• Title/Summary/Keyword: UDP 소켓

Search Result 8, Processing Time 0.02 seconds

Development of Small-scale Drones Swarm Flight System (소규모 드론 군집 비행 시스템 개발)

  • Choi, Hyo Hyun;Yun, Sang Un
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.245-246
    • /
    • 2019
  • 본 논문에서는 GUI(Graphical User Interface)를 이용하여 다수의 드론을 동시 제어하는 시스템 구현 결과를 보인다. 네트워크 소켓(Network Socket) 응용 프로그램인 Packet Sender를 이용하여 다수의 드론을 AP(Wireless Access Point)에 연결하였다. Python 응용 프로그램으로 UDP(User Datagram Protocol) 소켓을 통해 AP에 연동된 드론으로 명령을 전송하여 제어한다. Python GUI 모듈인 Tkinter를 이용하여 사용자에게 GUI를 제공함으로써 접근성(Accessibility)을 높인 시스템을 개발하였다.

  • PDF

A Study on Ring Buffer for Efficiency of Mass Data Transmission in Unstable Network Environment (불안정한 네트워크 환경에서 대용량 데이터의 전송 효율화를 위한 링 버퍼에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1045-1054
    • /
    • 2020
  • In this paper, we designed a TCP/IP based ring buffer system that can stably transfer bulk data streams in the unstable network environments. In the scheme we proposed, The observation data stream generated and output by each radio observatory's backend system as a UDP frame is stored as a UDP packet in a large capacity ring buffer via a socket buffer in the client system. Thereafter, for stable transmission to the remote destination, the packets are processed in TCP and transmitted to the socket buffer of server system in the correlation center, which packets are stored in a large capacity ring buffer if there is no problem with the packets. In case of errors such as loss, duplication, and out of order delivery, the packets are retransmitted through TCP flow control, and we guaranteed that the reliability of data arriving at the correlation center. When congestion avoidance occurs due to network performance instability, we also suggest that performance degradation can be minimized by applying parallel streams.

Adaptive Rate Control Simulation for Packet Losses in Internet Streaming Services (인터넷 스트리밍 서비스의 패킷 손실 억제를 위한 전송률 적응제어 시뮬레이션)

  • 윤인철;권성기;최우정;장봉석
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.416-421
    • /
    • 2002
  • 본 논문에서는 인터넷 상에서 UDP 소켓 인터페이스를 이용하여 실시간 스트리밍 전송을 시뮬레이션 하였고 또한 수신자로부터 피드백 된 정보를 이용하여 송신자가 전송률을 제어하는 것을 시뮬레이션 하였다. 수신자로부터 제어정보를 피드백 받아 송신자가 전송률을 제어하는 경우와 송신자가 전혀 전송률제어를 하지 않는 경우의 패킷 손실 값을 비교했다. 결과로서, 피드백 되는 정보를 이용하여 제어를 하는 경우가 지속적인 패킷손실을 방지함을 보여 준다.

  • PDF

User Interface based on Android for Remote Control of Quadcopter (쿼드콥터 원격제어를 위한 안드로이드 기반 사용자 인터페이스)

  • Rim, Seong-Rak;Son, Tae-Yeong;Kim, Hyun-ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.7-9
    • /
    • 2012
  • 본 논문에서는 안드로이드 폰을 이용하여 쿼드콥터의 모터 속도를 원격으로 제어하기 위한 사용자 인터페이스 기법을 제시한다. 제시한 기법은 내부적으로 JSON 프로토콜을 사용하여 메시지를 생성하고 UDP 소켓을 통하여 인터넷과 무선 통신한다. 제시한 기법의 타당성을 검토하기 위하여 Nexus S 안드로이드 폰에 앱 프로그램을 구현하고 Falinux(주)의 G100-S3C6410 보드를 이용하여 쿼드콥터 원격제어를 실험하였다.

