• Title/Summary/Keyword: 패킷분석

Search Result 1,698, Processing Time 0.026 seconds

A WDM Based Multichannel All-Optical Ring Network (파장 분할 다중화에 의한 다 채널 광 링 통신망의 성능 분석)

  • 박병석;강철신;신종덕;정제명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.159-169
    • /
    • 1994
  • A multichannel optical slotted ring network is designed using a wavelength division multiplexing(WDM) technique and photonic packet switching devices. The electronics speed bottleneck is removed out of the ring, which allows utilization of the full bandwidth for the optical fiber transmission medium. The ring channel adopts a slotted ring concept with a destination cell remove strategy for the eing access mechanism. The slot size in the ring is selected as the same as that of ATM based cell in order to be used as B-ISDN Access Networks. In this paper, we devised a mathematical method to measure the average transfer delay characteristics of the network. The analytical method turned out to yield accurate results over a broad range of parameters in comparison to simulation results. From the study, we observed the average transfer delay of the network as the network parameters vary.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

A Hierarchical Deficit Round-Robin Packet Scheduling Algorithm for User-Oriented Relative Differentiated Services (사용자 기반 상대적 차별화를 위한 계층적 결손 보완 라운드-로빈 스케줄링 알고리즘)

  • Pyun Kihyun;Lee Jong-Yeol;Cho Sung-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.676-686
    • /
    • 2005
  • The Internet users as well as network providers are eager to have different qualities of service among users beyond the best-effort. In this paper, we propose a scheduling algorithm that provides a differentiated service in the granularity of user sessions. The proposed algorithm is a Hierarchical Deficit Round-Robin (H-DRR) algorithm that is an extension of an existing DRR algorithm. A main advantage is that H-DRR provides service differentiation for throughput-intensive applications such as FTP as well as delay-sensitive applications such as telnet or VoIP without distinguishing the types of applications. The most importance in providing a service differentiation in term of network providers is to have controllability and predictability. We show that H-DRR is superior to DRR in terms of controllability and predictability through both mathematical analysis and simulation experiments. Nevertheless, H-DRR requires O(1) complexity for implementation.

Performance Analysis of the Dynamic Minislot reservation Protocol in Single-hop WDM Networks (단일-홉 파장분할 다중화 통신망에서 동적 미니슬롯 예약 프로토콜의 성능분석)

  • Jeong, Kil-Hyun;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.205-215
    • /
    • 2002
  • In this paper the Dynamic Minislot Reservation Protocol(DMRP) in which the control channel is divided into contention-less and contention minislots in order to reduce re-transmission probability in multicasting is proposed. In the network, earth node has two pairs of transceivers. A transceiver consisting of a fixed transmitter and a fixed receiver is used to control packet registration and the other transceiver is used to transmit data. Two types f transceivers for data transmission are considered : one is FT-TR(Fixed Transmitter-Tunable Receiver) and the other is TT-TR(Tunable Transmitter-Tunable Receiver). In the analysis, FT-TR and TT-TR single-hop passive star networks are compared. As results, we conclude that the DMRP protocol with dynamically divided control channel has improved the system performance such as throughput and system delay regardless of traffic type or network structure.

A study on Robust Topology for the Resilient Ontology-based Dynamic Multicast Routing Protocol (노드의 복원력이 있는 온톨로지 기반의 동적 멀티캐스트 라우팅 연구)

  • Kim, Sun-Guk;Doo, Kyung-Min;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.188-194
    • /
    • 2007
  • We propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. We will have developed an algorithm that will design multi-hierarchy Layered networks to simulate a desired system.

