• Title/Summary/Keyword: data payload

Search Result 262, Processing Time 0.023 seconds

Design, Implementation and Test of Flight Model of X-Band Transmitter for STSAT-3 (과학기술위성 3호 X-대역 송신기 비행모델 설계, 제작 및 시험)

  • Seo, Gyu-Jae;Lee, Jung-Soo;Oh, Chi-Wook;Oh, Seung-Han;Chae, Jang-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.5
    • /
    • pp.461-466
    • /
    • 2012
  • This paper describes the development and test result of X-band Transmitter flight model(FM) of STSAT-3 by satellite research center(SaTReC), KAIST. The communication sub-system of STSAT-3 is consist of two different frequency band channels. S-band frequency is used for Telemetry & Command, and X-band frequency is used for mission data. Payload observations data in Mass Memory Unit (MMU) is modulated by QPSK modulator in X-band Transmitter, and then QPSK modulation signal is transmitted to antenna through transfer switch. In this Paper, we described the results of modulation, low-pass filter design, power amp development, and switch test. The FM XTU is delivered Spacecraft Assembly, Integration and Test(AIT) level through the completion of functional Test and environmental(vibration, thermal vacuum) Test successfully.

Performance Analysis of Multiple Access Protocol for Maritime VHF Data Exchange System (VDES) (해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구)

  • Yun, Changho;Cho, A-Ra;Kim, Seung-Geun;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2839-2846
    • /
    • 2014
  • New VHF band for use in VDE is determined by WRC-12 due to the overload of AIS VDL, and the system characteristics of the VDE is recommended as ITU-R M. 1842-1. CS-TDMA, a multiple access method of AIS class B, is recommended as that of the VDE. It is inefficient for CS-TDMA just applying the report interval used in AIS class B to transmit high speed data with higher payload in the aspect of efficiency. In this paper, a simulation is executed in order to determine adequate report interval according to the number of active ships that affects directly network traffic. To this end, the performance of CS-TDMA, which includes the number of received packets, reception success rate, channel utilization, and collision rate, is investigated via a simulation.

Video Conferencing Authentication : A Key Management Protocol Design for safety (화상상담 인증 : 안전한 키 관리 프로토콜 설계)

  • Deug, Jung-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.85-92
    • /
    • 2010
  • There is an authentication method for participants with an encrypted ID and password as a symmetric-key in multilateral video conferencing. It is hard to manage when the security-keys makes many while the transportation processing for the encryption and decryption get complicated when the video conferencing involves a number of participants and the third party as an attackers to gain unauthorized symmetric-key to access video conference which makes a problem less secrecy. This study suggests three ways to enhance security in video conference: first, we present PKI-based X.509 certificate for authenticating the participants of multilateral conferencing and we suggest to encode and decode the video conference media data using a secrecy key created by each of the conference participants; second, a more secured multilateral video conferencing can be expected in a group communication by using the participants secrecy key in creating and distributing group keys, where the group key will be renewed whenever there is change in the group member; and finally, we suggest to encode the RTP payload of the media data before transmission.

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.

Study on the Functional Classification of IM Application Traffic using Automata (오토마타를 이용한 메신저 트래픽의 기능별 분류에 관한 연구)

  • Lee, Sang-Woo;Park, Jun-Sang;Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.921-928
    • /
    • 2011
  • The increase of Internet users and services has caused the upsurge of data traffic over the network. Nowadays, variety of Internet applications has emerged which generates complicated and diverse data traffic. For the efficient management of Internet traffic, many traffic classification methods have been proposed. But most of the methods focused on the application-level classification, not the function-level classification or state changes of applications. The functional classification of application traffic makes possible the in-detail understanding of application behavior as well as the fine-grained control of applications traffic. In this paper we proposed automata based functional classification method of IM application traffic. We verified the feasibility of the proposed method with function-level control experiment of IM application traffic.

Leader - Follower based Formation Guidance Law and Autonomous Formation Flight Test of Multiple MAVs (편대 유도 법칙 및 초소형 비행체의 자동 편대 비행 구현)

  • You, Dong-Il;Shim, Hyun-Chul
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.2
    • /
    • pp.121-127
    • /
    • 2011
  • This paper presents an autonomous formation flight algorithm for micro aerial vehicles (MAVs) and its flight test results. Since MAVs have severe limits on the payload and flight time, formation of MAVs can help alleviate the mission load of each MAV by sharing the tasks or coverage areas. The proposed formation guidance law is designed using nonlinear dynamic inversion method based on 'Leader-Follower' formation geometric relationship. The sensing of other vehicles in a formation is achieved by sharing the vehicles' states using a high-speed radio data link. the designed formation law was simulated with flight data of MAV to verify its robustness against sensor noises. A series of test flights were performed to validate the proposed formation guidance law. The test result shows that the proposed formation flight algorithm with inter-communication is feasible and yields satisfactory results.

