• Title/Summary/Keyword: 데이터 수집 프로토콜

Search Result 311, Processing Time 0.028 seconds

A Protocol Analyzer for SW based Multimedia Communication System (SIP 기반 멀티미디어 통신 시스템을 위한 프로토콜 분석기)

  • Jung In-hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.312-333
    • /
    • 2005
  • SIP(Session Initiation Protocol) has been proposed for session control protocol of Internet multimedia communication system like VoIP(Voice over IP). SIP has complicated session control steps to support various kinds of audio and video formats and to assure service quality of real time data communication. Up until now, existing protocol analyzers can not provide such detailed information of SIP based communication system. In this paper, therefore, we propose a new protocol analyzer as a tool that can analyze and diagnose SIP based multimedia communication system throughout the session initiation, data exchange and session change steps. The propose traffic analyzer, which is called STAT(SIP based Traffic Analysis Tool), Is implemented on Winder's environment so that it is generally usable and extensible. Since STAT analyze low level packets captured via Ethernet broadcasting property, it is able to provide session status and real time traffic monitoring information without any affection to the communication system. The STAT which is implemented in this paper. therefore, is expected to be a useful tool for developing and managing of a SIP based multimedia communication system.

Analysis of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인항공기의 TM/TC 데이터 프로토콜 분석)

  • Hong, Su-woon;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.391-393
    • /
    • 2017
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. In this paper, we analyze the TM/TC data protocol of two types of military UAV systems currently under development and propose a more efficient TM/TC message design scheme in wireless communication(or datalink) environment. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

  • PDF

A Design of Concurrent Two-Way Synchronizations Protocol on a Mobile Environments (모바일 환경에서 동시 양방향 동기화 프로토콜의 설계)

  • Kim, Hong-Ki;Kim, Dong-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.91-94
    • /
    • 2008
  • As the mobile devices and the wireless networks have high-performance capabilities, it is possible to synchronize the spatio-temporal data of a server with the spatio-temporal data of a mobile device which are collected at a field. However, since the server process the synchronization which the model device requests, the whole synchronizations of mass mobile devices take long time. In this paper, we propose the scheme to process concurrently the synchronizations of mobile devices which does not conflict with others using the scheme of a multi-queue.

  • PDF

Dynamic Rectangle Zone-based Collaboration Mechanism for Continuous Object Tracking in Wireless Sensor Networks (센서 네트워크에서 연속적인 개체 추적을 위한 동적 직사각형 영역 기반 협동 메커니즘)

  • Park, Bo-Mi;Lee, Eui-Sin;Kim, Tae-Hee;Park, Ho-Sung;Lee, Jeong-Cheol;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.591-595
    • /
    • 2009
  • Most existing routing protocols for object detection and tracking in wireless sensor networks concentrate on finding ways to detect and track one and more individual objects, e.g. people, animals, and vehicles, but they do not be interested in detecting and tracking of continuous objects, e.g., poison gas and biochemical. Such continuous objects have quite different properties from the individual objects since the continuous objects are continuously distributed across a region and usually occupy a large area, Thus, the continuous objects could be detected by a number of sensor nodes so that sensing data are redundant and highly correlated. Therefore, an efficient data collection and report scheme for collecting and locally aggregating sensing data is needed, In this paper, we propose the Continuous Object Tracking Mechanism based on Dynamic Rectangle Zone for detecting, tracking, and monitoring the continuous objects taking into account their properties.

The Integrated SCADA Data Gateway Platform based on SmartGrid (스마트 그리드 기반 통합 SCADA Data Gateway 플랫폼)

  • Song, Byung-Kwen
    • Journal of IKEEE
    • /
    • v.18 no.1
    • /
    • pp.140-145
    • /
    • 2014
  • OPC UA(IEC62541) is a communication protocol for SG(Smart Grid) application platform. It was standardized by IEC TC57 group in December 2012. The IEC61850 has been used in Digital Substation Systems and Smart Distributed Systems. The DNP3.0 has been used for device's data collection/control in Distributed Systems. The DLMS/COSEM has been used to control metering and collect information in the Smart Metering. The top-level SG management platform needs an independent middleware to manage transparently the Power Information Technology, including the IEC61850, DNP3.0, DLMS/COSEM. In this paper, we propose the SDG(Scada Data Gateway) platform. It manages Power Information Technology based Digital Substation Systems and Smart Distributed systems, Smart Metering through OPC UA.