  • PDF

Design of Alert Message and Message Segmentation For T-DMB Automatic Emergency Alert Service Standard (지상파 DMB 자동 재난경보방송 표준을 위한 재난 메시지 및 메시지 분할 방법 설계)

  • Choi, Seong-Jong
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.304-312
    • /
    • 2010
  • This paper presents the design of alert message and message segmentation method for the Terrestrial DMB Automatic Emergency Alert Service Standard. This paper begins with the introduction of the standard and some background. The alert message contains the essential information of the alert. Structured information is represented as coded fields and the unstructured as short sentences. Design factors of each field are analyzed first. Next each field’s semantics and syntax are described. The message segmentation method is presented next. The previous study selected FIDC as the message delivery channel. However, in most cases, the size of the alert message exceeds the maximum size of FIG, which is the basic unit packet for the channel. The current T-DMB standard does not support the segmentation method for FIDC. To solve the problem, this paper proposes an elegant segmentation method that garantees reliable, flexible, and fast receiver characteristic. This paper concludes with some additional tasks that should be resolved before the full-time alert service.

Response Methodology against Spoofed IP Attack using Active Networks Mechanism (액티브 네트워크를 이용한 위조 IP 공격 대응 메커니즘)

  • Park, Sang-Hyun;Ko, Haeng-Seok;Kwon, Oh-Seok
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.69-81
    • /
    • 2008
  • It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

A Near Saturation Routing Algorithm for Non-hieratical Networks (비계층적 통신망에서의 근사 포화형 경로설정 알고리즘)

  • 길계태;은종관;박영철;이상철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.11
    • /
    • pp.1037-1053
    • /
    • 1991
  • Flooding is known to be an effective routing mechanism not only in circuit switched networks but also packet switched networks since it minimizes the time required for up calls and does not have to maintain routing tables or distance tables by periodically intercommunicating among all the network nodes. However, one main drawback of it is the overhead on the control message signaling channels, In the paper, we propose an overlaying scheme on the existing mechanism that retains the desired properties of flooding, yet provides congestion control to the network. This is done by utilizing the wasted search messages to inform the network of the conditions of each path from one node to another. The overhead is to maintain a path table in each node. However, this overhead is not so critical. Also, this scheme can take advantages further by limiting the extent of message propagation through the network and by incorporating trunk reservation schemes additionally.

  • PDF

Performance Analysis of the WDM Protocol for the Multicast Traffics (멀티캐스트 트래픽 처리를 위한 WDM 프로토콜의 성능분석)

  • 정길현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.64-74
    • /
    • 2001
  • In this paper, a dynamic minislot reservation protocol(DMRP) is proposed and analyzed to improve the performance of the multicast traffic processing in wavelength division multiplexing(WDM) networks. For the proposed protocol analysis, the WDM network architecture with a passive star coupler is used. One pair of transceiver is used for a control channel and the ocher pair of transceiver with one fixed transmitter and one tunable receiver are used for data transmission. In this protocol. the packets which fail to have successful transmission in the present time slot due to data channel and destination collisions, have priority to have successful reservation in the contention-less minislots of the next time slot. Therefore, protocols have improved the throughput and the system delay performance caused by the reduced probabilities of control channel contentions and destination collisions probability. Today, the efficient protocol that can handle the various types of data traffic is needed. As results, the DMRP is useful to improve the performance of throughput and system delay characteristics regardless of the kinds of traffic.

  • PDF

Energy-Aware Configuration Management with Guaranteed Lifetime of Network in Multi-hop WBAN (무선 신체 망에서 망의 생존시간을 보장하는 에너지 인지 망 구성 관리 기법)

  • Seo, Su-Ho;Nah, Jae-Wook;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.981-987
    • /
    • 2009
  • Recently, the study on wireless body area network for providing ubiquitous healthcare services has been actively done, including the standardization of the IEEE and others. Wireless body area network is usually configured in tree format using multi-hop communication mode due to the power limitation and the characteristics of human body. In this case, differently from existing sensor network, the wireless body area network tends to be disconnected due to the frequent movement of human body. The number of connections which can be supported at each node has some limitations due to the constraint imposed on power consumption. In this paper, we have proposed a heuristic algorithm for optimal selection of parent node with guaranteed QoS for a disconnected node, which considers the priority on packet transmission. Simulation has been performed to evaluate the performance of the proposed algorithm.