• Title/Summary/Keyword: message rate

Search Result 326, Processing Time 0.024 seconds

The Deviation Distribution of Target on the ILS Final Approach Segment Using ADS-B Message (ADS-B 신호를 이용한 ILS 최종접근 구간의 항공기 항적 이격 분포 도출)

  • Ku, SungKwan;Lee, Young-Jong;Shin, DaiWon
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.403-410
    • /
    • 2015
  • ADS-B can provide high accurate position information and faster update rate than Radar system and it is a technique that can supplement or replace the Radar. Recently ADS-B has been applied to the actual aircraft operation because to increase air transportation traffic and required to high accurate surveillance. In this study, we surveyed analysis of position deviation distribution analysis and received actual ADS-B trajectory data for conformed precise surveillance on the near airport area using ADS-B message. For that, we received the precision instrument approach ADS-B trajectory data using instrument landing system, and can analyse about target deviation distribution on the final approach segment about precision instrument approach. The result of analysis is mean distance of target deviation -0.04 m and standard deviation 6.71 m on between ADS-B target and extended runway centerline. Also that is to conformed the ADS-B message trajectory available to provide relatively exact surveillance information.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

NetLogo Extension Module for the Active Participatory Simulations with GoGo Board (고고보드를 이용한 능동적 참여 모의실험을 위한 NetLogo 확장 모듈)

  • Xiong, Hong-Yu;So, Won-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1363-1372
    • /
    • 2011
  • Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.

A New Congestion Control Algorithm for Vehicle to Vehicle Safety Communications (차량 안전 통신을 위한 새로운 혼잡 제어 알고리즘 제안)

  • Yi, Wonjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.125-132
    • /
    • 2017
  • Vehicular safety service reduces traffic accidents and traffic congestion by informing drivers in advance of threats that may occur while driving using vehicle-to-vehicle (V2V) communications in a wireless environment. For vehicle safety services, every vehicle must broadcasts a Basic Safety Message(BSM) periodically. In congested traffic areas, however, network congestion can easily happen, reduce the message delivery ratio, increase end-to-end delay and destabilize vehicular safety service system. In this paper, to solve the network congestion problem in vehicle safety communications, we approximate the relationship between channel busy ratio and the number of vehicles and use it to estimate the total network congestion. We propose a new context-aware transmit power control algorithm which controls the transmission power based on total network congestion. The performance of the proposed algorithm is evaluated using Qualnet, a network simulator. As a result, the estimation of total network congestion is accurately approximated except in specific scenarios, and the packet error rate in vehicle safety communication is reduced through transmit power control.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Design and realization of the passenger ship's MSP service system using ASM2.0 : focusing on captain's mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 여객선 MSP서비스 시스템 설계 및 구현)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.871-882
    • /
    • 2015
  • AIS-ASM is one of the studies to provide a variety of maritime safety information as well as the information on a ship's position that is their own function, and AIS-ASM has been implemented with adjustment of the relevant regulations since 2004. However, it was reported that the increased use of ASM message on the existing AIS channel affects the part of the existing AIS own function such as the transmission of the ship's position and safe-related information. Also, seamless MSP service is difficult to provide at a low transmission rate of the existing AIS channel. This study aims to reduce the marine officer's workload through automating captain's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and realized the ASM2.0 protocol through analyzing domestic regulations about passenger flight and AIS-ASM message.

A Scheduling mechanism for Real-Time Messages on Dual-Link Networks (전송제한시간에 기초한 이중-링크 네트워크상에서 실시간 메시지 스케듈링 기법)

  • Lee, Myeong-Jin;Lee, Jeong-Bae;Jang, Deok-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.244-253
    • /
    • 1994
  • Computer networks need a variety of services. Some services such as, video, voice and plantcontrol traffic require a real-time communication with explicit timing constraints. In this pater, we introduce a real-time communication technique which use a reservation technique on dualilnk networks. We introduce an enhanced technique that determines priorities of the message based on time constraints when real-time messages are transmitted. A simulation was conducted to compare and to analyze traditional technique. We used the SLAM II language to simulate this technique. Message loss rate were compared and analyzed as a performance criteria in this simulation.

  • PDF

Fault-Tolerant Parallel Applications in Java Message Passing Systems (자바 메시지 전달 시스템에서의 결함 포용 병렬 애플리케이션)

  • 안진호;김기범;김정훈;황종선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.768-770
    • /
    • 1998
  • 동기적 검사점(synchronous checkpoiting)기법, 인과적 메시지 로깅(causal message logging)과 향상된 회복 비동기성(improved asynchronism during recovery)을 제공하는 복귀회복(rollback recovery) 기법을 적용하여 자바 메시지 전달 시스템(java massage passing system)에서 수행하는 병렬 에플리케이션들에게 저 비용의 결함 포용성에 따라, 통신망으로 연결된 이질형 (fault-tolerance)(heterogeneous) 컴퓨터들을 이용하는 대규모 분산 시스템들은 아주 효율적인 병렬 컴퓨팅 환경을 제공해준다. 그러나, 이러한 분산 시스템들의 규모가 커짐에 따라 고장률 (failure rate)도 그 만큼 중요하게 된다. 따라서, 고장률이 높은 대규모 분산 시스템들에게 좀더 효율적인 결함 포용성을 제공하는 기법들이 필요하다. 또한, 대규모분산 시스템들은 이질형 컴퓨터들로 구성되어 있기 때문에, 결함 포용성을 제공하는 소프트웨어 패키지들은 플랫폼 독립적(platform independent)이어야 한다. 이러한 문제점은 높은 이식성(portability)을 가지고 있는 자바 언어로 구현함으로써 해결될 수 있다. 따라서, 본 논문은 자바 메시지 전달 시스템에서 수행되는 병렬 애플리케이션들에게 동기적 검사점 기법, 인과적 메시지 로깅과 향상된 비동기성을 제공하는 복귀회복 기법을 높은 이식성을 가진 자바언어로 구현하여 저 비용으로 결함 포용성을 제공하고자 한다.

  • PDF

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.

Comparison of Teaching about Breast Cancer via Mobile or Traditional Learning Methods in Gynecology Residents

  • Alipour, Sadaf;Moini, Ashraf;Jafari-Adli, Shahrzad;Gharaie, Nooshin;Mansouri, Khorshid
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4593-4595
    • /
    • 2012
  • Introduction: Mobile learning enables users to interact with educational resources while in variable locations. Medical students in residency positions need to assimilate considerable knowledge besides their practical training and we therefore aimed to evaluate the impact of using short message service via cell phone as a learning tool in residents of Obstetrics and Gynecology in our hospital. Methods: We sent short messages including data about breast cancer to the cell phones of 25 residents of gynecology and obstetrics and asked them to study a well-designed booklet containing another set of information about the disease in the same period. The rate of learning derived from the two methods was compared by pre- and post-tests and self-satisfaction assessed by a relevant questionnaire at the end of the program. Results: The mobile learning method had a significantly better effect on learning and created more interest in the subject. Conclusion: Learning via receiving SMS can be an effective and appealing method of knowledge acquisition in higher levels of education.