Enhanced Server Availability for DDoS Amplification Attack Using CLDAP Protocol (CLDAP 프로토콜을 이용한 DDoS 증폭공격에 대한 서버 가용성 향상방안 연구)

  • Choi, Suk June;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Recently, DDoS amplification attacks using servers that provide Microsoft Active Directory information using CLDAP protocol are increasing. Because CLDAP is an open standard application that allows a wide range of directory information to be accessed and maintained in a network, the server is characterized by its openness to the Internet. This can be exploited by the Reflector server to perform an amplification attack by an attacker. In addition, this attack can be attacked with a packet that is amplified 70 times more than the conventional UDP-based flooding attack, and it can block service to small and medium sized server. Therefore, in this paper, we propose an algorithm that can reduce the DDoS amplification attack using CLDAP server and implement the corresponding CLDAP server environment virtually, and implement and demonstrate the corresponding algorithm. This provides a way to ensure the availability of the server.

Implementation and Performance Analysis of the Group Communication Using CORBA-ORB, JAVA-RMI and Socket (CORBA-ORB, JAVA-RMI, 소켓을 이용한 그룹 통신의 구현 및 성능 분석)

  • 한윤기;구용완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Large-scale distributed applications based on Internet and client/server applications have to deal with series of problems. Load balancing, unpredictable communication delays, and networking failures can be the example of the series of problems. Therefore. sophisticated applications such as teleconferencing, video-on-demand, and concurrent software engineering require an abstracted group communication, CORBA does not address these paradigms adequately. It mainly deals with point-to-point communication and does not support the development of reliable applications that include predictable behavior in distributed systems. In this paper, we present our design, implementation and performance analysis of the group communication using the CORBA-ORB. JAVA-RML and Socket based on distributed computing Performance analysis will be estimated latency-lime according to object increment, in case of group communication using ORB of CORBA the average is 14.5172msec, in case of group communication using RMI of Java the average is 21.4085msec, in case of group communication using socket the average is becoming 18.0714msec. Each group communication using multicast and UDP can be estimated 0.2735msec and 0.2157msec. The performance of the CORBA-ORB group communication is increased because of the increased object by the result of this research. This study can be applied to the fault-tolerant client/server system, group-ware. text retrieval system, and financial information systems.

  • PDF

A study on the receiving rate of the data of the hybrid communication system using data transfer methods for controller system of navigational aids (데이터 전송방식에 따른 항로표지 관리용 하이브리드 통신 시스템의 수신율 분석에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.1
    • /
    • pp.78-85
    • /
    • 2014
  • The Mu-communication board supported by hybrid communication is designed with Cortex M3, which is a low power energy consumption 32-bit microcontroller. The Cortex M3 microcontroller has UART(Universal asynchronous receiver/transmitter) ports which can set appropriately using the command line interpreter (CLI) program with each port. URAT ports are used for hybrid communication modems, GPS modules, etc. When the socket type was compared with the short message service type, the socket type was proven to be better. By improving the receiving performance in the control and management system of the AtoN, data loss was minimized. During the testing of the socket and SMS, data was collected from each buoy for 12 hours every 1 minute and the receiving rate of the data was found to be more than 98.58 % and 99.42 % respectively.

Development of Checking System for Emergency using Behavior-based Object Detection (행동기반 사물 감지를 통한 위급상황 확인 시스템 개발)

  • Kim, MinJe;Koh, KyuHan;Jo, JaeChoon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.140-146
    • /
    • 2020
  • Since the current crime prevention systems have a standard mechanism that victims request for help by themselves or ask for help from a third party nearby, it is difficult to obtain appropriate help in situations where a prompt response is not possible. In this study, we proposed and developed an automatic rescue request model and system using Deep Learning and OpenCV. This study is based on the prerequisite that immediate and precise threat detection is essential to ensure the user's safety. We validated and verified that the system identified by more than 99% of the object's accuracy to ensure the user's safety, and it took only three seconds to complete all necessary algorithms. We plan to collect various types of threats and a large amount of data to reinforce the system's capabilities so that the system can recognize and deal with all dangerous situations, including various threats and unpredictable cases.