• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.033 seconds

Implementation of Mini Chip Antenna suitable for Ubiquitous Environment (유비쿼터스 환경에 적합한 소형 칩 안테나 구현)

  • Kang, Jeong-Jin;Choi, Jong-In;Lee, Young-Dae;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.81-86
    • /
    • 2008
  • The paradigm of information & communication is rapidly changed into ubiquitous environment based electromagnetic wave, and antenna technology in the wireless ubiquitous communication is remarkably developed. Mini chip antenna has its within small card compared to the external AP antenna. Designed and Fabricated WLAN antenna has a broadband characteristics of 2.4~2.5GHz and 4.9~5.85GHz, and can be used triple mode of IEEE 802.11.a,g.b, and it has comparatively a constant performance in the dual frequency band.

  • PDF

A Probabilistic Sampling Method for Efficient Flow-based Analysis

  • Jadidi, Zahra;Muthukkumarasamy, Vallipuram;Sithirasenan, Elankayer;Singh, Kalvinder
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.818-825
    • /
    • 2016
  • Network management and anomaly detection are challenges in high-speed networks due to the high volume of packets that has to be analysed. Flow-based analysis is a scalable method which reduces the high volume of network traffic by dividing it into flows. As sampling methods are extensively used in flow generators such as NetFlow, the impact of sampling on the performance of flow-based analysis needs to be investigated. Monitoring using sampled traffic is a well-studied research area, however, the impact of sampling on flow-based anomaly detection is a poorly researched area. This paper investigates flow sampling methods and shows that these methods have negative impact on flow-based anomaly detection. Therefore, we propose an efficient probabilistic flow sampling method that can preserve flow traffic distribution. The proposed sampling method takes into account two flow features: Destination IP address and octet. The destination IP addresses are sampled based on the number of received bytes. Our method provides efficient sampled traffic which has the required traffic features for both flow-based anomaly detection and monitoring. The proposed sampling method is evaluated using a number of generated flow-based datasets. The results show improvement in preserved malicious flows.

Novel Maritime Wireless Communication based on Mobile Technology for the Safety of Navigation: LTE-Maritime focusing on the Cell Planning and its Verification

  • Shim, Woo-Seong;Kim, Bu-Young;Park, Chan-Yong;Lee, Byeong-Hyeok
    • Journal of Navigation and Port Research
    • /
    • v.45 no.5
    • /
    • pp.231-237
    • /
    • 2021
  • Enhancing the performance of maritime wireless communication has been highlighted by the issue of cell planning in the sea area because of lack of an appropriate Propagation Loss Model (PLM). To resolve the cell planning issue in vast sea areas, it was essential to develop the (PLM) matching the intended sea area. However, there were considerable gaps between the prediction of legacy PLMs and field measurement in propagation loss and there was a need to develop the adjusted PLM (A-PLM). Therefore, cell planning was performed on this adjusted model, including modification of the base station's location, altitude, and antenna azimuth to meet the quality objectives. Furthermore, in order to verify the availability of the cell planning, Communication Service Quality Monitoring System (CS-QMS) was developed in the LTE-Maritime project to collect LTE signal quality information from the onboard equipment at regular intervals and to ensure that the service quality was high enough to satisfy the goals in each designated grid. As a result of verification, the success rate of RSRP was 95.7% for the intensive management zone (IMZ) and 96.4% for the interested zone (IZ), respectively.

Development and Performance Evaluation of the CAN Monitoring System (CAN 모니터링 시스템 개발 및 성능 평가)

  • 이원희;박민규;이민철;김동수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.60-60
    • /
    • 2000
  • CAN(Controller Area Network) is a serial communication protocol which specifies very low cost and high performance. It is widely used in rea1-time control applications such as automobiles, aircraft, and automated factories. The main application fields are industrial control systems and embedded network. In this paper, the CAN monitoring system is proposed and implemented. Also its performance is tested in the mobile robot which is integrated by CAN and its performance lot receipt failure rate is evaluated. This can be used to analyze the performance of the network. It can tie also used to manage and monitor the network.

