• Title/Summary/Keyword: Network Transmission

Search Result 4,579, Processing Time 0.029 seconds

Data Collection Methods to Standardize Protocols of Safety Supervision System (안전관제시스템 프로토콜 표준화를 위한 데이터 수집 방법)

  • Shin, Kwang-Ho;Um, Tae-Hwa;Lim, Dam-Sub;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2016
  • The current railway control system in Korea is comprised of signaling, electric rail power, communication, and maintenance systems that are independent of each other. Further, these systems have different mediums and protocols for transmitting the field equipment data to the central control system. The Safety Supervision System has as its purpose the collecting of safety-related data from each system to predict and prevent accidents, this system utilizes standard protocol. Safety-related data need to be collected from field data transmission devices of the existing control system, the data should be collected without affecting the communication of the existing system. In this study, sniffing skill, which is typically used for network traffic monitoring or security, is used to collect data. The problems arising from the use of sniffing devices are noted, and the Packet Conversion Node is proposed as a solution to the problems. Further, functional and performance testing were completed for the prototype, and the software architecture and packet conversion process were verified.

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

A Study on Determinants of Consumers' Choice of Mobile Data Service (모바일 데이터서비스 선택 결정요인에 관한 연구)

  • Choi, Sae-Sol;Han, Sung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.115-123
    • /
    • 2015
  • As LTE service and smartphone are emerging as the mainstream of mobile communications market, the value and importance of mobile data service has been further increased. MNO(mobile network operator)s already recognized the data service as essential market needs, and have appealed to consumers based on various satisfaction elements of data service such as faster transmission speed, expended data volume provided as default, and introduction of unlimited plan. So, in the smartphone market where has been mature, investigating what service attributes affect users' selection of data service is very meaningful from the perspectives of both the industry and the academic. Under this background, this study explores determinants influencing consumer's choice for mobile data service and analyzes relative importance of the attributes among different type of users. The findings of this study makes us extend our understanding of consumer characteristics and their service needs in data service centric era, and it provides some implications for establishing telecommunications policies and business strategies.

Link Adaptation with SNR Offset for Wireless LAN Systems (무선 LAN 시스템에서의 SNR 오프셋을 이용한 링크 적응화)

  • Kim, Chan-Hong;Jeong, Kyo-Won;Ko, Kyeong-Jun;Lee, Jung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10A
    • /
    • pp.839-846
    • /
    • 2011
  • Link Adaptation should select the best modulation and coding scheme (MCS) which gives the highest throughput as channel conditions vary. Several link adaptation algorithms for wireless local area network (WLAN) have been proposed but for the future WLAN systems such as 802.11n system, these algorithms do not guarantee the best performance. In this paper, we propose a new link adaptation algorithm in which an MCS level is chosen by the received SNR plus the offset value obtained from the transmission results. The performance of proposed algorithm is simulated by an IEEE 802.11n system. From the analysis, we conclude the proposed algorithm performs better than the well-known link adaptation algorithms such as auto rate fallback and general SNR-based techniques. Particularly, the proposed algorithm improves throughput when the packet error ratio (PER) is constrained for fast fading channels.

Collaborative Beamforming for Ad Hoc Sensor Networks (분산된 Ad Hoc 센서 네트워크의 협력 빔포밍)

  • Yang, Mi-Sun;Kim, Jung-Bin;Kim, Dong-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.34-40
    • /
    • 2009
  • In this paper, we derive the average received beampattern at each receive node which is randomly distributed within a disk when considering a collaborative beanforming between transmission nodes which are randomly distributed within another disk for ad hoc sensor network. Numerical results show that the radius of disk at the transmitter determines the beamwidth of mainbeam, and the sidebeam is affected by the number of transmitter nodes. We also consider K receive groups and divide the transmit sensor modes into K groups to support each receive group using beamforming, and derive the SINR at each receive node. Finally, we investigate the effects of beampattern and interference on total sum capacity among all receive node, and numerically determine the number of transmit nodes for each group which can achieve the maximal sum capacity.

