• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.033 seconds

Analysis for Frame Error Rate of a Data Transmission Protocol between CTC and SCADA (CTC와 SCADA간 정보전송 프로토콜에 대한 프레임 에러율 분석)

  • 강문호;이재호;황종규;박영수
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.4
    • /
    • pp.296-301
    • /
    • 2004
  • This paper addresses an analysis for a railway data transmission protocol-Ethernet based data transmission between the CTC(Centralized Traffic Control System) and the SCADA(Supervisory Control and Data Acquisition) system. Fame error rates of the data transmissions are calculated and compared for the two cases that the CTC/SCADA has an extra data transmission error control(CRCI6) besides the inherent error control of the Ethernet(CRC32), and that the CTC/SCADA has no extra data transmission error control. With simulation results it has been verified that the extra data transmission error control(CRC16) contributes to lowering the frame error rate.

A Location Registration Protocol for Distributed Call Processing Architecture in the ATM-based PCS (ATM기반의 PCS에서 분산 호 처리 구조를 위한 위치 등록 프로토콜)

  • Hong, Yong-Pyo;Park, Sun-Young;Lee, Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2812-2821
    • /
    • 1997
  • In this paper, we presents performance analysis of a location registration protocol using cluster concept to minimize the number of location registrations caused by reduction of cell size and explosive increasement of wireless communication subscribers. We analyze the relationship between the size of cluster and the location registration rate, and finally we apply this analysis to the hexagonal cell structure for justification.

  • PDF

Analysis of Spatial Patterns and Estimation of Carbon Emissions in Deforestation using GIS and Administrative Data (GIS와 행정정보를 이용한 교토의정서 제3조 3항 산림전용지의 공간패턴 및 탄소배출량 분석)

  • Lee, Jung-Soo;Park, Dong-Hwan
    • Journal of Forest and Environmental Science
    • /
    • v.27 no.1
    • /
    • pp.39-46
    • /
    • 2011
  • This study purposed to analyze the spatial pattern and the amount of carbon emission at the deforestation area in Gangwondo. Forest geographic information system(FGIS) and administrative data were used in the analysis. The area size and spatial patterns of deforestation area were analyzed according to the article 3.3 of Kyoto protocol. Forest administration data for 9 years from 2000 to 2008 were entered into a database. Fifty-nine percent of deforestation area was found within 200m of the road network, and seventy-five percent of the area was found within 500m. Theoretical carbon emission based on deforestation area was estimated at 6,968tc. Carbon emission of national forest was 5.7times higher than that of private forest.

Out-of-Order Packet Analysis in Fast Handover for Proxy Mobile IPv6 (PMIPv6 빠른 핸드오버에서의 Out-of-Order 패킷 분석)

  • Quoc, Anh Khuong;Shon, Min Han;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.287-289
    • /
    • 2013
  • Fast Handover for Proxy Mobile IPv6 (FPMIPv6), a protocol described in RFC 5949, is used to reduce handover latency and minimize packet loss problem occuring in the Proxy Mobile IPv6 (PMIPv6) protocol. However, during the study of implementing FPMIPv6, we found the Out-of-Order Packet (OoOP) problem that occurs in the experiment of FPMIPv6. Since the OoOP is an issue that affects significantly to QoS of the network, in this paper, we analyze the OoOP problem by using network model. The analysis conducts the cause of occurring OoOP problem due to there exist two paths for data transmitted from Correspondent Node (CN) to MN in FPMIPv6.

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

Ultrasonography for Facial Nerve Palsy: A Systematic Review and Meta-Analysis Protocol

  • Seojung Ha;Bo-In Kwon;Joo-Hee Kim
    • Journal of Acupuncture Research
    • /
    • v.41 no.1
    • /
    • pp.63-68
    • /
    • 2024
  • Background: Facial nerve palsy presents a significant healthcare challenge, impacting daily life and social interactions. This systematic review investigates the potential utility of ultrasonography as a diagnostic tool for facial nerve palsy. Methods: Electronic searches will be conducted across various databases, including MEDLINE, EMBASE, CENTRAL (Cochrane Central register of Controlled Trials), CNKI (China National Knowledge Infrastructure), KMBASE (Korean Medical Database), ScienceON, and OASIS (Oriental Medicine Advanced Searching Integrated System), up to February 2024. The primary outcome will focus on ultrasonography-related parameters, such as facial nerve diameter and muscle thickness. Secondary outcomes will encompass clinical measurements, including facial nerve grading scales and electrodiagnostic studies. the risk of bias in individual study will be assessed using the Cochrane Risk of Bias assessment tool, while the grading of recommendations, assessment, development, and evaluations methodology will be utilized to evaluate the overall quality of evidence. Conclusion: This study aims to review existing evidence and evaluate the diagnostic and prognostic value of ultrasonography for peripheral facial nerve palsy.

A Bluetooth Protocol Analyzer including Simulation Function based on PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 블루투스 프로토콜 분석장비)

  • 정중수
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.95-99
    • /
    • 2003
  • In addition to wired communication technology, wireless communication technology has had communication revolution nowadays. Bluethooth technology carries out data/voice communication within pico-net. Nowadays the various services are supported by access network connected to public network. This paper presents implementation of bluetooth protocol analyser which simulates bluetooth protocol. MS window98 and visual C are used for development environment and application program is operated over the firmware loaded on the bluetooth device connected to the PC through UART which of the maximum transmission rate is 115kbps because transmission rate less than 20kbps affects rarely the performance. The performance analysis on the propose system is carried out as simulating the signalling information for the voice test and the traffics between two bluetooth systems for file transfer. The throughput analysis for file transfer service and call processing capacity for voice service are considered as performance analysis parameters. File access time is very important parameter and throughput is 13 kbps in case breakpoint time to file access is 0.04sec. Also call processing time is about 16.6ms in case of communication with the headset. The performance analysis of simulation results satisfies with bluetooth device development.