• Title/Summary/Keyword: event packet

Search Result 69, Processing Time 0.029 seconds

Development of hybrid monitoring framework for fault detectability enhancement on IT-System (IT 시스템 장애탐지력 향상을 위한 하이브리드 모니터링 프레임워크 개발)

  • Park, Sok-Hwan;Son, Jiseong;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1203-1206
    • /
    • 2012
  • 본 논문은 다양한 기기로 구성된 분산 IT 환경에서 보다 신속한 장애 탐지 및 원인 파악을 위한 Monitoring framework을 제안한다. 제안된 Framework은 전통적인 Event Correlation 기법과 전통적 기법의 문제점 해결을 위한 Probing 기법을 혼용한(Hybrid) 것인데, 이를 통해 각각의 기법이 지닌 한계를 극복하고, 장애탐지 능력을 향상시킨다. 즉, Event Correlation 기법은 임계영역에서 장애 판별이 어려운 문제점이 있는데, 이러한 경우 장애 여부를 확신하기 위해 Probe station을 이용하여 Probe를 실행함으로써 장애 판단 능력을 향상시켰다. 또한 Probing 기법은 복잡한 분산 IT 환경에서 Probe Set를 구성하는 어려움이 있는데, 이를 회피하는데 도움을 준다. 본 논문에서는 Web 기반 애플리케이션에서 User-Session을 기반으로 추출한 Http Packet를 Probe set으로 이용하여 구현하였다.

On Improving Wireless TCP Performance Using Supervisory Control (관리 제어를 이용한 무선 TCP 성능 향상에 관한 방법)

  • Byun, Hee-Jung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.10
    • /
    • pp.1013-1017
    • /
    • 2010
  • This paper proposes a systematic approach to the rate-based feedback control based on the supervisory control framework for discrete event systems. We design the supervisor to achieve the desired behavior for TCP wireless networks. From the analysis and simulation results, it is shown that the controlled networks guarantee the fair sharing of the available bandwidth and avoid the packet loss caused by the buffer overflow of TCP wireless networks.

Modelingof Prioritized Token Ring (우선순위 토큰링의 모델링)

  • 채기준
    • Journal of the Korea Society for Simulation
    • /
    • v.2 no.1
    • /
    • pp.46-54
    • /
    • 1993
  • Analytic and simulation models for prioritized token ring are presented in this paper. Its protocol is based on prioritized token ring with reservation (R-PTR). Since the protocol of the R-PTR is simple and the performance of the R-PTR is not inferior to that of the IEEE-PTR under almost all traffic load environments, we use the R-PTR as our token ring model. By using the properties of Markovian process, the expressions for average throughput and average packet transmission delay are derived. The results obtained from the analytic model are compared with that of the discrete event simulation model.

  • PDF

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

Process of Hairpin Vortex Packet Generation in Channel Flows (채널 유동 내에서 헤어핀 보텍스 패킷의 형성 과정)

  • Kim, Kyoung-Youn
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.8
    • /
    • pp.839-847
    • /
    • 2012
  • Numerical simulations for channel flows with $Re_{\tau}$ = 180, 395 and 590 have been performed to investigate the hairpin packet formation process in wall-bounded turbulent flows. Using direct numerical simulation databases, the initial flow fields are given by the conditionally averaged flow field with the second quadrant event specified at the buffer layer. By tracking the initial vortex development, the change in the initial vortex to an ${\Omega}$-shaped vortex and th generation of a secondary hairpin vortex were found to occur with time scales based on the wall units. In addition, at the time when the initial vortex has grown to the channel center, the inclination angle of the hairpin vortex packet is approximately $12{\sim}14^{\circ}$, which is similar for all three Reynolds numbers. Finally, numerical simulations of the evolution of two adjacent hairpin vortices have been performed to examine the interaction between the adjacent vortex packets.

A Traffic Aware Demand-Wakeup MAC(TADW-MAC) Protocol for Wireless Sensor Networks (무선 센서 네트워크에서 트래픽에 적응적인 Demand-Wakeup MAC 프로토콜)

  • Kim, Hye-Yun;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.180-186
    • /
    • 2017
  • In this paper we propose a traffic aware Demand Wakeup MAC(TADW-MAC) protocol, in which low data delay and high throughput can be achieved, for wireless sensor networks. With the TADW-MAC protocol, the problem of the DW-MAC protocol, which schedules only one packet to deliver during the Sleep period in a multi-hop transmission is resolved. DW-MAC is not adequate for the applications such as object tracking and fire detection, in which busty data should be transmitted in a limited time when an event occurs [6-8]. When an event occurs, duty cycle can be adjusted in the TADW-MAC protocol to get less energy consumption and low latency. The duty cycle mechanism has been widely used to save energy consumption of sensor node due to idle listening in wireless sensor networks. But additional delay in packet transmission may be increased in the mechanism. Our simulation results show that TADW-MAC outperforms RMAC and DW-MAC in terms of energy efficiency while achieving low latency.

