• Title/Summary/Keyword: Packet monitoring

Search Result 206, Processing Time 0.027 seconds

Performance Evaluation of Real-time Voice Traffic over IEEE 802.15.4 Beacon-enabled Mode (IEEE 802.15.4 비컨 가용 방식에 의한 실시간 음성 트래픽 성능 평가)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.43-52
    • /
    • 2007
  • IEEE 802.15.4 specification which defines low-rate wireless personal area network(LR-WPAN) has application to home or building automation, remote control and sensing, intelligent management, environmental monitoring, and so on. Recently, it has been considered as an alternative technology to provide multimedia services such as automation via voice recognition, wireless headset and wireless camera for surveillance. In order to evaluate capability of voice traffic on the IEEE 802.15.4 LR-WPAN, we supposed two scenarios, voice traffic only and coexistence of voice and sensing traffic. For both cases we examined delay and packet loss rate in case of with and without acknowledgement, and various beacon period varying with beacon and superframe order values. In LR-WPAN with voice devices only, total 5 voice devices could be applicable and in the other case, i.e., coexisted cases of voice and sensor devices, a voice device was able to coexist with about 60 sensor devices.

  • PDF

Performance Analysis of Wireless Sensor Nodes over Indoor and Outdoor Environments (실내외 환경에서 센서노드의 성능 평가)

  • Di, Xuechao;Moon, Byung-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.2
    • /
    • pp.1-9
    • /
    • 2012
  • Wireless sensor nodes are widely used for various applications such as environmental monitoring. In this paper, the RSSI and PER are measured for the indoor environment with the various interferences such as obstacles(concrete walls, steel doors) and the 2.4GHz wireless LAN interference. Also, the RSSI and PER are measured for the outdoor environments. From the measured values of the RSSI and PER, the guideline for the stable operation of the wireless sensor network is suggested.

A Robust Transport Protocol Based on Intra-Cluster Node Density for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 내 노드 밀도 기반 트랜스포트 프로토콜)

  • Baek, Cheolheon;Moh, Sangman
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.381-390
    • /
    • 2015
  • The efficient design of a transport protocol contributes to energy conservation as well as performance improvement in wireless sensor networks (WSNs). In this paper, a node-density-aware transport protocol (NDTP) for intra-cluster transmissions in WSNs for monitoring physical attributes is proposed, which takes node density into account to mitigate congestion in intra-cluster transmissions. In the proposed NDTP, the maximum active time and queue length of cluster heads are restricted to reduce energy consumption. This is mainly because cluster heads do more works and consume more energy than normal sensor nodes. According to the performance evaluation results, the proposed NDTP outperforms the conventional protocol remarkably in terms of network lifetime, congestion frequency, and packet error rate.

Implementation of Protocol Analyzer for ANSI/EIA709.1 Packet on LonWorks Network (LonWorks 네트워크 상의 ANSI/EIA709.1 패킷해석을 위한 프로토콜 분석기의 설계 및 구현)

  • Im, Il-Young;Choi, Gi-Sang;Choi, Gi-Heung
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.413-416
    • /
    • 2007
  • Use ot Intelligent devices that work on the ANSI/EIA 709.1 protocol is increasing. In this study an ANSI/EIA 709.1 protocol analyzer that can monitor and analyze the packets on LonWorks network is designed and developed. The device is based on TMS320LF2407A processor for decoding data packets, and uses XScale processor for sending data to the application program on PC. The application program has various analysis features as well as basic monitoring function. The developed device can be used for debugging purposes in development of any kind of LonWorks devices, and also it is useful in maintenance of LonWorks network or Lon Works devices.

  • PDF

A Latency-Secured Algorithm for Delay-Sensitive Large-Scale Sensor Networks (지연에 민감한 대규모 센서네트워크에서 지연시간 보장을 위한 알고리즘)

  • Hossen, Monir;Kim, Ki-Doo;Park, Young-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5A
    • /
    • pp.457-465
    • /
    • 2010
  • When a sensor network is used for monitoring environments in large area or transmitting information in a u-City the number of nodes becomes very large. One of the problems with this application is the increased time delay, especially in reverse direction. In this paper, we propose a new algorithm that can minimize the latency of reverse packet in large sensor network. Analysis shows that the proposed scheme can reduce the latency by more than 90% when compared to Zigbee, while the energy consumption is maintained.

Generation of Internet Server Profile Using Packet Mining (패킷 마이닝 기법을 사용한 인터넷 서버 프로파일의 자동생성 연구)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.39-41
    • /
    • 2002
  • Management of internal Internet servers is increasingly becoming an important task. According to meet this requirement, they use service log analysis tools and network monitoring tools. But these are not enough to produce advanced management information considering contents of Internet services. Therefor we propose a system and let it detect Internet server systems existing in internal network and individuate those systems with providing profile. Internet server profile includes system's basic information, network traffic information, and Internet service usage information.

  • PDF

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

Implementation of Wireless Distribution Automation System using Binary CDMA Technology (바이너리 CDMA 기술을 이용한 무선 배전 자동화 시스템의 구현)

  • Kwon, Tai-Kil;Cho, Jin-Woong;Hong, Dae-Ki
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.61 no.4
    • /
    • pp.239-244
    • /
    • 2012
  • In this paper, we first introduce our own binary CDMA technology. Then we propose a wireless distribution automation system using the binary CDMA technology. The major research items are the binary CDMA distribution automation system, piconet configuration for remote control and monitoring, scheduling for the transmission and reception of data, and ways of applying encryption to protect wireless packet. To verify the possibility of applying wireless transmission to the distribution automation system, we experiment the implemented system in terms of the transmission rate by applying it to a real-world environment.

A Congestion Control Mechanism in Wireless Sensor Networks (무선 센서 네트워크에서 혼잡 제어 메커니즘)

  • Joo, Jeong-Ran;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.75-82
    • /
    • 2007
  • Wireless Sensor Network(WSN) is composed of a large number of sensor nodes and accomplish a common task such as environment monitoring or asset tracking. This paper proposed a congestion control mechanism applying the ECN mechanism and the cross layer design to cope with temporal congestion in WSN. We experimented with the proposed congestion control mechanism using ns-2 simulator and measured the throughput of sink node. Simulation results show that the suggested mechanism can improve the performance of packet throughput by dealing with the congestion of network efficiently.

  • PDF

SYN Flooding packet interception through memory specific consumption monitoring (메모리 소비율 모니터링을 통한 SYN Flooding 패킷 차단)

  • Yun, Jong-Chul;Kwak, In-Seub;Kang, Heung-Seek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.2045-2048
    • /
    • 2003
  • 서비스 거부공격(DoS Attack : Denial-of-Service Attack)이란 공격자가 침입대상 시스템의 시스템 자원과 네트워크 자원을 대량으로 소모시킴으로써 정상 사용자로 하여금 시스템이 제공하는 서비스를 하지 못하도록 하는 공격을 의미한다. TCP SYN Flooding 기법을 이용한 DoS공격은 서비스 자체를 하지 못하도록 하기 보다는 다른 공격을 하기 위한 사전 공격으로써 활용될 소지가 높은 공격법인 것이다. 본 논문에서는 TCP SYN Flooding을 이용한 DoS공격의 근본적인 원인을 분석하고 시스템 보안 관리자의 입장에서 이 공격에 능동적으로 탐지 할 수 있는 해결책을 모색해보고자 한다.

  • PDF