• Title/Summary/Keyword: protocol parameter

Search Result 161, Processing Time 0.027 seconds

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Impedance Evaluation Method of UHF RFID Tag Chip for Maximum Read Range (UHF RFID 태그의 최대 인식 거리를 얻기 위한 태그 칩의 임피던스 산출 방법)

  • Sim, Yong-Seog;Yang, Jeen-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.12
    • /
    • pp.1148-1157
    • /
    • 2013
  • In a passive UHF RFID system, the impedance matching between tag antenna and chip as well as the protocol parameter settings in a reader plays important role in determination of the maximum read-range. Almost no paper, however, has dealt with the above issues in relation with the maximum read range. In this paper, two known methods (of using the value from data sheets and proprietary RFID tester) and our proposing method in chip impedance evaluation are compared in terms of maximum read range. The read range of tags whose antenna impedance is conjugate matched with the chip impedance obtained from the proposed method is improved maximum 73 % more than that of tags from the other methods.

A Study on Improving TCP Performance over ABR/UBR Services in ATM Network (ATM 망에서 ABR/UBR 서비스상의 TCP 성능 향상에 관한 연구)

  • 김명희;박승섭
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.1-10
    • /
    • 2000
  • ATM network technology is generally used for the solution of integrating multimedia service in high-speed Internet. In Internet protocol based on ATM services, If single cell is lost in ATM layer, the entire TCP packet will be lost. Therefore, TCP performance will be degraded. In order to reduce cell loss, when congestion occur, UBR+EPD mechanism is proposed to improve the throughput in TCP over UBR, and ER scheme is suggested in TCP over ABR. In this paper, we analyzed the performance improvement effect of UBR+EPD with FRR (Fast Retransmission and Recovery), the adjusting EPD threshold parameter (R), and variation of MTU (Maximum Transport Unit) size. As a result, through the analysis of performance, we know that the improved throughput and fairness are shown by the proposed scheme.

  • PDF

Statistical Estimation of the Number of Contending Stations and its Application to a Multi-round Contention Resolution Scheme

  • Jang, Seowoo;Choi, Jin-Ghoo;Yoon, Sung-Guk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4259-4271
    • /
    • 2016
  • With the increased popularity of IEEE 802.11 WLAN, the density of the WLAN devices per access point has also increased, resulting in throughput performance degradation. One of the solutions to the problem is improving the protocol efficiency by a using multi-round contention scheme. This paper first discusses how to estimate the number of contending stations in a WLAN network by using minimum elapsed backoff counter values that can be easily monitored by each station. An approximate closed form expression is derived for the number of active contending stations using the smallest backoff counter value in the network. We then apply this result to adapt the number of contending rounds according to the network loading level to enhance the throughput performance of a multi-round contention scheme. Through simulation, we show that the accuracy of the estimation algorithm depends on the contention parameters of W and the number of backoff counter observing samples, and found a reasonable value for each parameter. We clearly show that our adaptive multi-round contention scheme outperforms the standard contention scheme that uses a fixed number of rounds.

A Probabilistic Routing Mechanism Considering the Encounter Frequency in the Battlefield Environment (전장 환경에서 접촉 횟수 정보를 고려한 확률적 라우팅 기법)

  • Lee, Jongmok;Kang, Kyungran;Cho, Young-Jong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.332-339
    • /
    • 2013
  • The network nodes in a tactical network moves continuously and due to the physical and electronic obstacles, the connections are not always available. Due to the frequent disconnections, it is hard to discover the path among the nodes in a DTN. According to PROPHET(Probabilistic Routing Protocol using History of Encounters and Transitivity), one of the most well-known DTN routing protocols, a DTN node determines whom to forward a packet according to the packet delivery probability. From the viewpoint of a node, the packet delivery probability of another node is degraded while the nodes are disconnected whereas it is improved when they encounter. In this paper, we enhance the algorithm estimating the packet probability by considering the encounter count as an additional parameter. Our algorithm prefers the node that encounters the destination more frequently in selecting the next hop toward the destination. We evaluated the performance of our algorithm by simulating military operations using a DTN-dedicated simulator. Through the simulations, we show that our proposed algorithm achieve higher packet delivery ratio with similar overhead compared with PROPHET.

