• Title/Summary/Keyword: packet key

Search Result 233, Processing Time 0.025 seconds

Earthquake-related Data Selection using Event Packets (이벤트 패킷을 이용한 지진관련 데이터의 추출)

  • Lim, In-Seub;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.59-68
    • /
    • 2008
  • In this paper, we propose a method for selecting meaningful event packets from which can receive before anything else from seismograph according to allotted priority and estimate epicenter using selected packets. Event packets which received from each station will be evaluated with their onset time, signal period and SNR by statistical method and will be selected packets related with real earthquake's P-wave. And estimated epicenters using by 'Application of epicenter estimation using first P arrivals'. With local earthquakes occurred in 2007 were announced by KMA, collected event packets on earthquake happened date and selected p-wave related packets and estimated epicenter. After result of experiment, if an earthquake occurred within seismic networks, can estimate epicenter with small misfits just after event packets arrived from above 4 stations. Considering average distance of each station, in case of using all stations' data include other organization, can estimate and alert rapidly. It show this method is useful when construct a local earthquake early warning system later.

  • PDF

Development of Protocol Analyzer Suited for Maintenance of LonWorks Netwo가 for Safety Management of Underground Facilities (지하시설의 안전관리를 위한 LonWorks 네트워크의 유지보수에 적합한 프로토콜 분석기의 개발)

  • Kim, Hyung-Ki;Choi, Gi-Sang;Choi, Gi-Heung
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.203-209
    • /
    • 2010
  • A compact ANSI/EIA 709.1 protocol analyzer system suited for maintenance of LonWorks network for safety management of underground facilities was developed and tested. The hardware is based on the TMS320LF2406A embedded system, and the software was designed using Visual C++6.0 under Windows XP environment. Connected to the LonWorks network the developed protocol analyzer decodes the raw packets and pass them to the master PC through USB port. Then on the PC the packets are processed and analyzed in various aspects and the key features that are essential to the maintenance of LonWorks network installed at underground facilities are displayed in a user-friendly format. Performance of the developed protocol analyzer was evaluated through a series of experiments, by measuring the speed of packet analysis and the error rate. The protocol analyzer proved to work reliably even under the increased bandwidth. However, more comprehensive tests under various underground environmental conditions are desired.

Performance Evaluation of Differentiated Services to MPEG-4 FGS Video Streaming (MPEC-4 FGS 비디오 스트리밍에 대한 네트워크 차별화 서비스의 성능분석)

  • 신지태;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7A
    • /
    • pp.711-723
    • /
    • 2002
  • A finer granular scalable (FGS) version of ISO/IEC MPEG-4 video streaming is investigated in this work with the prioritized stream delivery over loss-rate differentiated networks. Our proposed system is focused on the seamless integration of rate adaptation, prioritized packetization, and simplified differentiation for the MPEG-4 FGS video streaming. The proposed system consists of three key components: 1) rate adaptation with scalable source encoding, 2) content-aware prioritized packetization, and 3) loss-based differential forwarding. More specifically, a constant-quality rate adaptation is first achieved by optimally truncating the over-coded FGS stream based on the embedding rate-distortion (R-D) information (obtained from a piecewise linear R-D model). The rate-controlled video stream is then packetized and prioritized according to the loss impact of each packet. Prioritized packets are transmitted over the underlying network, where packets are subject to differentiated dropping and forwarding. By focusing on the end-to-end quality, we establish an effective working conditions for the proposed video streaming and the superior performance is verified by simulated MPEG-4 FGS video streaming.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Piezo-activated guided wave propagation and interaction with damage in tubular structures

  • Lu, Ye;Ye, Lin;Wang, Dong;Zhou, Limin;Cheng, Li
    • Smart Structures and Systems
    • /
    • v.6 no.7
    • /
    • pp.835-849
    • /
    • 2010
  • This study investigated propagation characteristics of piezo-activated guided waves in an aluminium rectangular-section tube for the purpose of damage identification. Changes in propagating velocity and amplitude of the first wave packet in acquired signals were observed in the frequency range from 50 to 250 kHz. The difference in guided wave propagation between rectangular- and circular-section tubes was examined using finite element simulation, demonstrating a great challenge in interpretation of guided wave signals in rectangular-section tubes. An active sensor network, consisting of nine PZT elements bonded on different surfaces of the tube, was configured to collect the wave signals scattered from through-thickness holes of different diameters. It was found that guided waves were capable of propagating across the sharp tube curvatures while retaining sensitivity to damage, even that not located on the surfaces where actuators/sensors were attached. Signal correlation between the intact and damaged structures was evaluated with the assistance of a concept of digital damage fingerprints (DDFs). The probability of the presence of damage on the unfolded tube surface was thus obtained, by which means the position of damage was identified with good accuracy.

