• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.03 seconds

The Method of MBS Data Transmission Synchronization Using Loss Preventive Device of Transmission Synchronization Information and Its Packet Data (전송 동기화 정보와 패킷 데이터 손실 방지 장치를 이용한 멀티캐스트/브로드캐스트 서비스 데이터 전송 동기화 방법)

  • Kim, Kwang-Yong;Kim, Young-Il;Cho, Cheol-Hoe;Ryu, Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.251-254
    • /
    • 2011
  • 와이브로(Wibro) 또는 WiFI 망에서 동일한 멀티캐스트 그룹에 속한 이동 단말기들은 동일한 MBS(멀티캐스트/브로드캐스트 방송 서비스) 콘텐츠를 수신한다. 동일한 MBS 존 내의 기지국(RAS: Radio Access Station) 들이 MBS 콘텐츠 소스로부터 수신된 MBS 콘텐츠에 대한 전송 시간을 동기화할 수 있도록 기지국들은 전송 동기화 정보와 신뢰성 있는 데이터 패킷 수신을 동기 시간을 결정하기 이전에 보장받을 수 있어야 한다. 만약에 동일한 MBS 존에 속하는 다수의 기지국 중에 전송 동기화 정보를 수신하지 못하거나 패킷 데이터 일부 또는 전부를 수신하지 못한다면, 동기 전송 시간을 결정하기 전에 이미 손실된 정보와 패킷 데이터를 이동 단말기로 전송하게 됨으로써 이동 단말기가 MBS 콘텐츠를 수신하면서 동일 MBS 존 내의 다른 기지국으로 핸드오버하게 되면 MBS 콘텐츠에 대한 끊김없는 수신을 보장할 수 없을 뿐만 아니라 매크로 다이버시티(macro diversity) 이득을 얻기 위한 동일한 MBS 존에서 이동 단말기들에게 전송되는 MBS 콘텐츠들의 동기를 보장 할 수 없다. 따라서, 본 논문에서는 동기 전송 시간을 결정하기 앞서서 다수의 RAS가 전송 동기화 정보와 신뢰성 있는 패킷 데이터 콘텐츠 수신을 보장받을 수 있는 장치를 보완한 멀티캐스트/브로드캐스트 서비스 데이터 전송 동기화 방법을 제안한다.

  • PDF

Implementation of an USB Camera Interface Based on Embedded Linux System (임베디드 LINUX 시스템 기반 USB 카메라 인터페이스 구현)

  • Song Sung-Hee;Kim Jeong-Hyeon;Kim Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.169-175
    • /
    • 2005
  • In recent, implementation of the embedded system is gradually in the spotlight of world-wide by information technology(IT) engineers. By this time, an implementation of real time system is limited on image acquisition and processing system in practical. In this paper, the USB camera interface system based on the embedded linux OS is implemented using USB 2.0 camera with low cost. This system can obtain image signals into the memory via X-hyper255B processor from USB camera. It is need to initialize USB camera by the Video4Linux for the kernel device driver. From the system image capturing and image processing can be performed. It is confirmed that the image data can be transformed to packet of Network File System(NFS) and connected to the internetwork, then the data can be monitored from the client computer connected to the internetwork.

  • PDF

A realization of up/down-stream transmission on an optical subscriber network with the PON structure (PON구조의 광가입자망에서 상/하향전송 구현)

  • 김효중;이찬구;강성수;이만섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.795-806
    • /
    • 1996
  • A structure which transmits and receives 3 subscribers packet data through an optical splitter node in an optical subscriber network of PON wave suggested and realized. All the functions which are necessary to use PON structure such as 155.52Mb/s multiplexer/demultiplexer of down-stream signal, 25.92Mb/s multiplexer/demultiplexer of up-stream signal, frame synchronizer, and phase aligner for aligning phase of the clock and received data have been integrated within 2 ICs using CMOS technonology. TDMAtechnology was suggested for up-stream transmission. In the optical up-stream transmission of the urst signals transmissionquality degradataion by APC and AGC of optical tranceiver was observed. By compensating the degradation, more than 17dB of link budget which is enough to satisfy 11.2dBthat is required in SWAN of PON architecture has been obtained with optical transceiver whose power and sensitivity are -17dBm and -34dBm respectively.

  • PDF

A Design of MAC Protocol for Dynamic WDM Channel and Bandwidth Allocation in TDM-PON (TDM-PON에서 동적 WDM 채널 및 대역폭 할당을 위한 MAC 프로토콜 설계 연구)

  • Lee Sung-Kuen;Kim Eal-Lae;Lee Yong-Won;Lee Sang-Rok;Jung Dae-Kwang;Hwang Seong-Taek;Oh Yun-Je;Park Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.777-784
    • /
    • 2006
  • In this paper, we propose the PON-based access network based on conventional TDM-PON architecture, which utilizes WDM wavelength channel and bandwidth dynamically. It is also described a dynamic MAC protocol in order to increase the number of subscribers and efficiency of resource utilization. Of particular importance in the proposed approach for MAC protocol is that the wavelength channel and time slot for up/downlink is dynamically allocated according to the required QoS level and the amount of data in data transmission, through the dedicated control channel between OLT and ONU. We evaluate the performance of average packet end-to-end delay in a statistical analysis and numerical analysis. In addition, through simulations with various traffic models, we verified the superior performance of the proposed approach by comparing with the results of other E-PONs.