Zone based on Wireless Sensor Network Management Protocol for Smart Home (스마트 홈을 위한 영역기반 무선 센서네트워크 관리 프로토콜)

  • Kim, Gang-Seok;Huh, Jee-Wan;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.65-71
    • /
    • 2009
  • As a core area of the new computing paradigm, the Ubiquitous Sensor Network Technology utilizes a wireless sensor networking which can be applied to the Context Information Monitoring System. When the technology is used in a poor user-environment for monitoring purposes, it can cost-effectively gather the context data on real-time basis, analyze the information gathered, effectively response to the user situation, and execute orders to create environmental factors desired by the user. This study structures a system able to monitor information in regards to a user-environment based on wireless-node sensor technology coupled with the Ubiquitous Sensor Network Technology. In this paper, the protocol in which it manages the wireless sensor network as the zone based by using the management protocol standardized at the smart home with a profile is proposed. The proposed system requires a minimal collection of data without continuous monitoring. Monitoring periodically, it can sense the user-environment more efficiently than the existing monitoring technologies based on the wire-communication technology.

  • PDF

An Hierarchical Key Management Scheme for Assure Data Integrity in Wireless Sensor Network (WSN에서 데이터 무결성을 보장하는 계층적인 키 관리 기법)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.281-292
    • /
    • 2008
  • A main application of sensor networks are to monitor and to send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power from each sensor, intermediate network nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate network nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. From simulation study, we compare the amount of the energy consumption overhead, the time of key transmission and the ratio of of key process between the proposed method and LHA-SP. The simulation result of proposed protocol is low 3.5% a lord of energy consumption than LHA-SP, the time of key transmission and the ration of key process is get improved result of each 0.3% and 0.6% than LHA-SP.

A performance on the maritime MDT by SSB modem (SSB 모뎀에 의한 해상용 MDT의 구현)

  • 윤재준;최조천;김갑기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.90-94
    • /
    • 2003
  • For the structure of VMS is required to the maritime MDT for realtime acquisition the position reporting of navigating ships. The first study is the recording method a navigating data by GPS, the 2th is SSB modem for data trans-receiver by use ship. And then the communication protocol of automatic traffic for in continues transmission a ship's ID, time and position data of GPS. In this paper have studied the SSB modem for transmission the voice and data at same time. Which is adapted to the communication control unit, protocol of data traffic and acquisition, displayer of character data. This maritime GPS MDT is considered to low-cost type by using microprocessor.

  • PDF

A Survey on the Standardization of Information Service Sector in KISTI (한국과학기술정보연구원의 정보유통부문 표준화 현황분석)

  • Lee, Yun-Seok;Seo, Tae-Sul
    • Journal of Information Management
    • /
    • v.32 no.2
    • /
    • pp.40-53
    • /
    • 2001
  • The purpose of this study is to explore the current situation and problems in standardizing knowledge information and information technology in the KISTI, and collect the basic data necessary for establishing the national information infrastructure. Through a survey and interviews with nine departments of the Information Services Sector of the KISTI, data were collected regarding the management and exchange of information and the operation of communication networks. According to the analysis of fifty KISTI databases and their operation, tasks to be first standardized include Classification of ST resources, Metadata, Date modeling, Data format, DBMS, ST terminology, and Retrieval protocol.

  • PDF

A Study on analysis and visualization of data communication protocol by using Sniffing technology. (스니핑 기술을 이용한 데이터 통신 프로토콜 분석 및 시각화에 대한 연구)

  • Song, MooSong;cho, EunJin;Han, HaeRi;Park, Jinho;Kim, Youngjong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.223-224
    • /
    • 2019
  • 데이터가 오고 가는 네트워크를 사용하는 곳들에서는 패킷을 필히 수집하고 분석한다. 하지만 패킷 스캐닝을 통해 공격 대상에 대한 정보를 수집하고 2차적 공격 시나리오를 구상하는데 악용하는 경우가 발생한다. 본 시스템은 IP/TCP를 중심으로 패킷분석에 대한 전문적인 지식이 없어도 쉽게 확인 가능한 프로그램을 제공할 예정이다.