• Title/Summary/Keyword: 제어 패킷

Search Result 986, Processing Time 0.022 seconds

The Method of Supporting QoS in B3G Environment (B3G 환경에서 QoS 보장 방안)

  • Lee, Jong-Chan
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.77-82
    • /
    • 2007
  • Supporting Quality of Service (QoS) for multimedia services in heterogeneous mobile networks is a part of key issue for Beyond Three Generation (B3G) development. In particular, if QoS degradation are occurred because cell overload and error late patterns of wireless links during the transmission of multimedia data, the efficient QoS management is necessary to maintain the same QoS of transmitted multimedia data because the QoS may be defected by some delay and information loss. This paper deals with QoS Degradation reason Intra-System Handover (D-ISHO) for handling QoS of multimedia services over heterogeneous mobile networks. For this aim, the function modules for supporting QoS of D-ISHO are proposed. The sequence diagram showing interaction between the modules is described and then a scenario for D-ISHO is considered. Simulation is focused on the average delay and packet loss rate. The proposed heterogeneous mobile system using the QoS-Guaranteed Resource Management (QGRM) provides a better performance than each different access system.

  • PDF

Priority Polling and Dual Token Bucket based HCCA Algorithm for IEEE 802.11e WLAN (IEEE 802.11e WLAN을 위한 우선순위 폴링 및 이중 토큰 버킷 기반의 HCCA 알고리즘)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.31-41
    • /
    • 2009
  • IEEE 802.11e proposed by IEEE 802.11 working group to guarantee QoS has contention based EDCA and contention free based HCCA. HCCA, a centralized polling based mechanism of 802.11e, needs a scheduling algorithm to allocate the network resource efficiently. The existing standard scheduler, however, is inefficient to support for QoS guarantee for real-time service having VBR traffic. To improve these limit, in this paper, we First, we propose priority polling algorithm which additionally considers the size of MSI and TXOP based on EDD algorithm to increase number of QSTAs. We also propose a dual token bucket TXOP allocation algorithm to reduce congestion caused by stations which enters network with considerable delay variance. TSPEC parameters, Maximum Burst Size (MBS) and Peak Data Rate (PR), are applied to design depth and token generation rate of two buckets. Simulation results show that the proposed algorithm has much higher performance compared with reference and SETT-EDD scheduler in terms of throughput and delay.

Dynamic Channel Time Allocation Scheme for Multimedia Traffic with Delay Bound in High-Rate Wireless PANs (고속율 무선 PAN에서 지연한도를 갖는 멀티미디어 트래픽을 위한 동적 채널시간할당 방법)

  • Kim Sun-Myeng;Cho Young-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.1-12
    • /
    • 2005
  • In wireless personal area networks(PANs), the successful design of channel time allocation algorithm is a key factor in guaranteeing the various quality of service(QoS) requirements for the stringent real-time constraints of multimedia services. In this paper we propose a dynamic channel time allocation algerian for providing delay guarantees to multimedia traffics such as MPEG streams in the IEEE 802.15.3 high-rate WPANs. The dynamic algorithm exploits the characteristics of MPEG stream, wherein the devices (DEVs) send their channel time requests only at the end of superframe boundaries. The algerian uses mini packets for feedback control in order to deliver dynamic parameters for channel time requests from the DEVs to the piconet coordinator (PNC). In this scheme, the duration of channel time allocated to a DEV during a superframe is changed dynamically depending on the MPEG frame type, traffic load and delay bound of the frame, etc. Performance of the proposed scheme is investigated by simulation. Our results show that compared to traditional scheme, the proposed scheme is very effective and has high performance while guaranteeing the delay bound.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

A Hierarchical Network Architecture and Handoff framework for Integrating CDMA2000, WiBro and WLAN (CDMA2000, WiBro 및 WLAN 연동을 위한 계층적 네트워크 구조와 핸드오프 프레임워크)

  • Kong, Du-Kyung;Cho, Jin-Sung;Kim, Seung-Hee;Kim, Dae-Sik
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.43-57
    • /
    • 2006
  • Next-generation mobile communication systems evolve in the form of high speed data transmission along with integration of wired-wireless network. Therefore, it needs researches on integrating service to heterogeneous networks to offer high speed data transmission and various services while supporting user mobility. In existing studies, heterogeneous networks are linked to single core network separatively, Since vertical handoff between heterogeneous networks leads to some delay, packets may be lost during vertical handoff. To solve this problem, this paper proposes an hierarchically integrated network architecture considering the characteristics of CDMA2000, WiBro, and WLAN. The hierarchically integrated networks are overlaid according to coverage of each network. Therefore, the proposed architecture can minimize handoff delay and packet loss. In addition, this paper proposes an integrated framework for next generation mobile communication networks.

