• Title/Summary/Keyword: 제어 패킷

Search Result 985, Processing Time 0.025 seconds

An Efficient Scheduling Scheme for Bluetooth Piconets (블루투스 피코넷을 위한 효율적 스케줄링 기법)

  • 이우신;이혁준
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.38-47
    • /
    • 2003
  • Communication between Bluetooth devices is based on TDD by a master unit. In this discipline, the transmission of slave packets can be made only when the master transmits a packet to the slave. Thus, some slots may be wasted when there is no user data in the master's or slave's queue due to the transmission of a POLL or NULL packet. Therefore a scheduling scheme which can minimize the slot waste is required in Bluetooth intra-piconet communication. However, since the master is responsible for the intra-piconet scheduling, it must be provided with an information on each slave's queue length to apply traditional scheduling schemes. which is impossible in Bluetooth. This paper presents a new Bluetooth intra-piconet scheduling scheme that is efficient and does not require the information on each slave's queue length. The scheduling is done based on the information about the existence of data in the master and slave queues which is derived by the master identifying the type of packets transmitted. The master schedules to communicate with the slaves according to the priorities determined based on this information. We Presents simulation results which indicate a significant improvement in the performance when our proposed scheme is used.

MAC Protocol based on Resource Status-Sensing Scheme for Integrated Voice/Data Services (음성/데이타 통합 서비스를 위한 자원 상태 감지 기법 기반 MAC프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.141-155
    • /
    • 2002
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.

Performance Analysis of Cellular If Using Combined Cache and Alternative Handoff Method for Realtime Data Transmission (실시간 데이터를 지원하는 통합 캐시 및 차별화된 핸드오프를 이용한 셀룰러 IP의 성능분석)

  • Seo, Jeong-Hwa;Han, Tae-Young;Kim, Nam
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.65-72
    • /
    • 2003
  • In this paper, the new scheme using a Combined Cache(CC) that combing the Paging and Routing Cache(PRC) and an alternative handoff method according to the type of data transmission for achieving the efficient realtime communication. The PRC and quasi-soft handoff method reduce the path duplication. But they increase the network traffic load because of the handoff state packet of Mobile Host(MH). Moreover the use the same handoff method without differentiating the type of transmission data. Those problems are solved by operating U with a semi-soft handoff method for realtime data transmission and with a hard handoff method for non-realtime data transmission. As a result or simulation a better performance is obtained because of the reduction of the number of control packet in case that the number of cells are below 20. And the packet arrival time and loss of packet decreased significantly for realtime data transmission.

  • PDF

Lightweight Packet Authentication for Access Control in IEEE 802.11 (IEEE 802.11에서의 접근 제어를 위한 Lightweight 패킷 인증)

  • Lee, Keun-Soon;Kim, Hyo-Jin;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.29-38
    • /
    • 2005
  • Because IEEE 802.11 has several security vulnerabilities, IEEE 802.11i was proposed and accepted. But IEEE 802.11i has much overhead for most of users for the web surfing. Besides not only node the authentication but also the packet authentication is needed to communicate. Although IEEE 802.11i uses TKIP(Temporal Key integrity Protocol) and CCMP(CTR with CBC-MAC Protocol), they have a lot of overheads. In this paper, Lightweight Packet Authentication(LIPA) is proposed. LIPA has less overhead and short delay so that it can be affordable for simple web-surfing which does not need stronger security. After comparing performances of LIPA with those of TKIP and CCMP, LIPA is more efficient than other schemes for transmitting packets.

Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card (TCP 플러딩 공격 방어를 위한 네트워크 인터페이스용 고성능 TCP 프락시 제어 로직 구현)

  • Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.119-129
    • /
    • 2011
  • TCP-related Flooding attacks still dominate Distributed Denial of Service Attack. It is a great challenge to accurately detect the TCP flood attack in hish speed network. In this paper, we propose the NIC_Cookie logic implementation, which is a kind of security offload engine against TCP-related DDoS attacks, on network interface card. NIC_Cookie has robustness against DDoS attack itself and it is independent on server OS and external network configuration. It supports not IP-based response method but packet-level response, therefore it can handle attacks of NAT-based user group. We evaluate that the latency time of NIC_Cookie logics is $7{\times}10^{-6}$ seconds and we show 2Gbps wire-speed performance through a benchmark test.