  • PDF

A Non-Uniform Network Split Method for Energy Efficiency in a Data Centric Sensor Network (데이타 중심 센서 네트워크에서 에너지 효율성을 고려한 비균등 네트워크 분할 기법)

  • Kang, Hong-Koo;Kim, Joung-Joon;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.9 no.3
    • /
    • pp.35-50
    • /
    • 2007
  • In a data centric sensor network, a sensor node to store data is determined by the measured data value of each sensor node. Therefore, if the same data occur frequently, the energy of the sensor node to store the data is exhausted quickly due to the concentration of loads. And if the sensor network is extended, the communication cost for storing data and processing queries is increased, since the length of the routing path for them is usually in the distance. However, the existing researches that generally focus on the efficient management of data storing can not solve these problems efficiently. In this paper, we propose a NUNS(Non-Uniform Network Split) method that can distribute loads of sensor nodes and decrease the communication cost caused by the sensor network extension. By dividing the sensor network into non-uniform partitions that have the minimum difference in the number of sensor nodes and the splitted area size and storing the data which is occurred in a partition at the sensor nodes within the partition, the NUNS can distribute loads of sensor nodes and decrease the communication cost efficiently. In addition, by dividing each partition into non-uniform zones that have the minimum difference in the splitted area size as many as the number of the sensor nodes in the partition and allocating each of them as the processing area of each sensor node, the NUNS can protect a specific sensor node from the load concentration and decrease the unnecessary routing cost.

  • PDF

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

Large Area Plasma for LCD Processing by Individyally Controlled Array Sources

  • Kim, Bong-Joo;Kim, Chin-Woo;Park, Se-Geun;Lee, Jong-Geun;Lee, Seung-Ul;Lee, Il-Hang;O, Beom-Hoan
    • Journal of Information Display
    • /
    • v.3 no.2
    • /
    • pp.26-30
    • /
    • 2002
  • Large area plasma source has been built for LCD etcher by an array of $2{\times}2$ ICP sources. Since only one RF power supply and one impedance matching network is used in this configuration, any difference in impedances of unit RF antennas causes unbalanced power delivery to the unit ICP. In order to solve this unavoidable unbalance, unit antenna is designed to have a movable tap, with which the inductance of each unit can be adjusted individually. The plasma density becomes symmetric and etch rate becomes more uniform with the impedance adjustment. The concept of adding axial time-varying magnetic field to the single ICP source is applied to the array ICP source, and is found to be effective in terms of etch rate and uniformity.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Optimal WAMS Configuration in Nordic Power System

  • Mohamed A.M. Hassan;Omar H. Abdalla;Hady H. Fayek;Aisha H.A. Hashim;Siti Fauziah Toha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.130-138
    • /
    • 2023
  • The Smart grids are considered as multi-disciplinary power systems where the communication networks are highly employed. This paper presents optimal wide area measurement system (WAMS) configuration in Nordic power system. The transition from SCADA to WAMS becomes now trend in all power systems to ensure higher reliability and data visibility. The optimization applied in this research considered the geographical regions of the Nordic power system. The research considered all the devices of WAMS namely phasor measurement units (PMUs), phasor data concentrators (PDCs) and communication links. The study also presents two scenarios for optimal WAMS namely base case and N-1 contingency as different operating conditions. The result of this research presents technical and financial results for WAMS configuration in a real power system. The optimization results are performed using MATLAB 2017a software application.

Performance Comparison between Localized and Non-Localized Brain Wave Monitoring Network Topology in the Medical Hospital Area (의료병원구역의 지역화와 비지역화된 뇌파 감시망 토폴로지의 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.9
    • /
    • pp.917-922
    • /
    • 2016
  • There are many researches related on the brain wave signals to monitor the state of human health. Especially, some patients in the medical hospital need to be monitored in case of emergencies such as a seizure, an epilepsy and so on. To support QoS of the brain wave network in the hospital is a vital issue and the Opnet simulator is used for this experiment. So the efficient network topology is required for the stability of the brain wave network service. The brain waves of the patients are collected from the sensor devices in the network. Two different sensor network topologies are suggested and simulated for the comparison of the network performance. One topology is localized and the other is non-localized network. The simulation is operated with the Opnet simulator.