Sink Location Dissemination Scheme in Geographic Routing for Wireless Sensor Networks (무선 센서 망을 위한 위치 기반 라우팅에서 싱크 위치 전달 방안)

  • Lee, Eul-Sin;Park, Soo-Chang;Lee, Jeong-Cheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.847-856
    • /
    • 2009
  • In geographic routing for wireless sensor networks, sources need the location of sinks destined for delivering their data packets. Most of the existing geographic routing protocols merely assume that the sources can get the locations of sinks by some location service. How source nodes find out the location of sinks is not easy. In this paper, we propose a sink location dissemination scheme in geographic routing for wireless sensor networks. In this scheme, a source node and a sink node send sink location announcement and query messages along two paths respectively by geographic routing. The node located on the crossing point of the two paths informs the source about the sink location. Then the source can send data packet to the sink by geographic routing. How to guarantee that these two paths have at least one crossing point in any irregular profile of sensor network is the challenge of this paper Simulation results show that our protocol is significantly superior to other protocols in terms of energy consumption and control overhead.

Performance Analysis of Type-I Hybrid ARQ System Considering Transmission Delay Time (전송 지연시간을 고려한 Type-I Hybrid ARQ 시스템의 성능 분석)

  • 조치원;유흥균
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.6
    • /
    • pp.879-888
    • /
    • 1999
  • A Study on the ARQ scheme of data error control is important for more reliable information transmission. Since performance difference is large by the long transmission delay time in satellite communication, the performances of SR ARQ and conventional type-I hybrid ARQ with fixed code rate are investigated by using the parameters of packet length, channel capacity, BER, and transmission delay time especially. BCH code is used in type-I hybrid ARQ for FEC method. This paper presents the throughput analyses according to such various parameters as BCH code rate, window size, data rate and round-trip delay time. Especially we derive a performance equation of type-I hybrid ARQ with the factor of the transmission delay time using the equation of SAW ARQ. Also, the performance of type-I hybrid ARQ specially considering transmission delay time is analyzed through numerical analysis and computer simulation so we can get a important characteristics variation.

  • PDF

Earthquake-related Data Selection using Event Packets (이벤트 패킷을 이용한 지진관련 데이터의 추출)

  • Lim, In-Seub;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.59-68
    • /
    • 2008
  • In this paper, we propose a method for selecting meaningful event packets from which can receive before anything else from seismograph according to allotted priority and estimate epicenter using selected packets. Event packets which received from each station will be evaluated with their onset time, signal period and SNR by statistical method and will be selected packets related with real earthquake's P-wave. And estimated epicenters using by 'Application of epicenter estimation using first P arrivals'. With local earthquakes occurred in 2007 were announced by KMA, collected event packets on earthquake happened date and selected p-wave related packets and estimated epicenter. After result of experiment, if an earthquake occurred within seismic networks, can estimate epicenter with small misfits just after event packets arrived from above 4 stations. Considering average distance of each station, in case of using all stations' data include other organization, can estimate and alert rapidly. It show this method is useful when construct a local earthquake early warning system later.

  • PDF

Data Interworking Model Between DLMS and LwM2M Protocol (DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구)

  • Myoung, Nogil;Park, Myunghye;Kim, Younghyun;Kang, Donghoon;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2020
  • Despite the same system architecture and operation principle, Advanced Metering Infrastructure (AMI) and Internet of Things (IoT) are recognized as a heterogeneous system. This is due to the different object modeling and communication protocols used in smart meters and sensors. However, data interworking between AMI and IoT is expected to be inevitable in the future. In this paper, we propose Device Language Message Specification (DLMS) to Lightweight Machine to Machine (LwM2M) conversion model. The proposed interworking model can reduce the packet size by 46.5% compared to that of the encapsulation method.

A Study on MAC Protocol with Dynamic Priority Adjustment in WBAN (WBAN 환경에서 동적 우선순위를 적용한 MAC 프로토콜에 관한 연구)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1589-1598
    • /
    • 2014
  • To support the WBAN, IEEE 802.15 Task Group 6 announced standardized documents on technical requirements of the PHY and MAC. In the IEEE 802.15.6 MAC protocol, CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) algorithm is performed based on the eight-level priorities according to the type of traffics of the periodic data from medical sensor nodes. Several nodes, which detected the changed bio signals, transmit emergency data at the same time, so latency could be higher than emergency latency and energy consumption will increase. In this thesis, we proposed a CSMA/CA algorithm in WBAN to solve these problems. Simulations are performed using a Castalia based on the OMNeT++ network simulation framework to estimate the performance of the proposed superframe and algorithms. Performance evaluation results show that the packet transmission success rate and energy efficiency are improved by reducing the probability of collision using the proposed MAC protocol.

Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System (SNMP 기반의 실시간 트래픽 폭주 공격 탐지 시스템 설계 및 구현)

  • Park, Jun-Sang;Kim, Sung-Yun;Park, Dai-Hee;Choi, Mi-Jung;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.13-20
    • /
    • 2009
  • Recently, as traffic flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network traffic. In this paper we propose an SNMP-based lightweight and fast detection algorithm for traffic flooding attacks, which minimizes the processing and network overhead of the detection system, minimizes the detection time, and provides high detection rate. The attack detection algorithm consists of three consecutive stages. The first stage determines the detection timing using the update interval of SNMP MIB. The second stage analyzes attack symptoms based on correlations of MIB data. The third stage determines whether an attack occurs or not and figure out the attack type in case of attack.