  • PDF

TCP Buffer Tuning based on MBT for High-Speed Transmissions in Wireless LAN (무선 랜 고속전송을 위한 최대버퍼한계 기반 TCP 버퍼튜닝)

  • Mun, Sung-Gon;Lee, Hong-Seok;Choo, Hyun-Seung;Kong, Won-Young
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.15-23
    • /
    • 2007
  • Wireless LAN (IEEE 802.11) uses traditional TCP for reliable data transmission, But it brings the unintentional packet loss which is not congestion loss caused by handoff, interference, and fading in wireless LAN. In wireless LAN, TCP experiences performance degradation because it consumes that the cause of packet loss is congestion, and it decrease the sending rate by activating congestion control algorithm. This paper analyzes that correlation of throughput and buffer size for wireless buffer tuning. We find MBT (Maximum Buffer Threshold) which does not increase the throughput through the analysis, For calculation of MBT, we experiment the throughput by using high volume music data which is creased by real-time performance of piano. The experiment results is shown that buffer tuing based on MBT shows 20.3%, 21.4%, and 45.4% throughput improvement under 5ms RTT, 10ms RTT, and 20ms RTT, respectively, comparing with the throughput of operation system default buffer size, In addition, we describe that The setting of TCP buffer size by exceeding MBT does not have an effect on the performance of TCP.

  • PDF

Design of a Correlator and an Access-code Generator for Bluetooth Baseband (블루투스 기저대역을 위한 상관기와 액세스 코드 생성 모듈의 설계)

  • Hwang Sun-Won;Lee Sang-Hoon;Shin Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.206-211
    • /
    • 2005
  • We describe the design for a correlator and an access code generator in bluetooth system. These are used for a connection setting, a packet decision and a clock synchronization between Bluetooth units. The correlator consists of two blocks; carry save adder based on Wallace tree and threshold-value decision block. It determines on an useful packet and clock-synchronization for input signal of 1.0Mbps through the sliding-window correlating. The access-code generator also consists of two blocks; BCH(Bose-Chadhuri-Hocquenghem) cyclic encoder and control block. It generates the access-codes according to four steps' generation process based on Bluetooth standard. In order to solve synchronization problem, we make use of any memory as a pseudo random sequence. The proposed correlator and access-code generator were coded with VHDL. An FPGA Implementation of these modules and the simulation results are proved by Xilinx chip. The critical delay and correlative margin based on synthesis show the 4.689ns and the allowable correlation-error up to 7-bit.

  • PDF

Design of Fault-Tolerant Node Architecture based on SCM in Optical Burst Switching Networks (광 버스트 스위칭 망에서 장애에 둔감한 SCM 기반의 노드 구조 설계)

  • Song Kyu-Yeop;Yoo Kyoung-Min;Yoo Wan;Lee Hae-Joung;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.514-524
    • /
    • 2005
  • In optical burst switching(OBS) networks, the ingress edge router assembles packets in the same class queue into the appropriate size of burst. A burst control packet(BCP) is generated for channel reservation of corresponding data burst and sent earlier than the corresponding data burst with an offset time. Offset time is determined considering the number of hops from source to destination and the required quality of service(QoS). After offset time, the burst data is passed through tile pre-configured optical switches without any O/E/O conversion. But a failure in OBS networks may lead to the loss of bursts until the ingress nodes receive the failure indication signal. This results in a significant degradation in QoS. Therefore, in this paper, we propose a fault-tolerant node architecture based on sub-carrier multiplexing to reduce the effects of failure in OBS networks. The Performance of the proposed fault-tolerant node architecture exhibits considerable improvement as compared with the previous ones.

Sink Location Dissemination Scheme in Geographic Routing for Wireless Sensor Networks (무선 센서 망을 위한 위치 기반 라우팅에서 싱크 위치 전달 방안)

  • Lee, Eul-Sin;Park, Soo-Chang;Lee, Jeong-Cheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.847-856
    • /
    • 2009
  • In geographic routing for wireless sensor networks, sources need the location of sinks destined for delivering their data packets. Most of the existing geographic routing protocols merely assume that the sources can get the locations of sinks by some location service. How source nodes find out the location of sinks is not easy. In this paper, we propose a sink location dissemination scheme in geographic routing for wireless sensor networks. In this scheme, a source node and a sink node send sink location announcement and query messages along two paths respectively by geographic routing. The node located on the crossing point of the two paths informs the source about the sink location. Then the source can send data packet to the sink by geographic routing. How to guarantee that these two paths have at least one crossing point in any irregular profile of sensor network is the challenge of this paper Simulation results show that our protocol is significantly superior to other protocols in terms of energy consumption and control overhead.