The Effect Analysis of Compression Method on KOMPSAT Image Chain

  • Yong, Sang-Soon;Ra, Sung-Woong
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.431-437
    • /
    • 2007
  • Multi-Spectral Camera(MSC) on the KOMPSAT-2 satellite was developed and launched as a main payload to provide 1m of GSD(Ground Sampling Distance) for one(1) channel panchromatic imaging and 4m of GSD for four(4) channel multi-spectral imaging at 685km altitude covering l5km of swath width. Since the compression on MSC image chain was required to overcome the mismatch between input data rate and output date rate JPEG-like method was selected and analyzed to check the influence on the performance. In normal operation the MSC data is being acquired and transmitted with lossy compression ratio to cover whole image channel and full swath width in real-time. In the other hand the MSC performance have carefully been handled to avoid or minimize any degradation so that it was analyzed and restored in KGS(KOMPSAT Ground Station) during LEOP(Launch and Early Operation Phase). While KOMPSAT-2 had been developed, new compression method based upon wavelet for space application was introduced and available for next satellite. The study on improvement of image chain including new compression method is asked for next KOMPSAT which requires better GSD and larger swath width In this paper, satellite image chain which consists of on-board image chain and on-ground image chain including general MSC description is briefly described. The performance influences on the image chain between two on-board compression methods which are or will be used for KOMPSAT are analyzed. The differences on performance between two methods are compared and the better solution for the performance improvement of image chain on KOMPSAT is suggested.

Propulsion System Design and Optimization for Ground Based Interceptor using Genetic Algorithm

  • Qasim, Zeeshan;Dong, Yunfeng;Nisar, Khurram
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.330-339
    • /
    • 2008
  • Ground-based interceptors(GBI) comprise a major element of the strategic defense against hostile targets like Intercontinental Ballistic Missiles(ICBM) and reentry vehicles(RV) dispersed from them. An optimum design of the subsystems is required to increase the performance and reliability of these GBI. Propulsion subsystem design and optimization is the motivation for this effort. This paper describes an effort in which an entire GBI missile system, including a multi-stage solid rocket booster, is considered simultaneously in a Genetic Algorithm(GA) performance optimization process. Single goal, constrained optimization is performed. For specified payload and miss distance, time of flight, the most important component in the optimization process is the booster, for its takeoff weight, time of flight, or a combination of the two. The GBI is assumed to be a multistage missile that uses target location data provided by two ground based RF radar sensors and two low earth orbit(LEO) IR sensors. 3Dimensional model is developed for a multistage target with a boost phase acceleration profile that depends on total mass, propellant mass and the specific impulse in the gravity field. The monostatic radar cross section (RCS) data of a three stage ICBM is used. For preliminary design, GBI is assumed to have a fixed initial position from the target launch point and zero launch delay. GBI carries the Kill Vehicle(KV) to an optimal position in space to allow it to complete the intercept. The objective is to design and optimize the propulsion system for the GBI that will fulfill mission requirements and objectives. The KV weight and volume requirements are specified in the problem definition before the optimization is computed. We have considered only continuous design variables, while considering discrete variables as input. Though the number of stages should also be one of the design variables, however, in this paper it is fixed as three. The elite solution from GA is passed on to(Sequential Quadratic Programming) SQP as near optimal guess. The SQP then performs local convergence to identify the minimum mass of the GBI. The performance of the three staged GBI is validated using a ballistic missile intercept scenario modeled in Matlab/SIMULINK.

  • PDF

Modeling and Analysis of Wireless Lan Traffic (무선 랜 트래픽의 분석과 모델링)

  • Yamkhin, Dashdorj;Lee, Seong-Jin;Won, You-Jip
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.667-680
    • /
    • 2008
  • In this work, we present the results of our empirical study on 802.11 wireless LAN network traffic. We collect the packet trace from existing campus wireless LAN infra-structure. We analyzed four different data sets: aggregate traffic, upstream traffic, downstream traffic, tcp only packet trace from aggregate traffic. We analyze the time series aspect of underlying traffic (byte count process and packet count process), marginal distribution of time series, and packet size distribution. We found that in all four data sets there exist long-range dependent property in byte count and packet count process. Inter-arrival distribution is well fitted with Pareto distribution. Upstream traffic, i.e. from the user to Internet, exhibits significant difference in its packet size distribution from the rests. Average packet size of upstream traffic is 151.7 byte while average packet size of the rest of the data sets are all greater than 260 bytes. Packets with full data payloads constitutes 3% and 10% in upstream traffic and the downstream traffic, respectively. Despite the significant difference in packet size distribution, all four data sets have similar Hurst values. The Hurst alone does not properly explain the stochastic characteristics of the underlying traffic. We model the underlying traffic using fractional-ARIMA (FARIMA) and fractional Gaussian Noise (FGN). While the fractional Gaussian Noise based method is computationally more efficient, FARIMA exhibits superior performance in accurately modeling the underlying traffic.

Communication Data Format Design for LEO Satellite with Packet Utilization Standard (Packet Utilization 개념을 이용한 저궤도 위성의 데이터 통신 포맷 설계)

  • Lee, Na-Young;Lee, Jin-Ho;Suk, Byong-Suk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.2
    • /
    • pp.13-17
    • /
    • 2008
  • The conventional telemetry system of Korean low-earth orbiting satellites has certain limitations in accommodating various missions. As the payload becomes complex, it requires very complicated operational concepts in terms of telemetry. With the current design, the telemetry formats have to be rebuilt whenever new payloads or operation concepts are involved, and many constraints in operation shall be produced due to the lacks of its flexibility. As the capability and performance of a satellite have been improved, the communication structure of the satellite should be improved to gather more telemetry data. For the efficiency of data handling, it is necessary to change the grid based telemetry system in which the downlink interval and types for telemetry was limited. Comparing the fixed data map such as grid type, the packet based telemetry system can be operated as flexible and various types of packet can be designed such as the dump packet and the event packet. The sequence of the packets can be modified or newly defined to manage the massive satellite state of health data. In this paper, a new strategy for the telemetry development partially derived from PUS (Packet Utilization Standard) of European Space Agency, which provides enhanced features for the accommodation of payloads & operational requirements, is presented.

  • PDF