• Title/Summary/Keyword: Control packet

Search Result 1,137, Processing Time 0.026 seconds

Contention-based Reservation MAC Protocol for Burst Traffic in Wireless Packet Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.93-97
    • /
    • 2007
  • In this paper, centralized access control and slot allocation algorithm is proposed for wireless networks. The proposed algorithm is characterized by the contention-based reservation. In order to reduce the collision probability of reservation request, the base station calculates and broadcasts the transmission probability of reservation requests, and the wireless terminal transmits its reservation request with the received transmission probability. The scheduler allocates the uplink data slots based on the successful reservation requests. Simulation results show that the proposed algorithms can provide high channel utilization, and furthermore, maintains constant delay performance in the heavy traffic environment.

A Medium Access Control Protocol for Stable Internet Services on IS-2000 Network (IS-2000망에서 안정적 인터넷 서비스를 위한 매체접근제어 프로토콜)

  • 조성현;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.193-196
    • /
    • 2000
  • A new medium access control protocol is proposed to support stable wireless Internet services. Using the characteristics of the uplink Internet traffic and a Voice-Packet multi-session mode, the proposed protocol transmits the uplink Internet traffic via the voice traffic channel of silent duration in a multi-session mode. Out simulation results show that the proposed protocol guarantees stable wireless Internet services under heavy loads.

  • PDF

The 2-step ARQ Scheme by Adaptive Modulation and Coding in Wireless Communication Channel (이동통신 환경에서 적응 변조 코딩에 따른 2 단계 ARQ 방식)

  • 김동회
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.581-584
    • /
    • 2003
  • 본 논문에서는 링크 상황에 따라서 변복조 방식과 코딩 방식을 달리하는 기술인 AMC(Adaptive Modulation and Coding)기능과 연동하는 2 단계 ARQ(Automatic Repeat Request)방식을 제안하여 한정된 무선채널을 여러 종류의 서비스와 여러 가입자가 동시에 공유하는 경우에 발생되는 QoS(Quality of Service) 문제를 해결하고자 한다. 제안한 2 단계 ARQ 방식은 MAC(Medium Access Control) 계층에 위치하여 상위 계층으로부터 IP(Internet Protocol) packet 를 수신한 후 2 단계의 ARQ 동작을 수행함으로써 물리 채널에서 전송 중에 발생되는 오류 확률을 감소시킨다. 따라서 TCP(Transmission Control Protocol)단에서의 재전송 감소에 의한 향상된 성능도 기대할 수가 있겠다.

  • PDF

Efficient reactive routing protocol in Mobile Ad Hoc Networks based on multi-rate (이동 에드 혹 네트워크에서 다중 전송률 기반의 효율적인 반응적 라우팅 프로토콜)

  • Heo, Eun-Ho;Lee, Jae-Hwoon
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.5-6
    • /
    • 2007
  • Routing protocol based on multi-rate previously Proposed has a advantage that it efficiently uses channel, but it has a disadvantage that it has a overhead that it increases control packets for route set up. Therefore, this paper propose a mechanism that decreases control packet overhead and simulates this mechanism using NS-2.

  • PDF

Software Architecture of Contents-based Control for Co-operative Remote Manipulation of Multi-Robots

  • Thuy, Dinh Trong;Kang, Soon-Ju
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.508-511
    • /
    • 2008
  • In this paper, we propose software architecture for conveying contents-based OpenSound Control (OSC) packet from manipulation user interface to cooperative remote multi-robots. The Flash application is used as a controlling user interface and the physical prototyping of multi-robots were developed using physical prototyping toolkit.

A Study on DDoS Attack Mitigation Technique in MANET (MANET 환경에서 DDoS 공격 완화 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.3-8
    • /
    • 2012
  • MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.

