• Title/Summary/Keyword: Network Transmission

Search Result 4,574, Processing Time 0.026 seconds

A Study on the Apparatus for Image Transmission and Transmission Control using Cellular Phone Network (셀룰러폰 통신망을 이용한 영상전송 및 전송제어 장치에 관한 연구)

  • 박성욱;황수철;박종욱
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.1-10
    • /
    • 2002
  • A remote image transmission apparatus combines robot technology and image transmission there is safe problem or place that a person can not go. Recently, control apparatus that use wire and RF between web server and robot for remote control are developed. But, there is problem that must install Internet line and communication distance. Transmission distance problem can solve when using the equipment of RF, but price of RF router is problem that is very high cost. In this paper, we developed remote control system using the cellular phone communication network that can control image transmission and image transmission apparatus to solve these problem. Developed system could solve defects of methods that use existent RF and internet. And could transmit the most suitable image and voice under limited condition include current communication network.

  • PDF

Transmission Performance of MANET under Multiple Blackhole Attacks (다중 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.783-786
    • /
    • 2015
  • Hole attack, which is disturbed transmission function through change of routing information, can cause critical results for MANET as non-infrastructure network. Backhole attack, as a typical hole attack, is one malicious attack which is disabled network transmission function by assumption of transmission data through modification of routing information. It is very important to evaluate transmission performance caused by blackhole attack, because transmission performance of MANET is affective with blackhole attack. In this paper, transmission performance is analyzed with MANET under multiple blackhole attacks caused multiple blackhole nodes. Computer simulation based on NS-2 is used as analysis tool and voice traffic is considered ad application service on MANET.

  • PDF

Dynamic Line Rating Prediction in Overhead Transmission Lines Using Artificial Neural Network (신경회로망을 이용한 송전선 허용용량 예측기법)

  • Noh, Shin-Eui;Kim, Yi-Gwhan;Lim, Sung-Hun;Kim, Il-Dong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.1
    • /
    • pp.79-87
    • /
    • 2014
  • With the increase of demand for electricity power, new construction and expansion of transmission lines for transport have been required. However, it has been difficult to be realized by such opposition from environmental groups and residents. Therefore, the development of techniques for effective use of existing transmission lines is more needed. In this paper, the major variables to affect the allowable transmission capacity in an overhead transmission lines were selected and the dynamic line rating (DLR) method using artificial neural networks reflecting unique environment-heat properties was proposed. To prove the proposed method, the analyzed results using the artificial neural network were compared with the ones obtained from the existing method. The analyzed results using the proposed method showed an error of 0.9% within ${\pm}$, which was to be practicable.

Implementation of Image Transmission System in Ad-Hoc Network Using AODV Routing Protocol (Ad hoc 네트워크에서 AODV 라우팅 프로토콜을 이용한 영상 전송 시스템 구현)

  • Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.92-100
    • /
    • 2008
  • Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base stations. Recently, Ad-hoc networks are evolving to support multimedia contents according to expansion of ad hoc multi-hop communication system. Wireless ad-hoc network is different from the conventional wired network by frequent changes in network topology, number of routers and resources, there are a number of problems in applying conventional routing protocol to ad-hoc network. The AODV routing protocol is proposed for mobile node in ad-hoc networks. AODV protocol that provides to guarantee QoS for data transmission in ad hoc networks that link break frequently occurs. In this paper, AODV routing protocol based NDIS(Network Driver Interface Specification) is implemented. We design high performance image transmission that can operate with software(AODV) for ad-hoc networks without degradation. and verify operation of AODV routing protocol on the test bed.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

A Study of Speech Coding for the Transmission on Network by the Wavelet Packets (Wavelet Packet을 이용한 Network 상의 음성 코드에 관한 연구)

  • Baek, Han-Wook;Chung, Chin-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.3028-3030
    • /
    • 2000
  • In general. a speech coding is dedicated to the compression performance or the speech quality. But. the speech coding in this paper is focused on the performance of flexible transmission to the, network speed. For this. the subbanding coding is needed. which is used the wavelet packet concept in the signal analysis. The extraction of each frequency-band is difficult to general signal analysis methods, after coding each band, the reconstruction of these is also a difficult problem. But. with the wavelet packet concept(perfect reconstruction) and its fast computation algorithm. the extraction of each band and the reconstruction are more natural. Also, this paper describes a direct solution of the voice transmission on network and implement this algorithm at the TCP/IP network environment of PC.

  • PDF

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

Experimentation and Analysis of SCTP Throughput by MuIti-homing (멀티홈잉 기반 SCTP 성능 실험 및 비교 분석)

  • Koh Seok-Joo;Ha Jong-Shik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.235-240
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) provides the multi-homing feature, which allows each SCTP endpoint to use two or more IP addresses for data transmission. In this paper, the SCTP multi-homing feature is experimented and analyzed in terms of throughput over Linux platforms based on the NISTNET network emulator. We perform the experimental analysis of SCTP throughputs by SCTP multi-homing for the various network conditions: different packet loss rates, network bandwidths, and transmission delays. From the experimental results, it is shown that the SCTP multi-homing gives much better throughout gun over the SCTP single-homing case in the networks with a high packet loss rate. In the meantime, the other factors including network bandwidth and transmission delay do not seem to give a significant impact on the performance of the SCTP multi-homing.

Channel Characterization and Transmission Efficiency Analysis of Wireless Body Area Network (WBAN 채널 특성과 전송 효율 분석)

  • Ahn, Byoung-Jik;Song, Seong-Moo;Kim, Sun-Woo;Choi, Jae-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.985-994
    • /
    • 2012
  • This paper presents the real channel measurements and investigates their statistical characterization in wireless body area network(WBAN). In on-/off body channel, the measurements are performed with some representative human movements for considering human movements. Moreover, three signal transmission schemes with outage constraint are studied for getting total power consumption in each transmission scheme. Using the real channel measurements, between theoretical and realistic simulation are compared. This paper shows that power efficiency is improved through cooperative communication, and how much position of sensor node and human movement affect signal transmission power.

Autonomous Transmission Power Adjustment Strategy for Femtocell Base Station

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.367-373
    • /
    • 2022
  • Femtocells have recently been recognized for their potential to boost network capacity, improve end-user QoS and throughput, and do so at a cheap cost and with ease of implementation. The use of femtocells in indoor environments, such as residential buildings with neighboring homes, is becoming more popular. Femtocells are subject to interference from other femtocells, and the unwanted effects of interference are amplified when femtocells are deployed in close proximity to one another. As a consequence, the network's overall performance is degraded to a significant degree. One of the strategies that is thought to be effective in reducing the impact of interference is altering the transmission power of the femtocells. In this paper, a dynamic downlink transmission power of femtocells is suggested. In accordance with the observed cost function unit, each femtocell automatically changes its transmission power. If a femtocell causes too much interference for its neighbors, its transmission power level will be limited by that interference's rate. A simulation experiment is conducted to validate the effectiveness of the suggested system when compared with other schemes. When compared to previous schemes, which are addressed in this study, the numerical results show that the proposed strategy could provide more capacity while also ideally mitigating the influence of interference among co-channel deployed femtocells.