• Title/Summary/Keyword: 패킷분석

Search Result 1,698, Processing Time 0.027 seconds

An E2E Mobility Management and TCP Flow Control Scheme in Vertical Handover Environments (버티컬 핸드오버 환경에서 종단간 이동성 관리 및 TCP 흐름 제어기법)

  • Seo Ki-nam;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.387-395
    • /
    • 2005
  • In this paper, we propose an end-to-end mobility management and TCP flow control scheme which considers different link characteristics for vertical handover environments. The end-to-end mobility management is performed by using SIP protocol. When a mobile node moves to a new network, it informs its movement of the correspondent node by sending SIP INFO message containing a new IP address which will be used in the new network. And then the corresponding node encapsulates all packets with the new IP address and sends them to the mobile node. in general, RTT of WLAN is shorter than RTT of cdma2000. when the MN moves from WLAN network to cdma2000 network, TCP retransmission timeout will be occurred in spite of non congestion situations. Thus, TCP congestion window size will be decreased and TCP throughput will be also decreased. To prevent this phenomenon, we propose a method using probe packets after handover to estimate a link delay of the new network. We also propose a method using bandwidth ratio of each network to update RTT. It is shown through NS-2 simulations that the proposed schemes can have better performance than the previous works.

Enhancing RCC(Recyclable Counter With Confinement) with Cuckoo Hashing (Cuckoo Hashing을 이용한 RCC에 대한 성능향상)

  • Jang, Rhong-ho;Jung, Chang-hun;Kim, Keun-young;Nyang, Dae-hun;Lee, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.663-671
    • /
    • 2016
  • According to rapidly increasing of network traffics, necessity of high-speed router also increased. For various purposes, like traffic statistic and security, traffic measurement function should performed by router. However, because of the nature of high-speed router, memory resource of router was limited. RCC proposed a way to measure traffics with high speed and accuracy. Additional quadratic probing hashing table used for accumulating elephant flows in RCC. However, in our experiment, quadratic probing performed many overheads when allocated small memory space or load factor was high. Especially, quadratic requested many calculations in update and lookup. To face this kind of problem, we use a cuckoo hashing which performed a good performance in update and loop for enhancing the RCC. As results, RCC with cuckoo hashing performed high accuracy and speed even when load factor of memory was high.

Session Management Scheme for Supporting User Mobility in a IP-Based Convergence Network (IP 기반 통합 네트워크에서 사용자 이동성 지원을 위한 세션 관리 방안)

  • Yu, Myoung Ju;Park, Ju Man;Lee, Jong Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.652-662
    • /
    • 2016
  • This paper proposes a user mobility management scheme which supports seamless service even if a user changes his accessing terminal in service in IP-based convergence network. Most of ongoing researches concerning mobility management as well as the existing mobility schemes have been focused to support terminal mobility. It is limited to support a variety of mobility types such as user mobility. The proposed scheme uses the mapping relationship between UID(User Identifier), user specific identifier and TID(Terminal Identifier), specific terminal identifier and forms packet address with user specific permanent 3 layer address for session continuity in case of user mobility. We numerically analyze and compare handover signaling cost between the existing user mobility scheme and the proposed scheme. The result shows that the proposed scheme has lower handover signaling cost than the existing one, [1].

An Inter-Session Opportunistic Network Coding-aware Multipath Routing Protocol (세션간 네트워크 코딩 기회를 인식하는 다중 경로 라우팅 프로토콜)

  • Choi, Tae-Jong;Kang, Kyung-Ran;Cho, Young-Jong;Bang, June-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7B
    • /
    • pp.536-549
    • /
    • 2012
  • An ad hoc network consists of nodes with limited energy. Therefore, the data transmission can fail abruptly due to lack of energy of transmitting node. A previous work PAMP proposed to build multiple low-energy paths to support stable packet delivery exploiting the nodes with low energy. It has energy-reservation scheme and multi-path selection scheme for stationary wireless ad hoc networks. In this paper, we propose an extended version of PAMP by incorporating network coding opportunity in path selection process. The simulation results show that our proposed scheme shows better packet delivery ratio and lower energy consumption compared with PAMP and a legacy energy-aware multipath routing protocol REAR.

