• Title/Summary/Keyword: 트래픽 라우팅

Search Result 376, Processing Time 0.027 seconds

A Design and Implementation of Dynamic Hybrid P2P System with Group Management and Maintenance of Reliability (그룹관리와 신뢰성을 위한 Dynamic Hybrid P2P시스템 설계 및 구현)

  • 이석희;양일등;김성열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.406-408
    • /
    • 2003
  • 현재 많이 사용되고 있는 P2P 개념으로는 순수 F2P와 변형 F2P구조가 있다. 순수 P2P의 모델에는 Gnutella와 Ktella 등의 형태가 존재하고 변형 P2P로는 무수히 많은 형태가 존재한다. 순수 P2P 모델의 경우에는 정보 공유에서 연결성을 장점으로 Gnutella의 형태를 응용한 형태로 많이 사용되고 있지만 정보를 검색하거나 제공하기 위해 많은 트래픽을 소모하게 된다. 이와는 달리 변형 P2P모델들 중 정보 공유 모델들이 존재하는데 이 모델들은 사용자에게 효율적이고 빠른 검색과 색인을 제공하기 위해 기존의 서버/클라이언트 형태를 취하고 있지만 제공하는 서버의 능력에 의존할 수 밖에 없다. 파일공유 모델의 Peer들에 대해 연결성 유지를 위한 많은 부하와 사용자에 있어서 그룹에 대한 형태의 문제점 그리고 서버의 Fail로 인한 비 연결성에 대한 문제점을 해결하기 위해 본 논문에서는 라우팅 프로토콜 기법에서의 접근과 계층적 구조를 적용하고 Backup 시스템을 포함해서 효율적인 그룹관리와 동적인 서버의 지정으로 신뢰성을 유지하기 위한 시스템을 설계하고 구현하였다.

  • PDF

A Study on Efficient Security Technique in Ad Hoc Network (Ad hoc Network에서 효율적인 보안 기법에 관한 연구)

  • Yang, Hwan-Seok;Kim, Jong-Min;Jeong, Jong-Pil;Lee, Woong-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1189-1192
    • /
    • 2004
  • Ad hoc network는 중앙 집중화된 관리나 표준화된 지원 서비스의 도움 없이 임시 망을 구성하는 무선 이동 호스트들의 집합으로서 제한된 무선 채널을 통해 이동 노드간의 통신을 수행하는 멀티 홉(multi-hop) 무선 네트워크이다. 따라서 중앙 집중화된 보안 기반구조가 아니기 때문에 보안 공격을 받기가 쉽게 된다. 기존의 보안 방법중의 하나인 threshold cryptography는 키의 유지와 분배를 위한 효율적인 구조를 제공하였으나 라우팅의 오버헤드가 증가하였고, 네트워크 전역의 트래픽이 증가되었다. 본 논문에서는 threshold cryptography에 의해 야기되는 오버헤드를 줄이고 인증된 패킷 전달을 돕기 위한 새로운 접근 방법을 제안한다.

  • PDF

The Design and Verification of Multicast Key Distribution Protocol for Group Communication (그룹 통신을 위한 멀티캐스트 키 분배 프로토콜 설계 및 검증)

  • 김봉한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.31-42
    • /
    • 2000
  • 특성 사용자 그룹에게만 음성과 영상 데이터를 전송할 수 있는 통신 메커니즘을 가진 멀티캐스트는 유니캐스트와 비교해서 통신 링크의 수가 상당히 많으므로 부당한 공격자로부터 신분위장 서비스 부인 공격과 재전송 공격 부인, 트래픽 관찰 공격을 받기가 쉽다. 그러므로 본논문에서는 현재 멀티캐스트 통신을 위해서 제안 및 사용되고 있는 여러 가지 멀티캐스트 라우팅 프로토콜 중에서 보다 효율적인 보안 체계를 구성할 수 있는 공유 트리를 기반으로 하는 코어 기반 트리(CBT: Core Based Tree)를 이용하여 3개로 구성된 그룹키 KEK TEK을 획득함으로서 안전한 멀티캐스트 통신이 가능한 키 분배 프로토콜을 설계하였다 그리고 패트리넷을 이용하여 안전성을 검증하였다.

Performance Analysis of MANET Routing Protocols with Various Data Traffic (다양한 데이터 트래픽을 갖는 이동 애드혹 네트워크용 라우팅 프로토콜의 성능 분석)

  • Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.2
    • /
    • pp.67-72
    • /
    • 2021
  • MANET(Mobile Ad Hoc Network) is the structure in which a source node communicates with a destination node by establishing a route with neighbor nodes without using the existing wired or wireless network. Therefore, the routing protocol for MANET must correspond well to changes in the channel state of moving nodes, and should have simple operation, high reliability, and no routing loop. In this paper, the simulation was perform by using a traffic model with on/off two states provided by the NS-3 network simulator. Also, the duration of the ON state and the duration of the OFF state used the traffic where inter arrival time of data is irregular by generating random values with constant, exponential distribution, and Pareto distribution. The performance of the DSDV, OLSR, and AODV protocols was compare and analyzed using the generated traffic model.

