• Title/Summary/Keyword: Packet monitoring

Search Result 206, Processing Time 0.025 seconds

Epicenter Estimation Using Real-Time Event Packet of Quanterra digitizer (Quanterra 기록계의 실시간 이벤트 패킷을 이용한 진앙 추정)

  • Lim, In-Seub;Sheen, Dong-Hoon;Shin, Jin-Soo;Jung, Soon-Key
    • Geophysics and Geophysical Exploration
    • /
    • v.12 no.4
    • /
    • pp.316-327
    • /
    • 2009
  • A standard for national seismological observatory was proposed on 1999. Since then, Quanterra digitizer has been installed and is operating on almost all of seismic stations which belong to major seismic monitoring organizations. Quanterra digitizer produce and transmit real-time event packet and data packet. Characteristics of event packet and arrival time of each channel's data packet on data center were investigated. Packet selection criteria using signal to noise ratio (hereafter SNR) and signal period from real-time event packet based on 100 samples per second (hereafter sps) velocity data were developed. Estimation of epicenter using time information of the selected event packet were performed and tested. A series of experiment show that event packets were received approximately 3~4 second earlier than data packets and the number of event packet was only 0.3% compare to data packets. Just about 5% against all of event packets were selected as event packet were related P wave of real earthquake. Using the selected event packets we can estimate an epicenter with misfit less than 10 km within 20 sec for local earthquake over magnitude 2.5.

Network Monitoring Mechanism For High Quality Real-Time Streaming Service (고품질 실시간 스트리밍 서비스 제공을 위한 네트워크 모니터링 기법)

  • Kim, Yong-Sul;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.969-978
    • /
    • 2006
  • Recently, there has been explosive growth in Internet service contents, and we have witnessed the emergence of many real-time applications on the Internet. These types of applications require special support from the underlying network such as reliability, timeless, and guaranteed delivery, as well as different levels of service quality. Estimation network status and transcoding data rate are researching for QoS of multimedia service by using the RTP/RTCP. We propose two schemes that the way to calculate the one-way delay by expanding the structure of RTP/RTCP in Internet that provides us 'best effort' service and to estimate the network condition by using this in this paper. And we propose the dynamic RTCP mechanism based on one-way delay to deal with rapidly changed network situation immediately. In simulation, proposed monitoring schemes using the one-way delay has similar in performance to monitoring schemes using the GPS, proposed dynamic RTCP scheme obtain the desired result of decreased packet loss rate by sending RTCP RR packet lower than other schemes.

REVIEW ON ENERGY EFFICIENT OPPORTUNISTIC ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS

  • Ismail, Nasarudin;Mohamad, Mohd Murtadha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3064-3094
    • /
    • 2018
  • Currently, the Underwater Sensor Networks (UWSNs) is mainly an interesting area due to its ability to provide a technology to gather many valuable data from underwater environment such as tsunami monitoring sensor, military tactical application, environmental monitoring and many more. However, UWSNs is suffering from limited energy, high packet loss and the use of acoustic communication. In UWSNs most of the energy consumption is used during the forwarding of packet data from the source to the destination. Therefore, many researchers are eager to design energy efficient routing protocol to minimize energy consumption in UWSNs. As the opportunistic routing (OR) is the most promising method to be used in UWSNs, this paper focuses on the existing proposed energy efficient OR protocol in UWSNs. This paper reviews the existing proposed energy efficient OR protocol, classifying them into 3 categories namely sender-side-based, receiver-side-based and hybrid. Furthermore each of the protocols is reviewed in detail, and its advantages and disadvantages are discussed. Finally, we discuss potential future work research directions in UWSNs, especially for energy efficient OR protocol design.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.

Design and Implementation of Sinkhole Router based IP Tracing System (싱크홀 라우터 기반 IP 추적 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2733-2740
    • /
    • 2009
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhance its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. In this study, we proposed an advanced IP Tracing mechanism based on Bloom filter and Sinkhole routing mechanism. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the Tracing performance also can be enhanced compared with previously suggested mechanism.

DEVELOPMENT AND TESTS OF THE ALGORITHM FOR DIRECT DATA TRANSMISSION BETWEEN RVDB AND HUGE CAPACITY DATA SERVER (RVDB와 대용량 서버 간의 직접 데이터 전송 알고리즘 개발과 시험에 관한 연구)

  • Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Jung, Dong-Kyu;Oh, Chung-Sik;Yun, Young-Joo;Kim, Hyo-Ryoung;Ozeki, Kensuke
    • Publications of The Korean Astronomical Society
    • /
    • v.29 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • This paper describes the development of algorithm for direct data transmission between Raw VLBI Data Buffer (RVDB) and Huge Capacity Data Server (HCDS) operated in Korea-Japan Correlation Center (KJCC). The transmitted data is the VLBI observation data, which is recorded at each radio telescope site, and the data transmitting rate is varying from 1 Gbps, in usual case, upto 8 Gbps. The developed algorithm for data transmission enables the direct data transmission between RVDB and HCDS through 10 Gbps optical network using VLBI Data Interchange Format (VDIF). Proposed method adopts the conventional UDP/IP protocol, but in order to prevent the loss of data during data transmission, the packet error monitoring and data re-transmission functions are newly designed. The VDIF specification and VDIFCP (VDIF Control Protocol) are used for the direct data transmission between RVDB and HCDS. To validate the developed algorithm for data transmission, we conducted the data transmission from RVDB to HCDS, and compared to the transmitted data with the original data bit by bit. We confirmed that the transmitted data is identical to the original data without any loss and it has been recovered well even if there were some packet losses.

A high speed processing method of web server cluster through round robin load balancing (라운드로빈 부하균형을 통한 웹 서버 클러스터 고속화 처리기법)

  • Sung Kyung;Kim Seok-soo;Park Gil-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1524-1531
    • /
    • 2004
  • This study analyzes a load balancing technique using Round Robin Algorithm. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network structure (data generator, virtual server, Server1,2,3), and finds out traffic distribution toward Server1,2 and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume. As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time.

Traffic Distributed Processing System Implementation on the Web Sever Networking (웹서버 네트워킹에서의 트래픽분산 처리 시스템 구현)

  • Park, Gil-Cheol;Sung, Kyung;Kim, Seok-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.846-853
    • /
    • 2004
  • This paper introduces implementation of a traffic distributed processing system on the Web Sever Networking. The study used two software packages (Packet Capture and Round-Robin Test Package) to check packet quantity from Virtual Network Structure (data generator, virtual server, Serve. 1, 2, 3), and could find out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round-Robin Load Balancing Monitoring System include Round-Robin testing, system monitoring, and graphical indication of data transmission/packet quantity (figures & diagram). As the result of the study shows, Round-Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some cases, they were eventually alleviated by repeated tests for a long period of time.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.