• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.031 seconds

A MAC Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크를 위한 매체접근제어 프로토콜)

  • Jang, Kil-Woong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.337-344
    • /
    • 2008
  • Underwater acoustic sensor networks exhibit characteristics such as high propagation delay and low data rates, which are different from those of terrestrial wireless networks. Therefore, the conventional protocols used in wireless networks can be restrictive and inefficient when applied to underwater acoustic sensor networks. In this paper, we propose a medium access control protocol (MAC) to enhance the energy efficiency and throughput in underwater acoustic sensor networks. The proposed protocol employs a slot-based competition mechanism that reserves a time slot to send a data packet in advance. In the proposed protocol, collision between nodes can occur due to competition to obtain a slot. However, the proposed protocol minimizes the collisions between nodes because the nodes store the reservation information of the neighboring nodes, this reduces unnecessary energy consumption and increases throughput. We perform a simulation to evaluate the performance of the proposed protocol with regard to the energy consumption, the number of collision, channel utilization, throughput and transmission delay. We compare the proposed protocol with the conventional protocol, and the performance results show that the proposed protocol outperforms the conventional protocol.

FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization (FDANT-PCSV: Parallel Coordinates 및 Sankey 시각화를 이용한 신속한 이상 트래픽 탐지)

  • Han, Ki hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.693-704
    • /
    • 2020
  • As a company's network structure is getting bigger and the number of security system is increasing, it is not easy to quickly detect abnormal traffic from huge amounts of security system events. In this paper, We propose traffic visualization analysis system(FDANT-PCSV) that can detect and analyze security events of information security systems such as firewalls in real time. FDANT-PCSV consists of Parallel Coordinates visualization using five factors(source IP, destination IP, destination port, packet length, processing status) and Sankey visualization using four factors(source IP, destination IP, number of events, data size) among security events. In addition, the use of big data-based SIEM enables real-time detection of network attacks and network failure traffic from the internet and intranet. FDANT-PCSV enables cyber security officers and network administrators to quickly and easily detect network abnormal traffic and respond quickly to network threats.

The Design of Remote Control System using Bluetooth Wireless Technology (블루투스 무선기술을 응용한 원격제어 시스템의 설계)

  • 전형준;이창희
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.547-552
    • /
    • 2003
  • In this thesis, interference phenomena of bluetooth networks requiring Security were minimized; strengthened security of piconet by assigning an identical PIN code to bluetooth devices, which was establishing a specific piconet during authentication stage. To establish a bluetooth piconet system. an unique ID was assigned to each bluetooth device, communication algorithms having different data formats between devices was designed, and an embedded hardware module using ARM processor and uCOS-II RTOS was implemented. About 30% of CPU efficiency in the module was increased by modifying functions including block parameters to work as nonblocking; by the increased efficiency of total piconet, the module could be used as an access point. The module could transmit maximum 10 frames of image and also audio signal by switching the packet effectively according to channel condition. By above-mentioned process, video, audio, and data could be well transmitted by the bluetooth managing program and the possibility of a commercial remote control system using bluetooth technology was suggested.

  • PDF

UAV Communication System Development by Heterogeneous Mobile Communication System (이종의 이동통신 시스템을 이용한 무인항공기 탑재용 통신시스템 개발)

  • Ko, Kyung-Wan;Park, Pyung-Joo;Lee, Suk-Shin;Lee, Byung-Seub
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.4
    • /
    • pp.490-502
    • /
    • 2009
  • This monograph details the development of communication UAV(Unmanned Aerial Vehicle) in combined modems of HSDPA with Wibro by using two kinds of mobile network. In order to apply mobile network which is currently serviced to a UAV, it is necessary to solve some problems : insurance of wide coverage based on the range of the UAV, electrical transmission of extensive image data for UAV for watching and scouting, security of stable communication environment is related to network traffic. This paper proposes those difficulties to be solved by application of correspondence system to mobile network. The proposed system consists of two parts; HSDPA part and Wibro part. The use of those can not only secure wide range of coverage but also transmit huge data. Furthermore, through utilizing them along with two kinds of mobile network, stable communication environment can be built up. All of these effects can be confirmed by experimentations and simulations.