A Study on the Possibility of Transforming to Digital Substations using IEC 61850 Field Information Processing Panel of Legacy Substation (기존 변전소의 IEC 61850 기반 현장정보처리반을 이용한 디지털변전소 전환 가능성 검토에 관한 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.129-136
    • /
    • 2018
  • The IEC 61850 communication standard is used worldwide, and within the country the new substation is built as a digital substation based on IEC 61850 from 2013, after field tests and R&D from 2007. Research on the development of digital substation operating system has been conducted mainly in large domestic companies, so the IED power application equipment for LCP are developed. However, there is still a lack of research in the field of systems that can accommodate all the field devices used for legacy substation and new digital substation. In this paper, we developed the 48VDC input modules and the 125VDC output modules which can construct proposed field information processing modules to IEC 61850 based type, and verified the field applicability from the state monitoring and control operation tests by using IEC 61850 client authentication program and Wireshark.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

A Study on the Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Huang, Xiao;Ban, Tae-Hak;Ham, Jong-Wan;Jeong, Sun-Chul;Jung, Heo-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.643-645
    • /
    • 2011
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

  • PDF

A New Multicast Routing Protocol for Multicast Delivery Agent-based Mobile-IPv6 in 3GPP2 IMT-2000 System (3GPP2 IMT-2000 시스템에서 멀티캐스트 전달 대리자 기반의 새로운 Mobile-IPv6 멀티캐스트 라우팅 프로토콜)

  • Park, Byeong-Seob;Kim, Sung-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2002
  • We present a new MDA-based Mobile-IPv6 multicast routing algorithm for wirelese service operators to offer Mobile-IP over IMT-2000 service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 multimedia application services. The extended IMT-2000 system architectures use an PDSNs (i.e. IWFs), and the home network (i.e. Internet) backbone and intermediate network are composed of ATM entities. A key feature of the new protocol is the use of MDA(Multicast Delivery Agent) to reduce delivery path length of the multicast datagram. We show that proposed protocol is efficient in terms of various performance measures such as multicast traffic load, multicast related handoff, and average routing length when we implement it using the Mobile-IPv6. Particularly, the number of tunneling and average routing length of datagram are reduced relatively, the multicast traffic load is also decreased.

An Adaptive FEC Algorithm for Sensor Networks with High Propagation Errors (전파 오류가 높은 센서 네트워크를 위한 적응적 FEC 알고리즘)

  • 안종석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.755-763
    • /
    • 2003
  • To improve performance over noisy wireless channels, mobile wireless networks employ forward error correction(FEC) techniques. The performance of static FEC algorithms, however, degrades by poorly matching the overhead of their correction code to the degree of the fluctuating underlying channel error. This paper proposes an adaptive FEC technique called FECA(FEC-level Adaptation), which dynamically tunes FEC strength to the currently estimated channel error rate at the data link layer. FECA is suitable for wireless networks whose error rate is high and slowly changing compared to the round-trip time between two communicating nodes. One such example network would be a sensor network in which the average bit error rate is higher than $10^{-6}$ and the detected error rate at one time lasts a few hundred milliseconds on average. Our experiments show that FECA performs 15% in simulations with theoretically modeled wireless channels and in trace-driven simulations based on the data collected from real sensor networks better than any other static FEC algorithms.

Performance analysis of ZRP supporting QoS for Mobile Ad hoc networks (MANET에 대해 QoS를 지원하는 ZRP의 성능연구)

  • Kwon, Oh-Seong;Jeong, Eui-Hyun;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3B
    • /
    • pp.224-236
    • /
    • 2003
  • MANET(Mobile Ad hoc networks) is a mobile, multi-hop, and wireless network which is bandwidth constrained, energy constrained, resource constrained, autonomous, and self operating systems with dynamic topology. These constraints make the routing between communicating nodes in ad hoc networks difficult. In this paper we survey several routing protocol for mobile ad hoc networks. Especially, we focus on Zone Routing Protocol, hybrid routing framework suitable for a wide of mobile ad hoc networks and analyze performance of ZRP. In the case of ZRP protocol, it is essential that the use of optimal zone radius for efficient use. Otherwise it was proved through an simulation that performance of whole network is rapidly decrease with greatly increasing overhead of ZRP traffic that need for transmission of packet by IARP or IERP traffic. Also we suggest the process of finding QoS path that use in-band signal for QoS routing in ad hoc network. This method guarantees route that make real time multimedia service for QoS enabled path.