-based dual-channel MAC protocol (DCP) and WiFlex in terms of the network throughput and the average packet delay.

Development of Non-destructive Evaluation Method for Composite Structures using Tapping Sound (타격음을 이용한 복합재료 구조물의 비파괴 검사법 개발)

  • 황준석;김승조
    • Composites Research
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2004
  • A new non-destructive evaluation method using tapping sound is proposed. This method, named Tapping Sound Analysis, is using the difference between tapping sound data of healthy structure and defective structure as the criteria of determination of internal defect of composite structure. For the characterization of tapping sound, a feature extraction method based on wavelet packet transform is proposed. And a feature index is defined for the decision of existence of internal defects. To prove the possibility of proposed method as a non-destructive evaluation method, experimental study is performed. The tapping sound data of healthy structure and defective structure are measured and compared based on the proposed decision method. The experimental results showed that the feature index is a good indicator for the determination of internal defects.

Separation of background and resonant components of wind-induced response for flexible structures

  • Li, Jing;Li, Lijuan;Wang, Xin
    • Structural Engineering and Mechanics
    • /
    • v.53 no.3
    • /
    • pp.607-623
    • /
    • 2015
  • The wind-induced dynamic response of large-span flexible structures includes two important components-background response and resonant response. However, it is difficult to separate the two components in time-domain. To solve the problem, a relational expression of wavelet packet coefficients and power spectrum is derived based on the principles of digital signal processing and the theories of wavelet packet analysis. Further, a new approach is proposed for separation of the background response from the resonant response. Then a numerical example of frequency detection is provided to test the accuracy and the spectral resolution of the proposed approach. In the engineering example, the approach is applied to compute the power spectra of the wind-induced response of a large-span roof structure, and the accuracy of spectral estimation for stochastic signals is verified. The numerical results indicate that the proposed approach is efficient and accurate with high spectral resolution, so it is applicable for power spectral computation of various response signals of structures induced by the wind. Moreover, the background and the resonant response time histories are separated successfully using the proposed approach, which is sufficiently proved by detailed verifications. Therefore, the proposed approach is a powerful tool for the verification of the existing frequency-domain formulations.

Speech Enhancement Using Multiresolutional Signal Analysis Methods (다해상도 신호해석 방법을 이용한 음성개선)

  • Seok, Jong-Won;Han, Mi-Kyung;Bae, Keun-Sung
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.134-135
    • /
    • 1999
  • This paper presents a speech enhancement method with spectral subtraction using wavelet, wavelet packet and cosine packet transforms which are known as multiresolutional signal analysis method. The performance of each method is compared with the conventional spectral subtraction method. Performance assessments based on average SNR, cepstral distance and informal subjective listening test are carried out. Experimental result demonstrate that cosine packet shows the best result in objective performance measure as well as subjective shows less musical noise than the conventional spectral subtraction method after removing the noise components.

  • PDF

Random Access Channel with Retransmission Gain

  • Shi, Junmin;Sun, Yi;Zhang, Xiaochen;Xiao, Jizhong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.148-159
    • /
    • 2013
  • An analysis of the throughput and stability region of random access systems is currently of interest in research and industry. This study evaluated the performance of a multiuser random access channel with a retransmission gain. The channel was composed of a media access control (MAC) determined by the transmission probabilities and a multiuser communication channel characterized by the packet reception probabilities as functions of the number of packet transmissions and the collision status. The analysis began with an illustrative two-user channel, and was extended to a general multiuser channel. For the two-user channel, a sufficient condition was derived, under which the maximum throughput was achieved with a control-free MAC. For the channel with retransmission gain, the maximum steady throughput was obtained in a closed form. The condition under which the random access channel can acquire retransmission gain was also obtained. The stability region of the general random access channel was derived. These results include those of the well-known orthogonal channel, collision channel and slotted Aloha channel with packet reception as a special instance. The analytical and numerical results showed that exploiting the retransmission gain can increase the throughput significantly and expand the stability region of the random access channel. The analytical results predicted the performance in the simulations quite well.

  • PDF

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

Performance analysis of a MAC Protocol on WDM Non-Slotted Ring (Fixed Length Packet) Network (Non-Slotted Ring (Fixed Length Packet) 구조를 가지는 WDM 광 네트워크의 성능 분석)

  • 정지훈;김종훈
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.229-231
    • /
    • 2000
  • Nowadays, the telecommunication service provider has witnessed an unprecedented growth in data traffic and the need for networking. optical fiber can provide some THz of huge bandwidth WDM technology has been an emerging issue for the efficient use of optical links. WDM uses a number of different wavelength that are assigned to each channel. The minimal number of optical transceivers and receivers should be used in a node to build an economic WDM transmission system without degrading system performance. Hence, the analysis of performance parameters such as throughput and delay is important to guarantee the WDM system performance. in this paper, the performance of a MAC protocol on a slotted WDM system that has a tunable transmitter(Txt), a tunable receiver(Rxt), and a fixed receiver(Rxf), respectively, on each node, was statistically analyzed The computer simulation validates the performance analysis.

  • PDF

MIB 정보와 패킷 분석을 통한 DDoS 공격의 탐지

  • 김미혜;원승영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.49-55
    • /
    • 2004
  • DDoS is an attack type that interfere with normal service by running out network bandwidth, process throughput, and system resource. It can be recognized intuitively by network slowdown and connection impossibility state, but it is necessary to detect DDoS attack by exact and quantitative analysis. In this paper, the exact and efficient DDoS attack detection system which is able to detect traffic flooding by MIB information, and attack traffic by packet analysis is proposed and realized.

  • PDF