A Reliable Transmission and Buffer Management Techniques of Event-driven Data in Wireless Sensor Networks (센서 네트워크에서 Event-driven 데이터의 신뢰성 있는 전송 및 버퍼 관리 기법)

  • Kim, Dae-Young;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.867-874
    • /
    • 2010
  • Since high packet losses occur in multi-hop transmission of wireless sensor networks, reliable data transmission is required. Especially, in case of event-driven data, a loss recovery mechanism should be provided for lost packets. Because retransmission for lost packets is requested to a node that caches the packets, the caching node should maintains all of data for transmission in its buffer. However, nodes of wireless sensor networks have limited resources. Thus, both a loss recovery mechanism and a buffer management technique are provided for reliable data transmission in wireless sensor networks. In this paper, we propose a buffer management technique at a caching position determined by a loss recovery mechanism. The caching position of data is determined according to desirable reliability for the data. In addition, we validate the performance of the proposed method through computer simulations.

List-event Data Resampling for Quantitative Improvement of PET Image (PET 영상의 정량적 개선을 위한 리스트-이벤트 데이터 재추출)

  • Woo, Sang-Keun;Ju, Jung Woo;Kim, Ji Min;Kang, Joo Hyun;Lim, Sang Moo;Kim, Kyeong Min
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.309-316
    • /
    • 2012
  • Multimodal-imaging technique has been rapidly developed for improvement of diagnosis and evaluation of therapeutic effects. In despite of integrated hardware, registration accuracy was decreased due to a discrepancy between multimodal image and insufficiency of count in accordance with different acquisition method of each modality. The purpose of this study was to improve the PET image by event data resampling through analysis of data format, noise and statistical properties of small animal PET list data. Inveon PET listmode data was acquired as static data for 10 min after 60 min of 37 MBq/0.1 ml $^{18}F$-FDG injection via tail vein. Listmode data format was consist of packet containing 48 bit in which divided 8 bit header and 40 bit payload space. Realigned sinogram was generated from resampled event data of original listmode by using adjustment of LOR location, simple event magnification and nonparametric bootstrap. Sinogram was reconstructed for imaging using OSEM 2D algorithm with 16 subset and 4 iterations. Prompt coincidence was 13,940,707 count measured from PET data header and 13,936,687 count measured from analysis of list-event data. In simple event magnification of PET data, maximum was improved from 1.336 to 1.743, but noise was also increased. Resampling efficiency of PET data was assessed from de-noised and improved image by shift operation of payload value of sequential packet. Bootstrap resampling technique provides the PET image which noise and statistical properties was improved. List-event data resampling method would be aid to improve registration accuracy and early diagnosis efficiency.

Fault-Tolerant Control System for Unmanned Aerial Vehicle Using Smart Actuators and Control Allocation (지능형 액추에이터와 제어면 재분배를 이용한 무인항공기 고장대처 제어시스템)

  • Yang, In-Seok;Kim, Ji-Yeon;Lee, Dong-Ik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.10
    • /
    • pp.967-982
    • /
    • 2011
  • This paper presents a FTNCS (Fault-Tolerant Networked Control System) that can tolerate control surface failure and packet delay/loss in an UAV (Unmanned Aerial Vehicle). The proposed method utilizes the benefits of self-diagnosis by smart actuators along with the control allocation technique. A smart actuator is an intelligent actuation system combined with microprocessors to perform self-diagnosis and bi-directional communications. In the event of failure, the smart actuator provides the system supervisor with a set of actuator condition data. The system supervisor then compensate for the effect of faulty actuators by re-allocating redundant control surfaces based on the provided actuator condition data. In addition to the compensation of faulty actuators, the proposed FTNCS also includes an efficient algorithm to deal with network induced delay/packet loss. The proposed algorithm is based on a Lagrange polynomial interpolation method without any mathematical model of the system. Computer simulations with an UAV show that the proposed FTNCS can achieve a fast and accurate tracking performance even in the presence of actuator faults and network induced delays.

Network Anomaly Detection using Association Rule Mining in Network Packets (네트워크 패킷에 대한 연관 마이닝 기법을 적용한 네트워크 비정상 행위 탐지)

  • Oh, Sang-Hyun;Chang, Joong-Hyuk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2009
  • In previous work, anomaly-based intrusion detection techniques have been widely used to effectively detect various intrusions into a computer. This is because the anomaly-based detection techniques can effectively handle previously unknown intrusion methods. However, most of the previous work assumed that the normal network connections are fixed. For this reason, a new network connection may be regarded as an anomalous event. This paper proposes a new anomaly detection method based on an association-mining algorithm. The proposed method is composed of two phases: intra-packet association mining and inter-packet association mining. The performances of the proposed method are comparatively verified with JAM, which is a conventional representative intrusion detection method.