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

Provisioning of QoS Adaptability in Wired-Wireless Integrated Networks

  • Guo, Mian;Jiang, Shengming;Guan, Quansheng;Mao, Huachao
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.61-70
    • /
    • 2013
  • The increasing number of mobile users and the popularity of real-time applications make wired-wireless integrated network extremely attractive. In this case, quality of service (QoS) adaptability is particularly important since some important features of the integrated network call for QoS adaptability, such as mobility, bursty applications and so on. Traditional QoS schemes include integrated service (IntServ) and differentiated service (DiffSev) as well as their variants. However, they are not able to balance well between scalability and QoS granularity. For example, IntServ faces the scalability problem, while DiffServ can only provide coarse granular QoS. In addition, they are also unable to efficiently support QoS adaptability. Therefore, a per-packet differentiated queueing service (DQS) was proposed. DQS was originally proposed to balance between scalability and QoS granularity in wired networks and then extended to wireless networks. This paper mainly discusses how to use DQS to support QoS adaptability in wired-wireless integrated networks. To this end, we propose a scheme to determine dynamic delay bounds, which is the key step to implement DQS to support QoS adaptability. Simulation studies along with some discussions are further conducted to investigate the QoS adaptability of the proposed scheme, especially in terms of its support of QoS adaptability to mobility and to bursty real-time applications.

A New Multicast Routing Protocol for Multicast Delivery Agent-based Mobile-IPv6 in 3GPP2 IMT-2000 System (3GPP2 IMT-2000 시스템에서 멀티캐스트 전달 대리자 기반의 새로운 Mobile-IPv6 멀티캐스트 라우팅 프로토콜)

  • Park, Byeong-Seob;Kim, Sung-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2002
  • We present a new MDA-based Mobile-IPv6 multicast routing algorithm for wirelese service operators to offer Mobile-IP over IMT-2000 service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 multimedia application services. The extended IMT-2000 system architectures use an PDSNs (i.e. IWFs), and the home network (i.e. Internet) backbone and intermediate network are composed of ATM entities. A key feature of the new protocol is the use of MDA(Multicast Delivery Agent) to reduce delivery path length of the multicast datagram. We show that proposed protocol is efficient in terms of various performance measures such as multicast traffic load, multicast related handoff, and average routing length when we implement it using the Mobile-IPv6. Particularly, the number of tunneling and average routing length of datagram are reduced relatively, the multicast traffic load is also decreased.

A Design of the IP Lookup Architecture for High-Speed Internet Router (고속의 인터넷 라우터를 위한 IP 룩업구조 설계)

  • 서해준;안희일;조태원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.647-659
    • /
    • 2003
  • LPM(Longest Prefix Matching)searching in If address lookup is a major bottleneck of IP packet processing in the high speed router. In the conventional lookup table for the LPM searching in CAM(Content Addressable Memory) the complexity of fast update take 0(1). In this paper, we designed pipeline architecture for fast update of 0(1) cycle of lookup table and high throughput and low area complexity on LPM searching. Lookup-table architecture was designed by CAM(Content Addressable Memory)away that uses 1bit RAM(Random Access Memory)cell. It has three pipeline stages. Its LPM searching rate is affected by both the number of key field blocks in stage 1 and stage 2, and distribution of matching Point. The RTL(Register Transistor Level) design is carried out using Verilog-HDL. The functional verification is thoroughly done at the gate level using 0.35${\mu}{\textrm}{m}$ CMOS SEC standard cell library.

A Hierarchical Underwater Acoustic Sensor Network Architecture Utilizing AUVs' Optimal Trajectory Movements (수중 무인기의 최적 궤도 이동을 활용하는 계층적 수중 음향 센서 네트워크 구조)

  • Nguyen, Thi Tham;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1328-1336
    • /
    • 2012
  • Compared to terrestrial RF communications, underwater acoustic communications have several limitations such as limited bandwidth, high level of fading effects, and a large underwater propagation delay. In this paper, in order to tackle those limitations of underwater communications and to make it possible to form a large underwater monitoring systems, we propose a hierarchical underwater network architecture, which consists of underwater sensors, clusterheads, underwater/surface sink nodes, autonomous underwater vehicles (AUVs). In the proposed architecture, for the maximization of packet delivery ratio and the minimization of underwater sensor's energy consumption, a hybrid routing protocol is used. More specifically, cluster members use Tree based routing to transmit sensing data to clusterheads. AUVs on optimal trajectory movements collect the aggregated data from clusterhead and finally forward the data to the sink node. Also, in order to minimize the maximum travel distance of AUVs, an Integer Linear Programming based algorithm is employed. Performance analysis through simulations shows that the proposed architecture can achieve a higher data delivery ratio and lower energy consumption than existing routing schemes such as gradient based routing and geographical forwarding. Start after striking space key 2 times.