• Title/Summary/Keyword: Control packet

Search Result 1,137, Processing Time 0.024 seconds

Improving Loss Recovery Performance of TCP SACK by Retransmission Loss Recovery (재전송 손실 복구를 통한 TCP SACK의 성능 향상 모델링 및 분석)

  • 김범준;김동민;이재용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.667-674
    • /
    • 2004
  • The performance of transmission control protocol (TCP) is largely dependent upon its loss recovery. Therefore, it is a very important issue whether the packet losses may be recovered without retransmission timeout (RTO) or not. Although TCP SACK can recover multiple packet losses in a window, it cannot avoid RTO if a retransmitted packet is lost again. In order to alleviate this problem, we propose a simple change to TCP SACK, which is called TCP SACK+ in simple. We use a stochastic model to evaluate the performance of TCP SACK+, and compare it with TCP SACK. Numerical results evaluated by simulations show that SACK+ can improve the loss recovery of TCP SACK significantly in presence of random losses.

A study of STB software development for streaming synchronized data processing (스트리밍 동기화 데이터 처리를 위한 단말 소프트웨어 개발에 관한 연구)

  • 신중목;유지상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6A
    • /
    • pp.690-696
    • /
    • 2004
  • Advanced Television Systems Committee (ATSC) -A/90, which is a standard for terrestrial data transmission in Korea, defines synchronized data that has a strong timing association with a separate Program Element. It is classified as synchronized streaming data that is carried in packetized elementary stream (PES) packets or a synchronized non-streaming data that shall be carried in digital storage media command and control (DSM-CC) section. In this paper, we study the design and verification of synchronized streaming data processing algorithm based on ATSC -A/90. We designed a parser and a player for the algorithm development. The received PES packet including synchronized streaming data is parsed in the parser. The parsed synchronized streaming data is synchronized and displayed by player. Finally, we ascertained that STB was working properly with MPEG-2 transport stream (TS) containing synchronized streaming data, as the proposed algorithm is implemented on a set-top box.

A Packet Control method of Interconnection between IBM NP4GS3 DASL and CSIX Interface (IBM NP4GS3 DASL인터페이스와 CSIX-Ll인터페이스의 연동구조 및 패킷 제어방안)

  • 김광옥;최창식;박완기;최병철;곽동용
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.10-21
    • /
    • 2003
  • Recently, the optical subscriber interface module uses the high performance network processor to quickly develop new application services such as MPLS, VPN, RPR and EPON with a short time-to-market. Although a number of vendors are developing the network processor at 2.5Gbps, only the IBM NP4GS3 can provide packet processing with wire-speed at 2.5Gbps. IBM NP4GS3, however, uses its unique speed DASL interface instead of CSIX-Ll interface, which has standardized by M: Forum currently Therefore, we implement an interconnection mechanism to use the switch fabric with CSIX-Ll interface. In this paper, we suggest the architecture and a packet control mechanism supporting interconnection between IBM NP4GS3 DASL and CSIX-Ll switch interface using the common IBM UDASL ASIC and XILINX FPGA.

Design of MAC Protocol to Guarantee QoS for Multimedia Traffic in a Slotted CDMA System (Slotted CDMA 환경에서 멀티미디어 트래픽의 QoS 보장을 위한 MAC 프로토콜)

  • 동정식;이형우;조충호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.707-715
    • /
    • 2003
  • In this paper, we propose a new MAC(Medium Access Control) protocol using Movable-boundary, which tries to guarantee Qos for multimedia traffic in the slotted CDMA system. In this scheme, the traffic scheduler assigns channel resource according to the packet priority per service class and adapts the Movable-boundary concept in which the minimum resource is assigned to each traffic class; the remaining resource if it is available can be assigned dynamically according to the temporal demand of other traffic classes. For performance analysis, we performed computer simulations to obtain throughput and packet loss rate and compared the results with Fixed-boundary system. We observed that the error rate of voice traffic could be maintained below a prescribed value while bursty traffic such as video source shares the same channel. In comparison with Fixed-boundary scheme, our protocol exhibits better throughput and packet loss rate performance.

A New Active RED Algorithm for Congestion Control in IP Networks (IP 네트워크에서 혼잡제어를 위한 새로운 Active RED 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.437-446
    • /
    • 2002
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF (Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED (Random Early Detection). While active queue management in routers and gateways can potentially reduce packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use static parameter setting. So, in case where these parameters do not match the requirement of the network load, the performance of these algorithms can approach that of a traditional Drop-tail. In this paper, in order to solve this problem, a new active queue management algorithm called ARED (Active RED) is proposed. ARED computes the parameter based on our heuristic method. This algorithm can effectively reduce packet loss while maintaining high link utilizations.

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.

Multi-channel MAC Protocol for Improving Channel Efficiency in Wireless Networks (무선 네트워크에서 채널 효율성을 높이기 위한 멀티채널 MAC 프로토콜)

  • Kim, Young-Kyoung;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.549-560
    • /
    • 2008
  • In this paper, we propose a new multi-channel MAC protocol to improve the channel efficiency by using two interfaces. Most of previous researches that have considered multi-channel wireless network environments use a common control channel to exchange control signals and they have a bottle neck problem at common control channel as increasing the number of data channels. In the proposed MAC protocol, we separate receiving and transmitting channels so that sending and receiving data and control packets at the same time is possible. It increases the total network throughput. Since there is no common control channel, the network does not suffer from the bottle neck problem. By applying a TDMA scheme, we can avoid packet collisions between data packets and control packets and reduce the possibility of CTS or ACK packet collisions. Simulation results show that the proposed multi-channel MAC protocol improves the total network throughput and channel efficiency compared with the existing method.

Adaptive Congestion Control for Effective Data Transmission in Wireless Sensor Networks (센서네트워크에서의 효율적인 데이터 전송을 위한 적응적 혼잡 제어)

  • Lee, Joa-Hyoung;Gim, Dong-Gug;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.237-244
    • /
    • 2009
  • The congestion in wireless sensor network increases the ratio of data loss and causes the delay of data. The existing congestion protocols for wireless sensor network reduces the amount of transmission by control the sampling frequency of the sensor nodes related to the congestion when the congestion has occurred and was detected. However, the control method of sampling frequency is not applicable on the situation which is sensitive to the temporal data loss. In the paper, we propose a new congestion control, ACT - Adaptive Congestion conTrol. The ACT monitors the network traffic with the queue usage and detects the congestion based on the multi level threshold of queue usage. Given network congestion, the ACT increases the efficiency of network by adaptive flow control method which adjusts the frequency of packet transmission and guarantees the fairness of packet transmission between nodes. Furthermore, ACT increases the quality of data by using the variable compression method. Through experiment, we show that ACT increases the network efficiency and guarantees the fairness to sensor nodes compared with existing method.