• Title/Summary/Keyword: 제어 패킷

Search Result 985, Processing Time 0.028 seconds

A Performance Simulation for Call Capacity of Base Station in CDMA Mobile System (CDMA Mobile System의 Base Station호 처리 용량 성능 시뮬레이션)

  • Lee, Dong-Myeong;Jeon, Mun-Seok;Lee, Cheol-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1253-1261
    • /
    • 1996
  • The base station (BS) of CDMA mobile system (CMS) provides mobile call services by controlling call processing functions. The call Processing part of the BS is divided into two components; the base station transceiver subsystem (BTS) and the base station controller (BSC). In this paper, we present the call capacity estimation of the BS about control signals and traffic data of calls by the simulation, and find the bottleneck points and problems which may occur in the BS. In order to estimate the call capacity, first we extract the major parameters for the modeling the BS. Second, we suggest the simulation model for the BS. Third, we estimate the simulation results by finding major objective factors such that the call blocking probability, the utilization ratio and the delay time in the traffic channel elements (TCEs), the BTS interconnection network (BIN)-COMA interconnection network (CIN) trunks, the transcoding channels and the CIN packet router.

  • PDF

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Design and Performance Evaluation for VPNs based (MPLS 기반 VPN 제공을 위한 설계 및 성능 분석)

  • Yu, Young-Eel;Chon, Byoung-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.7
    • /
    • pp.1-11
    • /
    • 2002
  • This paper proposes that an efficient routing entry sending method between routing controller FE. based on this method, we organize IP VPN support method based on MPLS network and design MPLS-VPN service control module, MPLS-VPN processing, VPN group configuration and LSP setup processing. We evaluate the performance about the VPN based on proposed MPLS, at the result of evaluation. We figure out that based on proposed IPC method, lost packets number reduces and delay increases more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high utilization of buffers through the performance evaluation.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Mobility Management Scheme based on User Mobility QoS and Security-Effective Network in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 사용자 이동성 QoS와 보안효과적인 네트워크 기반의 이동성관리 기법)

  • Lee, Hyeungwoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2015
  • To support the efficient mobility MIPv6v, FMIPv6, HMIPv6 and host-based mobility management protocols have been developed. AAAC (Authentication, Authorization, Accounting and Charging) system is applied in this paper analyzed the the existing IPv6 PMIPv6, FPMIPv6 network security effective and IPv6 MMP (Mobile Management Protocol) Features and performance analysis is performed. And IPv6 MMP seamless transfer performance in terms of packet loss probability, will be analyzed. That can be efficiently used as a method for the integration of QoS and mobility so that you can manage and control the resources presented QoSB usage. Results of evaluation results showed a better overall fast handover structure of mobility management techniques. PMIPv6 and FPMIPv6 in many respects the most efficient structure that can be specifically, a fast handover of the structure of the network-based mobility management scheme showed the best results.

An Adaptive Incentive/Topology Control Scheme for Stimulating Real time Data Forwarding in VANET Environment (VANET 환경에서 실시간 데이터 포워딩 진작을 위한 적응형 인센티브/토폴로지 제어 기법)

  • Bae, Seo-Yun;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.1-8
    • /
    • 2011
  • Vehicular Ad-hoc Network (VANET) is a special form of Mobile Ad-hoc Network designed to provide communications among nearby vehicles without communications infrastructure. Some characteristics in VANET environment such as high mobility, dynamic topology and selfishness of nodes can cause degradation of network quality. In this paper, we propose an adaptive incentive/topology control scheme to improve network quality in VANET by stimulating real time data forwarding and reporting changes of network topology. In the proposed scheme, an incentive suggested by the source node is updated in real time simultaneously with data transmission to stimulate real time data forwarding. In addition, when the order of the nodes in the path is changed, nodes which report the changes of network topology will get an additional incentive. By computer simulation, it is shown that the proposed incentive/topology control scheme outperforms the conventional schemes with respect to data delivery time and data delivery ratio.

Segment-based Buffer Management for Multi-level Streaming Service in the Proxy System (프록시 시스템에서 multi-level 스트리밍 서비스를 위한 세그먼트 기반의 버퍼관리)

  • Lee, Chong-Deuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.135-142
    • /
    • 2010
  • QoS in the proxy system are under heavy influence from interferences such as congestion, latency, and retransmission. Also, multi-level streaming services affects from temporal synchronization, which lead to degrade the service quality. This paper proposes a new segment-based buffer management mechanism which reduces performance degradation of streaming services and enhances throughput of streaming due to drawbacks of the proxy system. The proposed paper optimizes streaming services by: 1) Use of segment-based buffer management mechanism, 2) Minimization of overhead due to congestion and interference, and 3) Minimization of retransmission due to disconnection and delay. This paper utilizes fuzzy value $\mu$ and cost weight $\omega$ to process the result. The simulation result shows that the proposed mechanism has better performance in buffer cache control rate, average packet loss rate, and delay saving rate with stream relevance metric than the other existing methods of fixed segmentation method, pyramid segmentation method, and skyscraper segmentation method.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

Ultrasonic Nonlinearity Measurement in Heat Treated SA508 Alloy: Influences of Grains and Precipitates (열처리된 SA508 합금에서의 초음파 비선형성 측정: 결정립과 석출물 영향)

  • Baek, Seung-Hyun;Lee, Tae-Hun;Kim, Chung-Seok;Jhang, Kyung-Young
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.5
    • /
    • pp.451-457
    • /
    • 2010
  • In the present study, the influences of grains and precipitates of microstructural evolution on the ultrasonic nonlinearity have been experimentally investigated. The prior-austenite grain and precipitate size are controlled by the variation in austenitizing and tempering conditions in reactor pressure vessel materials of nuclear power plant, SA508 Gr.3 low alloys. The ultrasonic nonlinearity was found to have strong correlations with grains and precipitates since the ultrasonic nonlinear parameter $\beta$ shows decrease trend with coarsening of grains and precipitates. Although the prior-austenite grain size increased, the $\beta$ changed little due to the effects of subgrains, packets and laths. For the preciptate effects, the $\beta$ decreased sharply due to decrease in $Mo_2C$ causing the coherency stain in addition to the precipitate size. The results in this study may provide a potential for characterizing the microstructural evolution, grains and precipitates, by measuring the ultrasonic nonlinearity.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.