• Title/Summary/Keyword: network data

Search Result 17,760, Processing Time 0.046 seconds

A Study on Voice Communication over Data Communication Network (데이터 통신망에서 음성통신에 대한 연구)

  • 우홍체
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.11a
    • /
    • pp.471-475
    • /
    • 2000
  • Voice and data are transmitted over a single packetized data communications network which is designed for data communications. The public switched telephone network for voice and the packet data network for data are merging into a single data network to get efficiency and to reduce operational cost. However, integrating voice and data transmission over a single data network is not easy because voice should be transmitted without delay but data should be transmitted without error. Advances in technology begin to overcome basic differences. Several integration methods in voice and data will be examined and reviewed here. Moreover, trends and problems on integration will be also discussed.

  • PDF

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Effective Feature Selection Model for Network Data Modeling (네트워크 데이터 모델링을 위한 효과적인 성분 선택)

  • Kim, Ho-In;Cho, Jae-Ik;Lee, In-Yong;Moon, Jong-Sub
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.92-98
    • /
    • 2008
  • Network data modeling is a essential research for the evaluation for intrusion detection systems performance, network modeling and methods for analyzing network data. In network data modeling, real data from the network must be analyzed and the modeled data must be efficiently composed to reflect a sufficient amount of the original data. In this parer the useful elements of real network data were quantified from packets captured from a huge network. Futhermore, a statistical analysis method was used to find the most effective element for efficiently classifying the modeled data.

New Database Table Design Program of Real Time Network for High Speed Train

  • Cho, Chang-Hee;Park, Min-Kook;Kwon, Soon-Man;Kim, Yong-Ju;Kim, Sung-Shin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2164-2168
    • /
    • 2003
  • Real time control system such as in factory automation fields, defense field, aerospace, railway industries, financial trading and so forth, includes multiple computers on multiple nodes, and share data to process various actions and functions. This is similar to multitasking in a multiprocessor computer system. The task processing efficiency of such system is proportionally increased by process speed of each process computer. And also it is greatly influenced by communication latencies of each node. To provide proper operation of such real time system, a network that can guarantee deterministic exchange of certain amount of data within a limited time is required. Such network is called as a real time network. As for modern distributed control system, the timeliness of data exchange gives important factor for the dynamics of entire control system. In a real time network system, exchanged data are determined by off-line design process to provide the timeliness of data. In other word, designer of network makes up a network data table that describes the specification of data exchanged between control equipments. And by this off-line design result, the network data are exchanged by predetermined schedule. First, this paper explains international standard real time network TCN (Train Communication Network) applied to the KHST (Korean High Speed Train) project. And then it explains the computer program developed for design tool of network data table of TCN.

  • PDF

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

Deep learning-based recovery method for missing structural temperature data using LSTM network

  • Liu, Hao;Ding, You-Liang;Zhao, Han-Wei;Wang, Man-Ya;Geng, Fang-Fang
    • Structural Monitoring and Maintenance
    • /
    • v.7 no.2
    • /
    • pp.109-124
    • /
    • 2020
  • Benefiting from the massive monitoring data collected by the Structural health monitoring (SHM) system, scholars can grasp the complex environmental effects and structural state during structure operation. However, the monitoring data is often missing due to sensor faults and other reasons. It is necessary to study the recovery method of missing monitoring data. Taking the structural temperature monitoring data of Nanjing Dashengguan Yangtze River Bridge as an example, the long short-term memory (LSTM) network-based recovery method for missing structural temperature data is proposed in this paper. Firstly, the prediction results of temperature data using LSTM network, support vector machine (SVM), and wavelet neural network (WNN) are compared to verify the accuracy advantage of LSTM network in predicting time series data (such as structural temperature). Secondly, the application of LSTM network in the recovery of missing structural temperature data is discussed in detail. The results show that: the LSTM network can effectively recover the missing structural temperature data; incorporating more intact sensor data as input will further improve the recovery effect of missing data; selecting the sensor data which has a higher correlation coefficient with the data we want to recover as the input can achieve higher accuracy.

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

Stability and a scheduling method for network-based control systems (네트워크를 이용한 제어 시스템의 안정도 및 스케줄링에 관한 연구)

  • 김용호;권욱현;박홍성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1432-1435
    • /
    • 1996
  • This paper obtains maximum allowable delay bounds for stability of network-based control systems and presents a network scheduling method which makes the network-induced delay be less than the maximum allowable delay bound. The maximum allowable delay bounds are obtained using the Lyapunov theorem. Using the network scheduling method, the bandwidth of a network can be allocated to each node and the sampling period of each sensor and controller can be determined. The presented method can handle three kinds of data (periodic, real-time asynchronous, and non real-time asynchronous data) and guarantee real-time transmissions of real-time synchronous data and periodic data, and possible transmissions of non real-time asynchronous data. The proposed method is shown to be useful by examples in two types of network protocols such as the token control and the central control.

  • PDF

A Data Caching Management Scheme for NDN (데이터 이름 기반 네트워킹의 데이터 캐싱 관리 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.291-299
    • /
    • 2016
  • To enhance network efficiency, named-data networking (NDN) implements data caching functionality on intermediate network nodes, and then the nodes directly respond to request messages for cached data. Through the processing of request messages in intermediate node, NDN can efficiently reduce the amount of network traffic, also solve network congestion problems near data sources. Also, NDN provides a data authenticate mechanism so as to prevent various Internet accidents caused from the absence of an authentication mechanism. Hence, through applying NDN to various smart IT convergence services, it is expected to efficiently control the explosive growth of network traffic as well as to provide more secure services. Basically, it is important factors of NDN which data is cached and where nodes caching data is located in a network topology. This paper first analyzes previous works caching content based on the popularity of the content. Then ii investigates the hitting rate of caches in each node of a network topology, and then propose an improved caching scheme based on the result of the analyzation. Finally, it evaluates the performance of the proposal.

A Study on Development of Automatically Recognizable System in Types of Welding Flaws by Neural Network (신경회로망에 의한 용접 결함 종류의 정량적인 자동인식 시스템 개발에 관한 연구)

  • 김재열
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.6 no.1
    • /
    • pp.27-33
    • /
    • 1997
  • A neural network approach has been developed to determine the depth of a surface breaking crack in a steel plate from ultrasonic backscattering data. The network is trained by the use of feedforward three-layered network together with a back-scattering algorithm for error correction. The signal used for crack insonification is a mode converted 70$^{\circ}$transverse wave. A numerical analysis of back scattered field is carried out based on elastic wave theory, by the use of the boundary element method. The numerical data are calibrated by comparison with experimental data. The numerical analysis provides synthetic data for the training of the network. The training data have been calculated for cracks with specified increments of the crack depth. The performance of the network has been tested on other synthetic data and experimental data which are different from the training data.

  • PDF