Design of a High-Speed Data Packet Allocation Circuit for Network-on-Chip (NoC 용 고속 데이터 패킷 할당 회로 설계)

  • Kim, Jeonghyun;Lee, Jaesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.459-461
    • /
    • 2022
  • One of the big differences between Network-on-Chip (NoC) and the existing parallel processing system based on an off-chip network is that data packet routing is performed using a centralized control scheme. In such an environment, the best-effort packet routing problem becomes a real-time assignment problem in which data packet arriving time and processing time is the cost. In this paper, the Hungarian algorithm, a representative computational complexity reduction algorithm for the linear algebraic equation of the allocation problem, is implemented in the form of a hardware accelerator. As a result of logic synthesis using the TSMC 0.18um standard cell library, the area of the circuit designed through case analysis for the cost distribution is reduced by about 16% and the propagation delay of it is reduced by about 52%, compared to the circuit implementing the original operation sequence of the Hungarian algorithm.

  • PDF

A Efficient Data Transmission Protocol for a Remote Controlled Robot in Wireless Links (무선링크에서 효과적인 로봇제어 데이터 전송 방법)

  • Cho Dong-Kwon;Chun Sang-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.878-883
    • /
    • 2006
  • New emerging wireless broadband internet can make many broadband multimedia services. The networked intelligent mobile robot service is one of the new services. In the networked robot control, both the on-line real-time control and the reliability of control data transmission are very important. Considering the real-time control and data reliability, an efficient transmission method based on UDP protocol is proposed. The proposed method allocates the priority to the robot control data and the transmission of the robot data at the base station is carried out in duplicate manner. NS-2 simulation results show that the proposed scheme has a very low packet delay and low packet errors.

Analysis of the congestion control scheme with the discard eligibility bit for frame relay networks (프레임 릴레이망에서의 DE 비트를 사용하는 혼잡제어 방식의 성능해석에 관한 연구)

  • 이현우;우상철;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.2027-2034
    • /
    • 1997
  • Frame relay is a fast packet switching technology that performs relaying and multiplexing frames with variable lengths over a wide area link at the T1 or E1 speed, by elminating error and flow control in the network. In frame relay networks, congestion control is typically performed through the rate enforcement with a discard eligibility (DE) bit, and the explicit negative feedback meachanisms using explicit congetion notification bits. In this paper, we consider the congestiong control scheme using the rate enforcement mechanism with DE bit for frame relay network. Assuming that each frame with exponentially distributed length arrives according to the Poission fashion, we can treat the frame relay switch as an M/M/1/K priority queueing system with pushout basis. We analyze and present the blocking probabilities and waiting time distributions of frames.

  • PDF

A Practical TCP-friendly Rate Control Scheme for SVC Video Transport (SVC 비디오 전송을 위한 실용적인 TCP 친화적 전송률 제어 기법)

  • Seo, Kwang-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.2
    • /
    • pp.114-124
    • /
    • 2009
  • In this paper, we propose a practical TCP friendly rate control scheme that considers the minimum channel bandwidth of the network when transporting SVC (scalable video coding) video over IP netowrks such as Internet. RTP and RTCP is mainly designed for use with UDP (User Datagram Protocol) for real-time video transport over the Internet. TCP-friendly rate control was proposed to satisfy the demands of multimedia applications while being reasonably fair when competing for bandwidth with conventional TCP applications. However the rate control model of the conventional TCP-friendly rate control scheme does not consider the minimum channel bandwidth of the network. Thus the estimated channel bandwidth by the conventional rate control model might be quite different from the real channel bandwidth when the packet loss ratio of the network is very large. In this paper, we propose a modified TCP-friendly rate control scheme that considers the minimum channel bandwidth of the network. Based on the modified TCP-friendly rate control, we assign the minimum channel bandwidth to the base layer bitstream of SVC video, and remaining available bandwidth is allocated to the enhancement layer of SVC video for the TCP friendly scalable video transmission. It is shown by simulations that the modified TCP-friendly rate control scheme can be effectively used for a wider range of controlled bit rates depending on the packet loss ratio than the conventional TCP-friendly control scheme. Furthermore, the effectiveness of the proposed scheme in terms of objective video quality is proved by comparing PSNR performance with the conventional scheme.

Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack (DDoS 공격 가능성 완화를 위한 효율적인 버퍼 관리 기술)

  • Noh, Hee-Kyeong;Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2012
  • DDoS attack is a malicious attempt to exhaust resources of target system and network capacities using lots of distributed zombi systems. DDoS attack introduced in early 2000 has being evolved over time and presented in a various form of attacks. This paper proposes a scheme to detect DDoS attacks and to reduce possibility of such attacks that are especially based on vulnerabilities presented by using control packets of existing network protocols. To cope with DDoS attacks, the proposed scheme utilizes a buffer management techniques commonly used for congestion control in Internet. Our scheme is not intended to detect DDoS attacks perfectly but to minimize possibility of overloading of internal system and to mitigate possibility of attacks by discarding control packets at the time of detecting DDoS attacks. In addition, the detection module of our scheme can adapt dynamically to instantly increasing traffic unlike previously proposed schemes.