Support the IEEE 1588 Standard in A Heterogeneous Distributed Network Environment PTP for Time Synchronization Algorithms Based Application Framework Development Method (IEEE 1588 표준을 지원하는 이기종 분산 네트워크 환경에서 시간 동기화를 위한 PTP 알고리즘 기반의 어플리케이션 프레임워크 개발 기법)

  • Cho, Kyeong Rae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.67-78
    • /
    • 2013
  • In this paper, We proposed an development method of application framework for using the precision time protocol(PTP) based on physical layer devices to synchronize clocks across a network with IEEE1588 capable devices. The algorithm was not designed as a complete solution across all conditions, but is intended to show the feasibility of such a for the PTP(Precision Time Protocol) based on time synchronization of heterogeneous network between devices that support in IEEE 1588 Standard application framework. With synchronization messages per second, the system was able to accurately synchronize across a single heavily loaded switch. we describes a method of synchronization that provides much more accurate synchronization in systems with larger networks. In this paper, using the IEEE 1588 PTP support for object-oriented modeling techniques through the 'application framework development Development(AFDM)' is proposed. The method described attempts to detect minimum delays, or precision packet probe and packet metrics. The method also takes advantage of the Tablet PC(Primary to Secondary) clock control mechanism to separately control clock rate and time corrections, minimizing overshoot or wild swings in the accuracy of the clock. We verifying the performance of PTP Systems through experiments that proposed method.

Performance Improvement of Packet Loss Concealment Algorithm in G.711 Using Adaptive Signal Scale Estimation (적응적 신호 크기 예측을 이용한 G.711 패킷 손실 은닉 알고리즘의 성능향상)

  • Kim, Tae-Ha;Lee, In-Sung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.5
    • /
    • pp.403-409
    • /
    • 2015
  • In this paper, we propose Packet Loss Concealment (PLC) method using adaptive signal scale estimation for performance improvement of G.711 PLC. The conventional method controls a gain using 20 % attenuation factor when continuous loss occurs. However, this method lead to deterioration because that don't consider the change of signal. So, we propose gain control by adaptive signal scale estimation through before and after frame information using Least Mean Square (LMS) predictor. Performance evaluation of proposed algorithm is presented through Perceptual Evaluation of Speech Quality (PESQ) evaulation.

The Design of a Link Aggregation Equipment Based on Packet Processing with Network Security Capability (네트워크 보안 기능을 갖는 패킷처리 기반의 링크 통합 장비 설계)

  • Shin, Jae-Heung;Kim, Hong-Ryul;Lee, Sang-Ha;Hur, Yong-Min;Lee, Sang-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.3
    • /
    • pp.150-154
    • /
    • 2011
  • The technology to build high speed network using low cost DSL in the areas where the cost to build high speed network is high and the network environment is not very accommodating is important in providing the high speed network that meets the user demand and utilizing the network resources in an efficient way. This study presents development of the link aggregation equipment that performs the access control and firewall functions for packet processing based LAN users. The equipments developed support up to 5 line link aggregation as opposed to current 2 line link aggregation. The equipments also allow the use of high speed network in the areas where the network environment is not very accommodating. Also, the fail-over function is added to each line to provide reliability and the self-security function is enhanced to protect the network from unauthorized use and prevents waste of network resources by authorized users.

Experimentation and Analysis of SCTP Throughput by MuIti-homing (멀티홈잉 기반 SCTP 성능 실험 및 비교 분석)

  • Koh Seok-Joo;Ha Jong-Shik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.235-240
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) provides the multi-homing feature, which allows each SCTP endpoint to use two or more IP addresses for data transmission. In this paper, the SCTP multi-homing feature is experimented and analyzed in terms of throughput over Linux platforms based on the NISTNET network emulator. We perform the experimental analysis of SCTP throughputs by SCTP multi-homing for the various network conditions: different packet loss rates, network bandwidths, and transmission delays. From the experimental results, it is shown that the SCTP multi-homing gives much better throughout gun over the SCTP single-homing case in the networks with a high packet loss rate. In the meantime, the other factors including network bandwidth and transmission delay do not seem to give a significant impact on the performance of the SCTP multi-homing.