• Title/Summary/Keyword: 패킷분석

Search Result 1,698, Processing Time 0.032 seconds

Performance Evaluation of PEP based TCP Splitting Scheme in Satellite Communication Systems (위성 통신 시스템에서 TCP연결 분할 기반 PEP의 성능 평가)

  • Weldegiorgis, Nathnael Gebregziabhe;Lee, Kyu-Hwan;Kim, Jong-Mu;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.10-17
    • /
    • 2015
  • A satellite communication system is one of viable solutions for Internet applications running in wide areas. However, the performance of TCP can be seriously degraded in the satellite networks due to long round-trip time (RTT) and high bit error rate (BER) over satellite links. Therefore, a performance enhancing proxy(PEP) based TCP splitting connection scheme is used in the satellite link to improve the TCP performance. In this paper, we implement PEP testbed and conduct experiment to evaluate the performance of TCP splitting connection by comparing with high-speed TCP solutions in various environments. In our experimental environment, we consider multiple connections, high packet loss, and limited bandwidth. The experiment results show that PEP improves the TCP throughput than high-speed TCP variants in various environments. However, there is no improvement of the TCP throughput with the limited bandwidth because there is packet loss caused by both the congestion and the channel error.

Research about Benchmark System Design for Efficient Web Server Management (효율적인 웹 서버 관리를 위한 평가시스템 설계에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.1-6
    • /
    • 2007
  • It is important to manage and correctly evaluate the performance of server in order to improve he performance of server. That is, with the aim of finding whether resources are properly utilized, it is a method to improve both software and hardware aspects. Conventional method in evaluating the server performance involved installing software between server and client and generating the load and by simulating the process, it evaluated the handing efficiency of work load generated per packet volume. Therefore, this paper aims to pro-vide precise measurement method by distinguishing the characteristics of web server and the users' usage pattern and by evaluating the work load management through applying various standards. Specially, it presents the evaluation method from web service of personal and business.

  • PDF

A Study on Trace-Back Method of Financial Network Using IP Marking Server (IP 마킹 서버를 활용한 금융 전산망 공격자 역추적 기술 연구)

  • Park, Keunho;Choi, Ken;Shon, TaeShik
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.129-139
    • /
    • 2017
  • With the advent of FinTech, many financial services have become available in the mobile Internet environment and recently, there is an internet bank that provides all bank services online. As the proportion of financial services over the Internet increases, it offers convenience to users, but at the same time, the threat of financial network is increasing. Financial institutions are investing heavily in security systems in case of an intrusion. However attacks by hackers are getting more sophisticated and difficult to cope with. However, applying an IP Trace-back method that can detect the actual location of an attacker to a financial network can prepare for an attacker's arrest and additional attacks. In this paper, we investigate IP Trace-back technology that can detect the actual location of attacker and analyze it to apply it to financial network. And we propose a new IP Trace-back method through Infra-structure construction through simulation experiments.

Performance Analysis of Adaptive Radio Activation in Dual-Radio Aggregation System (이중 무선 인터페이스 결합 시스템을 위한 적응적 인터페이스 활성화 기법의 성능 분석)

  • Mulya Saputra, Yuris;Yun, Ji-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1901-1907
    • /
    • 2015
  • Today's smartphones and user devices are equipped with multiple radio interfaces increasingly. Aggregating theses multiple radio interfaces and using them concurrently will increase a user's communication speed immediately, but at the expense of increased power consumption. In this paper, we develop a mathematical performance model of an adaptive radio activation scheme by which a radio interface is activated only when needed for performance increase and deactivated otherwise. The developed model shows that the adaptive scheme reduces delay significantly and almost halves power consumption below a certain level of traffic input.