A Control of Channel Rate for Real-time VBR Video Transmission (실시간 비디오 전송을 위한 채널레이트 조절)

  • 고석주;이채영
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.3
    • /
    • pp.63-72
    • /
    • 1999
  • Recent studies on the Constant Bit Rate and Variable Bit Rate transmissions have mainly focused on the frame by frame encoder rate control based on the quantization parameter. With the existing approaches it is difficult to guarantee a consistent video quality. Also, the rate control overhead is too high for the real-time video sources. In this paper, a channel rate allocation scheme based on the control period is proposed to transmit a real-time video, in which the control period is defined by a pre-specified number of frames or group of pictures. At each control period, video traffic information is collected to determine the channel rate at the next control period. The channel rate is allocated to satisfy various channel rate constraints such that the buffer occupancy at the decoder is maintained at a target level. If the allocated channel rate approaches the level at which the negotiated traffic descriptions may be violated, the encoder rate is decreased through adjusting quantization parameters in the MPEG encoder. In the experimental results, the video quality and the overflow and underflow probabilities at the buffer are compared at different control periods. Experiments show that the video quality and the utilization of network bandwidth resources can be optimized through the suitable selection of the control period.

  • PDF

The Coordinates Computation of the GPS Base Station by Precise Point Positioning (정밀절대측위(PPP)기법에 의한 GPS 기준점 좌표의 산정)

  • 이용창
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.2
    • /
    • pp.145-152
    • /
    • 1999
  • JPL(Jet Propulsion Laboratory) has been routinely produced the precise GPS ephemeris and clock's correction parameter using data collected from globally distributed permanent GPS tracking stations, and has been offering the automated GPS data analysis(Precise Point Positioning: PPP) service by using them. In this study, after investigating the potential capacity of JPL's PPP service, the coordinates computation of the GPS base station by this service were investigated. For this, the dual frequency P codes data of 24 hours were observed from continuously operating four reference stations in USA. sent to the JPL's main computer through E-mail and/or ftp, and then were processed by Gipsy/Oasis-II (GOA-II) software with the precise GPS transmitter parameters. Centimeter-level positioning results were available to obtain in X, Y, Z geocentric rectangular coordinate system.

  • PDF

QoS Improvement Method for Real Time Traffic in Wireless Networks (무선망에서 실시간 트래픽을 위한 QoS 향상 기법)

  • Kim, Nam-Hee;Kim, Byun-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.34-42
    • /
    • 2008
  • MAC(Medium Access Control) is demanded to provide end-to-end QoS(Quality of Service) for a variety of traffic in the wireless networks. When all the traffic is integrated in the channel, the main difficulty of the MAC protocol is how to efficiently support multi-class traffic in the limited bandwidth wireless channel. In this paper, we proposed the dynamic bandwidth slot method for improving QoS of the real time traffics. In this paper, we used in-band scheme to send dynamic parameter and considering buffer size and delay variation, we enabled 2 state bits to send to base station in mobile station. The proposed algorithm is to guarantee QoS of real time traffic and maximize transfer efficiency in wireless networks.

Performance Analysis of Efficient Subchannelization Algorithm against Partial Band Jamming (부채널화를 통한 효율적인 부분대역 재밍 회피 알고리즘과 성능분석)

  • Song, Yu Chan;Hwang, Yu Min;Park, Ji Ho;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.14-18
    • /
    • 2015
  • Electronic warfare recently has became the core of modern warfare and the importance of communication survivability is being considerable day by day. In this paper, we propose an effective jamming avoidance algorithm aginst widely used jamming environment such as GPS jamming. In order to simulate to show our system performance, we consider IEEE 802.16 WiMAX protocol and partial band jamming envoriment. Proposed algorithm can improve channel capacity through subchannelization and we show channel capacity corresponding to subchannel parameter.

A new MAC protocol to improve a performance in IEEE 802.11 wireless LANs (IEEE 802.11 무선 랜의 성능 향상을 위한 새로운 MAC프로토콜)

  • Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 2009
  • A new backoff scheme for infrastructure mode in IEEE 802.11 wireless LANs is proposed to improve a performance. Each station generates a unique backoff number using total number of stations, fairness parameter included in beacon frame and an user's ID that is assigned by AP. The station sends a packet after its own backoff number of idle slots, which makes a collision free access among stations within AP's coverage. The proposed method shows better performance in the view of channel utilization and packet delay than an original IEEE 802.11 CSMA/CA backoff scheme.