Filter-Based Collision Resolution Mechanism of IEEE 802.11 DCF in Noisy Environments (잡음 환경을 고려한 IEEE 802.11 DCF의 필터기반 Collision Resolution 메카니즘)

  • Yoo, Sang-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9A
    • /
    • pp.905-915
    • /
    • 2007
  • This paper proposes a filter-based algorithm to adaptively adjust the contention window in IEEE 802.11 DCF. The proposed mechanism is focused on the general and realistic environments that have various conditions regarding to noise, media types and network load. For this flexible adaptation, Filter-based DCF(FDCF) takes a more realistic policy such as median filter concept in the image processing technologies. We can handle these various environments by adjusting the contention window size according to the result of filtering based on history-buffer. We can ignore temporarily and randomly occurred transmission failures due to noise errors and collisions in noisy environments. In addition, by changing the reference number and history-buffer size, FDCF can be extended as a general solution including previous proposed mechanism. We have confirmed that the proposed mechanism can achieve the better performance than those of previous researches in aspects of the throughput and the delay in the realistic environments.

Asan Medical Center Laboratory Information System (R) Information Communication System for Routine Hematology Using a Down-Sized Computer - (서울중앙병원 임상병리과 정보관리시스템(III))

  • 민원기;최윤미
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.333-340
    • /
    • 1994
  • Laboratory information system (LIS) is a key tool to manage laboratory data in clinical pathology. Our department has developed an information system for routine hematology using down-sized computer system. We have used an IBM 486 compatible PC with 16 MB main memory, 210 MB hard disk drive, 9 RS-232C port and 24 pin dot printer The operating system and database management system were SCO UNIX and SCO foxbase, respectively. For program development, we used Xbase language provided by SCO foxbase. The C language was used for interface purpose. To make the system use friendly, pull-down menu was used. The system connected to our hospital information system via application program interface (API), so the information related to patient and request details is automatically transmitted to our computer. Our system interfaced with two complete blood count analyzers (Sysmex WE-8000 and Coulter STKS) for unidirectional data transmission from analyzer to computer. The authors suggests that this system based on down-sized computer could provide a progressive approach to total LIS based on local area network, and the implemented system could serve as a model for other hospital's LIS for routine hematology.

  • PDF

Traffic Distributed Processing System Implementation on the Web Sever Networking (웹서버 네트워킹에서의 트래픽분산 처리 시스템 구현)

  • Park, Gil-Cheol;Sung, Kyung;Kim, Seok-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.846-853
    • /
    • 2004
  • This paper introduces implementation of a traffic distributed processing system on the Web Sever Networking. The study used two software packages (Packet Capture and Round-Robin Test Package) to check packet quantity from Virtual Network Structure (data generator, virtual server, Serve. 1, 2, 3), and could find out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round-Robin Load Balancing Monitoring System include Round-Robin testing, system monitoring, and graphical indication of data transmission/packet quantity (figures & diagram). As the result of the study shows, Round-Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some cases, they were eventually alleviated by repeated tests for a long period of time.

A Fairness Guarantee Scheme for Wired and Wireless Heterogeneous Networks (유무선 혼합 네트워크를 위한 TCP Fairness 보장 기법)

  • Kim, Seong-Chul;Cho, Yong-Bum;Moon, Il-Young;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.549-552
    • /
    • 2005
  • Multiple wireless devices in wired and wireless heterogeneous networks communicate with counterparts via a single access point (AP). In this case, the AP becomes a bottleneck of the network, therefore buffer overflows occur frequently and result in TCP performance degradation. In this paper, a new algorithm that prevents buffer overflows at AP and enhances TCP fairness is proposed. Depending on the buffer usage of AP, the new algorithm adaptively controls each TCP senders' transmission rate, prevents buffer overflows and thus guarantees improved TCP fairness. It is proved that the algorithm makes better of TCP throughput and fairness by preventing buffer overflows.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.