A Strategy of the Link Saving Routing and Its Characteristics for QoS Aware Energy Saving(QAES) in IP Networks (IP Network에서 QoS Aware Energy Saving(QAES)을 위한 링크 절약 라우팅의 한 방법 및 특성)

  • Han, Chimoon;Kim, Sangchul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.76-87
    • /
    • 2014
  • Today the energy consumption of ICT networks is about 10% of the worldwide power consumption and is predicted to increase remarkably in the near future. For this reason, this paper studies energy saving strategies assuring the network-level QoS. In the strategies, the energy consumption of NIC(network interface card) on both endpoint of links decreases by selecting links and making them sleep when the total traffic volume of the IP network is lower than a threshold. In this paper, we propose a heuristic routing algorithm based on so-called delegating/delegated routers, and evaluate its characteristics using computer simulation considering network-level QoS. The selection of sleep links is determined in terms of the number of traffic paths (called min_used path) or the amount of traffics(called min_used traffic) through those kinks. To our experiment, the min_used traffic method shows a little better energy saving but the increased path length compared to the min_used path method. Those two methods have better energy saving characteristics than the random method. This paper confirms that the delegating/delegated router-based routing algorithm results in energy saving effects and sustains network-level QoS in IP networks.

On Generating Backbone Based on Energy and Connectivity for WSNs (무선 센서네트워크에서 노드의 에너지와 연결성을 고려한 클러스터 기반의 백본 생성 알고리즘)

  • Shin, In-Young;Kim, Moon-Seong;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.41-47
    • /
    • 2009
  • Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless sensor networks. However, the backbone nodes will need extra functionality and therefore consume more energy compared to the other nodes. The power consumption imbalance among sensor nodes may cause a network partition and failures where the transmission from some sensors to the sink node could be blocked. Hence optimal construction of the backbone is one of the pivotal problems in sensor network applications and can drastically affect the network's communication energy dissipation. In this paper a distributed algorithm is proposed to generate backbone trees through robust multi-hop clusters in wireless sensor networks. The main objective is to form a properly designed backbone through multi-hop clusters by considering energy level and degree of each node. Our improved cluster head selection method ensures that energy is consumed evenly among the nodes in the network, thereby increasing the network lifetime. Comprehensive computer simulations have indicated that the newly proposed scheme gives approximately 10.36% and 24.05% improvements in the performances related to the residual energy level and the degree of the cluster heads respectively and also prolongs the network lifetime.

  • PDF

A Congestion Control Scheme for transmittiing Connectionless Data Traffic in ATM Network (ATM망에서 비연결형 데이터 트래픽 전달을 위한 폭주 제어 방안)

  • Park, Chun-Kwan;Jeon, Byung-Chun;Kim, Young-Sun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.10
    • /
    • pp.42-51
    • /
    • 1998
  • This paper suggests a congestion control scheme for CL (ConnectionLess) overlay network using the feedback loops between CL user and CL server, between CL servers, and between end-to-end CL users, and the header translation table of CL server. The CL overlay network for CBDS(Connectionless Broadhand Data Service) defined by ITU-T((International Telecommunication Union-Telecommunication) consists of CL servers which route frames and links which connect between CL user and CL server or between CL servers. In the CL overlay network, two kinds of congestion, CL link congestion and CL server congestion, may occur. We considered the schemes to solve the congestion. link-by-link method[18] has used the ABR feedback loops of ATM layer between CL user and CL server or between CL servers, and the congestion table using header translation table of CL server. As in congestion of output virtual channel this method has an effect on all the traffic transmitting through the link, then it has an effect on the traffic that has not caused the congestion. As a result, the link utilization of output virtual channel that does not bring the congestion and outputs the traffic is decreased. To overcome this drawback of link-by-link, we proposed the hybrid method that are using the ABR feedback loops of link-by-link method, the feedback loop between CL users in end-to-end, the congestion table using and the header translation table. This scheme deals with teh congestion immediately by link-by-link loops and the header translation table, and then regulates the sending rate of CL user that causes the congestion by end-to-end loop.

  • PDF

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

A Geographical Routing Protocol Based on Agent for Wireless Sensor Networks (무선센서네트워크에서 에이전트 기반의 지리정보 라우팅 프로토콜)

  • Dong, Lihua;Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2143-2149
    • /
    • 2010
  • An agent based geographic routing protocol is proposed to improve the well-known geographic routing protocol-GPSR routing protocol. In the proposed scheme, the agent is selected by sink node which concern about the source node's position as well as agent candidate's state. So packets will first be forwarded to agent and next step is to be forwarded to their final goal- sink node from agent. During the next hop selection process, nodes select their neighbors by considering not only position but also their average available buffer size. This results in efficient selection of next hop node in congestion area, and then increases the successful packet delivery ratio. The simulation is conducted for two scenarios: general number of connections and large number of connections in our map. Results show that new method with agent achieves improved performance in successful packet delivery ratio when compares to GPSR without our scheme.

A Parallel Multiple Hashing Architecture for IP Address Lookup (복수의 해쉬 함수를 이용한 병렬 IP 어드레스 검색 구조)

  • 정여진;이보미;임혜숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.158-166
    • /
    • 2004
  • Address lookup is one of the most essential functions of the Internet routers and a very important feature in evaluating router performance. Due to the facts that the Internet traffic keeps growing and the number of routing table entries is continuously growing, efficient address-lookup mechanism is indispensable. In recent years, various fast address-lookup schemes have been proposed, but most of those schemes are not practical in terms of the memory size required for routing table and the complexity required in table update In this paper, we have proposed a parallel IP address lookup architecture based on multiple hashing. The proposed scheme has advantages in required memory size, the number of memory accesses, and table update. We have evaluated the performance of the proposed scheme through simulation using data from MAE-WEST router. The simulation result shows that the proposed scheme requires a single memory access for the address lookup of each route when 203kbytes of memory and a few-hundred-entry TCAM are used.