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Dynamic slot allocation scheme for rt-VBR services in the wireless ATM networks (무선 ATM망에서 rt-VBR 서비스를 위한 동적 슬롯 할당 기법)

  • Yang, Seong-Ryoung;Lim, In-Taek;Heo, Jeong-Seok
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.543-550
    • /
    • 2002
  • This paper proposes the dynamic slot allocation method for real-time VBR (rt-VBR) services in wireless ATM networks. The proposed method is characterized by a contention-based mechanism of the reservation request, a contention-free polling scheme for transferring the dynamic parameters. The base station scheduler allocates a dynamic parameter minislot to the wireless terminal for transferring the residual lifetime and the number of requesting slots as the dynamic parameters. The scheduling algorithm uses a priority scheme based on the maximum cell transfer delay parameter. Based on the received dynamic parameters, the scheduler allocates the uplink slots to the wireless terminal with the most stringent delay requirement. The simulation results show that the proposed method guarantee the delay constraint of rt-VBR services along with its cell loss rate significantly reduced.

Performance Analysis of Group Scheduling for Core Nodes in Optical Burst Switching Networks (광 버스트 스위칭 네트워크의 코어 노드를 위한 그룹 스케줄링 성능 분석)

  • 신종덕;이재명;김형석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.721-729
    • /
    • 2004
  • In this paper, we applied a group scheduling algorithm to core nodes in an optical burst switching (OBS) network and measured its performance by simulation. For the case of core nodes with multi-channel input/output ports, performance of the group scheduling has been compared to that of the immediate scheduling. Since the group scheduling has a characteristic of scheduling a group of bursts simultaneously in a time window using information collected from corresponding burst header packets arrived earlier to a core node, simulation results show that the group scheduling outperforms the immediate scheduling in terms of both burst loss probability and channel utilization and the difference gets larger as the load increases. Another node configuration in which wavelength converters are equipped at the output ports has also been considered. In this case, even though both performance metrics of the group scheduling are almost the same as those of the immediate scheduling in the offered load range between 0.1 and 0.9, the group scheduling has lower wavelength conversion rate than the immediate scheduling by at least a factor of seven. This fact leads us to the conclusion that the group scheduling makes it possible to implement more economical OBS core nodes.

Implementation of Adaptive MCS in The IEEE 802.11ac/ad Wireless LAN (IEEE 802.11ac/ad 무선 LAN의 적응형 MCS 구현 연구)

  • Lee, Ha-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1613-1621
    • /
    • 2015
  • This paper analyzes the rate adaptation scheme and suggests applicable strategy of the MCS(Modulation and Coding Scheme) for improving DCF throughput in the IEEE 802.11ad and 802.11ad wireless LAN. IEEE 802.11ac and 802.11ad wireless LAN provide MCS technique that dynamically adjusts modulation level and code rate to the time-varying channel conditions in order to obtain considerably high data rates. But these standards did not provide rate adaptation algorithm, so this paper surveyes rate adaptation algorithm and suggests MCS scheme applied to IEEE 802.11ac and 802.11ad wireless LAN. Specially A MAC(Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables.

Selective On-demand Zone Routing Protocol for Large Scale Mobile Ad-hoc Networks (대규모 Ad-hoc 네트워크 환경에서 트래픽 감소를 위한 선택적 on-demand 라우팅 기법에 관한 연구)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.443-452
    • /
    • 2012
  • In Mobile Ad-hoc Networks, previous routing protocols classified into proactive and reactive approach respectively have pros and cons under the use of applications and environment. Moreover, to integrate their advantages in case by case, hybrid approach is consistently researched, and Zone Routing Protocol (ZRP) was motivating many recent hybrid protocols. ZRP uses proactive routing to the node located within the zone defined by the specific number of hops, while it uses reactive routing to other nodes. However, in ZRP, because proactive routing is applied only within the zone defined by the number of hops, the zone is formed regardless of whether real data communication occurred frequently or not. In this paper, we propose a new hybrid routing scheme which employs the zone method but forms customized zone considering traffic load and number of hops, by a new decision method named Dynamic Zone Decision (DZD). Additionally, we analyze the performance of the proposed scheme, comparing with the previous proactive, reactive, and hybrid routings.