  • PDF

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

A Protocol Interface for Energy-efficient Network Management in Ubiquitous Sensor Networks (유비쿼터스 센서네트워크에서 에너지 효율적인 망관리 프로토콜 인터페이스)

  • Kim, Byoung-Kug;Hur, Kyeong;Eom, Doo-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1221-1234
    • /
    • 2010
  • MANET(Mobile Ad-hoc Network)s have been researched primary at routing protocols and at the guarantees of QoS(Quality of Service) for mobile environments. Otherwise the Ubiquitous Sensor Networks (USNs) have some limitations in power energies and in processing of sensing data, as well as their network topologies are frequently changed by fading off and node failures. Thus we should redesign network protocols with concerning to energy efficiency for the USNs above all. In this paper, we focus on the protocol interface for managing for USNs based on the surveys. And then we figure the topology of USNs out and design the network protocol interface to make power saved, with data gathering and processing more efficient using our designed packet structures.

Performance Evaluation of WAVE Communication System for the Next-Generation ITS (차세대 ITS를 위한 WAVE 통신 시스템 성능 평가)

  • Lee, Se-Yeun;Jeong, Han-Gyun;Shin, Dae-Kyo;Lim, Ki-Taeg;Lee, Myung-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1059-1067
    • /
    • 2011
  • Next-Generation ITS environment requires high-speed data packet transmission, security, authentication, and hand-over supportable for driving vehicle on road by installing RSEs and OBUs. Therefore, wireless communication technology for next-generation ITS services are advancing to 200km/h maximum speed supportable, 1km communication radius, minimum 10Mbps hish-speed datarate for multimedia data(such as text, images, movie clips and so on) supportable, high reliability. In this paper, we implemented WAVE communication system which based on IEEE 802.11p PHY/MAC and evaluated that the system meets next-generation ITS environments.

Traffic Analysis of Statistics based on Internet Application Services (인터넷 응용 서비스의 통계에 근거한 트래픽 분석)

  • 정태수;최진섭;정중수;김정태;김대영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.995-1003
    • /
    • 2004
  • A number of Internet application services are used with the development of Internet backbone nowadays. Well-known services such as WWW, ]n, email are provided at first time. Tremendous unwell-known services are presented according to the demands of various contents. After analyzing PDU information of the packet using unwell-known port travelling on the internet, searching internet service type and its statistical data is provided with internet traffic analyst as very useful information. This paper presents the mechanism to extract the internet application services operated on (un)well-known port of UDP or TCP used occasionally through netflow and tcpdump method introduced by ethereal and the operation scheme of the service. Afterwards to get the detailed statistics of the analyzed application service, the agent and the server environment, the agent gathering raw data traffics and the server adapting the traffic received from the agent BNF(Backus-Naur Form) method, is also introduced. Adapting the presented mechanism eve. LAN of Andong national university, the internet traffic service type and the detailed statistics of the analyzed application services which provides with internet traffic analyst are presented as very useful information.

Decreasing Transmission Power with Provisioning Quality of Experience in Mobile Communication Networks (이동통신망에서 송신전력 절감 및 QoE 보장을 위한 전력관리 방안)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2219-2225
    • /
    • 2016
  • Mobile communication systems should be able to support multimedia traffics with limited transmit power due to the frequency reuse for maximizing the channel accommodation. Real-time data is very sensitive to delay, and they need to be transmitted instantly. On the other hand, non-real time data is less sensitive to delay, and their packet loss can be handled more flexibly. Therefore an adaptive resource management scheme is essentially required which enables to keep the minimal power allocated in the base station while guaranteeing the user requirements for QoE within a permissible range. Power-saving techniques are required in order to support multimedia services in the mobile networks because the power consumption increases greatly with the transmission rate increase. This paper proposes a novel scheme which enables to keep the allocated power minimal while guaranteeing the user requirements for QoE within a permissible range.

Design and Performance Evaluation of Wireless Ad-Hoc Network System based on IEEE 802.16j MMR (IEEE 802.16j MMR 기반 무선 애드 혹 네트워크 시스템 설계 및 성능 평가)

  • Ju, Kwangsung;Chung, Kwangsue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.723-733
    • /
    • 2012
  • In wireless ad hoc networks, packet loss and latency are frequently occurred by movement of node. As the number of transmission hops increases in these networks, the throughput is increasingly deteriorated. In this paper, we design the wireless ad hoc network system based on IEEE 802.16j MMR (Mobile Multi-hop Relay), which improves the network performance. Our wireless ad hoc network system used adaptively the nearest BS and Farthest BS scheduling algorithms for efficient data transmission and chose the optimal path that minimize data loss and latency. In order to evaluate performance of the wireless ad hoc network system based on IEEE 802.16j MMR, we used the LWX (Light Wimax) model of NS-2 simulator. Through the simulation, we analyzed the network performance for various scenarios.