• Title/Summary/Keyword: Packet analysis

Search Result 970, Processing Time 0.027 seconds

Wavelength Division Multiple Access Protocols for High-Speed Optical Fiber Local Area Networks (고속 광 지역망을 위한 파장 분할 다중 접근 프로토콜)

  • 조원홍;이준호;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.4
    • /
    • pp.21-29
    • /
    • 1994
  • Three protocols based on the slotted Aloha technique are proposed for very high-speed optical fiber local area networks using wavelength division multiplexing (WDM) passive star topology and the throughputs and delays are derived. For getting a high probability in successful transmission of control packets determining the transmission of a data packet, we adopt control mini slot groups in these protocols. The retransmission probability is also considered in analysis. Both throughput and delay of three protocols are compared and analyzed by varying the number of control solt groups, the retransmission probability the length of a data packet and the number of channels. The numerical analysis shows that the proposed protocols adopted the control slot groups give the increase of throughput and the decrease of delay.

  • PDF

PERFORMANCE ANALYSIS OF A STATISTICAL MULTIPLEXER WITH THREE-STATE BURSTY SOURCES

  • Choi, Bong-Dae;Jung, Yong-Wook
    • Communications of the Korean Mathematical Society
    • /
    • v.14 no.2
    • /
    • pp.405-423
    • /
    • 1999
  • We consider a statistical multiplexer model with finite buffer capacity and finite number of independent identical 3-state bursty voice sources. The burstiness of the sources is modeled by describing both two different active periods (at the rate of one packet perslot) and the passive periods during which no packets are generated. Assuming a mixture of two geometric distributions for active period and a geometric distribution for passive period and geometric distribution for passive period, we derive the recursive algorithm for the probability mass function of the buffer contents (in packets). We also obtain loss probability and the distribution of packet delay. Numerical results show that the system performance deteriorates considerably as the variance of the active period increases. Also, we see that the loss probability of 2-state Markov models is less than that of 3-state Markov models.

  • PDF

Development of Control and Analysis Software for Electronic Warfare Test System Using Reverse Engineering of Network Protocol (프로토콜 역설계를 이용한 전자전시험장비 제어 및 신호분석 소프트웨어 개발)

  • Jung, In-Hwa
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.58-66
    • /
    • 2008
  • In this paper, we have proposed a method and procedure which can find out the unknown network protocol. Although it seems to be difficult to identify the protocol, we can find out the rule in the packet according to the method we have proposed. We have to recognize functions of the system and make the list of events first. Then we capture the network packet whenever the event are occurred. The captured packets are examined by means of the method that is finding repeated parts, changed parts according to the input value, fixed parts and changed parts according to regular rules. Finally we make the test program to verify the protocol. We applied this method and procedure to upgrade Electronic Warfare Test System which is operated by ADD. We have briefly described the redesign of control and analysis software for Electronic Warfare Test System

Development of Internet-Based Propeller Design System (인터넷 기반 프로펠러 설계 시스템 개발)

  • 이왕수;박범진;이창섭
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.40 no.6
    • /
    • pp.69-79
    • /
    • 2003
  • Existing large-scale complex programs usually reside In a single computer, and the user has to be physically in contact with the computer. With the wide spread use of the internet, the need to carry out the design and analysis tasks geographically away from the main computer is increasing. In this paper existing Windows-based propeller design and analysis package is separated into the server-client modules and the protocol program is developed to implement the communication between multi-client computers and a single server computer. A new protocol packet is designed to use the Windows socket and the server/client programs control the receive/send operations using the information transmitted in the packet. Test runs show that the remote user, connected to the server computer through the internet only, can perform the required tasks.

A Study of N-IDS Detection regarding a DoS Attack and Packet Analysis (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.175-182
    • /
    • 2008
  • 2008년에 있었던 우리나라 금융기관과 정부기관에 대한 DoS 공격에 대한 연구이다. 실험실 환경에서 실제 DoS 공격 툴을 이용하여 공격을 실시한다. DoS 공격을 탐지하기 위하여 네트워크 상에서 Snort를 이용한 N-IDS를 설치하고, 패킷을 탐지하기 위한 Winpcap과 패킷의 저장 및 분석하기 위한 MySQL, HSC, .NET Framework 등을 설치한다. e-Watch 등의 패킷 분석 도구를 통해 해커의 DoS 공격에 대한 패킷량과 TCP, UDP 등의 정보, Port, MAC과 IP 정보 등을 분석한다. 본 논문 연구를 통하여 유비쿼터스 정보화 사회의 역기능인 사이버 DoS, DDoS 공격에 대한 자료를 분석하여 공격자에 대한 포렌식자료 및 역추적 분석 자료를 생성하여 안전한 인터넷 정보 시스템을 확보하는데 의의가 있다.

  • PDF

Analysis of layered bases-foundations models under seismic actions

  • Aghalovyan, L.A.;Sahakyan, A.V.;Aghalovyan, M.L.
    • Smart Structures and Systems
    • /
    • v.2 no.4
    • /
    • pp.295-304
    • /
    • 2006
  • The paper considers the dynamic behaviour of the two-layered and multi-layered plate packets under dynamic (seismic) loading. These models correspond to the base-foundation packet structures. The analysis of the various models, including the models of contact between the layers, is derived on the base of the precise solutions of elasticity theory equations. It is shown that the application of the seismoisolator or, in general, less rigid materials between the base and the foundation brings to reduction of the natural frequencies of free vibrations of the packet base-foundation, as well as to the significant reduction of the negative seismic effect on the structures.

Performance Analysis of Single Bluetooth Piconet in Error-Prone Environments

  • Shin, Soo-Young;Park, Hong-Seong;Kim, Dong-Sung;Kwon, Wook-Hyun
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.229-235
    • /
    • 2007
  • This paper analyzes the performance of a Bluetooth piconet in error-prone environments. A statistical characterization of a waiting time, an end-to-end delay, and a goodput are derived analytically in terms of the arrival rates, the number of slaves, and the packet error rate (PER). For simplicity, half-symmetric piconet is assumed in this analysis. Both exhaustive and limited scheduling are considered. The analytic results are validated by simulations.