• Title/Summary/Keyword: packet data

검색결과 1,637건 처리시간 0.029초

The Technique of Scheduling for dynamic data transmission in MOST GATEWAY System (MOST GATEWAY 시스템에서 효율적 데이터 전송을 위한 스케줄링 기법에 관한 연구)

  • Jang, Seong-Jin;Jang, Jong-Yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.441-444
    • /
    • 2010
  • In our previous research, we proposed a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25 and a simulation design method for performance analysis of Scheduling Algorithm in MOST GATEWAY system. Therefore in this paper, we use CANoe.MOST simulator in order to analyze the performance and propose a algorithm design method for Performance analysis according to number of queues by applying existing scheduling algorithms. Finally, we present an improvement scheme of the efficiency and scalability.

  • PDF

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • 제52권12호
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

A Study on Service Quality Diagnosis Techniques for LTE/5G Network Backhaul (LTE/5G 네트워크 백홀(Backhaul)의 서비스 품질진단 기법에 관한 연구)

  • Ji-Hyun Yoo
    • Journal of IKEEE
    • /
    • 제27권4호
    • /
    • pp.617-623
    • /
    • 2023
  • With the evolution of communication networks, there is a growing demand for stable high-speed data connections to support services relying on large-capacity data. The increasing volume of packet data aggregated from user devices underscores the significance of quality diagnostics for the backhaul network, an intermediate link transmitting data to the core network. This paper conducts empirical research on techniques to diagnose issues within the backhaul network through practical case studies, through diagnosing various factors such as circuit bandwidth, speed disparities within switches, network segment-specific buffer sizes, routing policies, among other factors that could potentially cause RTT (Round Trip Time) delays and performance degradation.

Implementation of RTP/RTCP for Teleconferencing System and Analysis of Quality-of-Service using Audio Data Transmission (영상회의 시스템을 위한 RTP/RTCP 구현 및 오디오 데이터 전송을 위용한 QoS 분석)

  • Kang, Min-Gyu;Hwang, Seung-Koo;Kim, Dong-Kyoo
    • The Transactions of the Korea Information Processing Society
    • /
    • 제5권12호
    • /
    • pp.3047-3062
    • /
    • 1998
  • This paper deseribes the desihn and the implementation of the Realtime Transport Protocol(RTP)/ Rdaltime Control Protocol(RTCP) (RFC 1889,1890) that is used to transmit the audio/video data to any destination and to feedback the Quality of Service (QoS) information of the received media data to the sender, in the teleconferencing systems proposed by ITU-T. These protocols are implemented with multi thead technique and run on top of UDP/IP-Multicast through the socket interface as the underlying protocol. The upper layer is impelmented such that in can be accessed by the H245 comference control protocol. The RTP packetizes the digitized audio/video data from the encoder info a fixed format, and multieast to the participants. The RTCP monitors RTP packets and extracts the QoS values from it such as round-trip delay, jiter and packet loss to form RTCP packets and non periokically sends them to the sender site. In this Paper, we also descritx the study of measurement and analysis for QoS factors that observed on performing teleconferencing system over Internet. The results from this experiment is indicate that RTT and Jitter value are acceptable even entwork load is high. However, it appears that packet loss rate is high in daytime and most losses periods have length one or two.

  • PDF

The Method of Analyzing Firewall Log Data using MapReduce based on NoSQL (NoSQL기반의 MapReduce를 이용한 방화벽 로그 분석 기법)

  • Choi, Bomin;Kong, Jong-Hwan;Hong, Sung-Sam;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제23권4호
    • /
    • pp.667-677
    • /
    • 2013
  • As the firewall is a typical network security equipment, it is usually installed at most of internal/external networks and makes many packet data in/out. So analyzing the its logs stored in it can provide important and fundamental data on the network security research. However, along with development of communications technology, the speed of internet network is improved and then the amount of log data is becoming 'Massive Data' or 'BigData'. In this trend, there are limits to analyze log data using the traditional database model RDBMS. In this paper, through our Method of Analyzing Firewall log data using MapReduce based on NoSQL, we have discovered that the introducing NoSQL data base model can more effectively analyze the massive log data than the traditional one. We have demonstrated execellent performance of the NoSQL by comparing the performance of data processing with existing RDBMS. Also the proposed method is evaluated by experiments that detect the three attack patterns and shown that it is highly effective.

Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Acharya, Srijana;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.911-923
    • /
    • 2014
  • Ad hoc cognitive radio wireless sensor networks allow secondary wireless sensor nodes to recognize spectrum opportunities and transmit data. Most existing protocols proposed for ad hoc cognitive radio wireless sensor networks require a dedicated common control channel. Allocating one channel just for control packet exchange is a waste of resources for channel-constrained networks. There are very few protocols that do not rely on a common control channel and that exchange channel-negotiation control packets during a pre-allocated time on the data channels. This, however, can require a substantial amount of time to access the channel when an incumbent is present on the channel, where the nodes are intended to negotiate for the data channel. This study examined channel access delay on cognitive radio wireless sensor networks that have no dedicated common control channel.

Analysis on Effect of TCP Retransmission to Energy Consumption on End-to-End Data Transfer (TCP 재전송이 종단간 데이터 전송 에너지 소모량에 미치는 영향 분석)

  • Seok, Woojin;Choi, Wonjun;Kwak, Jaiseung;Lee, Manhee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제41권8호
    • /
    • pp.950-953
    • /
    • 2016
  • A packet loss caused TCP segment drop and retransmission. This makes the energy useless, which is consumed to deliver the whole packets of the dropped segment over many hops. In this paper, end-to-end TCP retramission will be analyzed for the effect to energy consumed for delivering data. Especially, this paper will compare and analyze the legacy TCP method and Store-and-Forward method, and the method of computing the energy efficiency to transmission loss. This paper expects that the proposed method can contribute to new energy saving decision or algorithm on diverse data transmission situation.

Design of Underwater Ad-hoc Communication Protocol for Underwater Acoustic Networks

  • Yun, Chang-Ho;Cho, A-Ra;Kim, Seung-Geun;Park, Jong-Won;Choi, Young-Chol;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • 제8권1호
    • /
    • pp.6-12
    • /
    • 2010
  • In this paper a cross layer protocol, referred to as an underwater ad-hoc communication (UAC) protocol, is proposed for underwater acoustic networks (UANets). An underwater node (UN), which tries to transfer data to another UN or a buoy in ad-hoc manner, can access channel as well as determine routing path by employing the UAC protocol. The channel access, route determination, and reliable data transfer are designed being adaptive to underwater environments. In addition, we propose both UN and packet architectures in order to efficiently implement the UAC protocol for UANets.

Modeling and Performance Analysis of Communication Channels for Multimedia System (멀티미디어 시스템의 통신 채널 모델링 및 성능분석)

  • Bang Suk-Yoon;Ro Cheul-Woo
    • The Journal of the Korea Contents Association
    • /
    • 제5권1호
    • /
    • pp.147-155
    • /
    • 2005
  • In this paper, communication channels for the transmission of multimedia packets are modeled and evaluated. The multimedia packet traffic characterized by on-off and MMPP process for voice and data, respectively, dynamic channel allocation, queueing of data packets due to unavailability of channels and dropping of queued data packets over timeout, and guard channel for voice packets are modeled. The performance indices adopted in the evaluation of SRN model includes blocking and dropping probabilities. The SRN uses rewards concepts instead of the complicate numerical analysis required for the Markov chain. It is shown that our SRN modeling techniques provide an easier way to carry out performance analysis.

  • PDF

The Development of Terminal for Long Distance Data Transmission Using UHF RFID Module (UHF RFID 모듈을 이용한 원거리 데이터 전송 전용단말기 개발)

  • Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제13권11호
    • /
    • pp.2465-2472
    • /
    • 2009
  • This research paper is to develop remote data transmission terminal which is adequate to RFID R/W by using UHF/RF RFID R/W module (WJR7090) and Bluetooth communication(FB755AC) with ARM chipset(AT91SAM7S256). The developed UHF RFID R/W terminal performs tagging of RPID value and transmit the value to server with Bluetooth communication, the transmitted RFID tag value is compared to the Database value and the result is transmitted to the terminal. Performance test was done in order to prove the performance of the terminal, and the test result of the terminal's excellency and transmitted/recevied packet is described.