• Title/Summary/Keyword: Data Link Protocol

Search Result 277, Processing Time 0.027 seconds

A routing protocol based on Context-Awareness for Energy Conserving in MANET

  • Chen, Yun;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.104-108
    • /
    • 2007
  • Ad hoc networks are a type of mobile network that function without any fixed infrastructure. One of the weaknesses of ad hoc network is that a route used between a source and a destination is to break during communication. To solve this problem, one approach consists of selecting routes whose nodes have the most stable link cost. This paper proposes a method for improving the low power distributed MAC. This method is based on the context awareness of the each nodes energy in clustering. We propose to select a new scheme to optimize energy conserving between the clustering nodes in MANET. And this architecture scheme would use context-aware considering the energy related information such as energy, RF strength, relative distances between each node in mobile ad hoc networks. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.

Fast Spectrum Sensing in Radar-Interfered Airborne Cognitive Radio Systems (레이다 신호의 간섭 환경에서 항공 인지무선 시스템의 빠른 스펙트럼 센싱)

  • Kim, Soon-Seob;Choi, Young-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.655-662
    • /
    • 2012
  • In this work, we propose an airborne cognitive radio system that searches a new spectrum band to avoid a communication interruption due to the interference from many radar signals. We develop a method of fast spectrum sensing based on an effective frequency by recognizing the interfering radar as well as geographical information. This effective frequency is calculated by the free-space path loss between a base station and a fighter with the speed parameter. From our analysis, it is verified that the maximum frequency searching time is reduced by half by using our method.

TCP Performance Analysis over Mobile ad-hoc Networks (모바일 ad-hoc 네트워크에서 TCP 성능 분석)

  • Nam, Ho-Seok;Cho, Sol;Lee, Tae-Hoon;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.800-808
    • /
    • 2007
  • With the development of wireless data communication technology, all IP-based network will become compositions of wired and wireless networks. TCP is a connection-oriented, reliable transport protocol and has been used as de facto standard in most wired networks. Because TCP's congestion control algorithm could not distinguish congestion from BER, link failure and frequent route changes, TCP shows a poor performance over mobile ad-hoc networks. In this paper, the theoretical feature of TCP was studied and the performance of TCP over mobile ad-hoc networks was analyzed with ns2.

Enhanced TFRC for High Quality Video Streaming over High Bandwidth Delay Product Networks

  • Lee, Sunghee;Roh, Hyunsuk;Lee, Hyunwoo;Chung, Kwangsue
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.344-354
    • /
    • 2014
  • Transmission control protocol friendly rate control (TFRC) is designed to mainly provide optimal service for unicast applications, such as multimedia streaming in the best-effort Internet environment. However, high bandwidth networks with large delays present an environment where TFRC may have a problem in utilizing the full bandwidth. TFRC inherits the slow-start mechanism of TCP Reno, but this is a time-consuming process that may require many round-trip-times (RTTs), until an appropriate sending rate is reached. Another disadvantage inherited from TCP Reno is the RTT-unfairness problem, which severely affects the performance of long-RTT flows. In this paper, we suggest enhanced TFRC for high quality video streaming over high bandwidth delay product networks. First, we propose a fast startup scheme that increases the data rate more aggressively than the slow-start, while mitigating the overshooting problem. Second, we propose a bandwidth estimation method to achieve more equitable bandwidth allocations among streaming flows that compete for the same narrow link with different RTTs. Finally, we improve the responsiveness of TFRC in the presence of severe congestion. Simulation results have shown that our proposal can achieve a fast startup and provide fairness with competing flows compared to the original TFRC.

Design and Implementation of Fieldbus Data Link Layer Protocol for Intelligent Sensor (지능형 센서용 필드버스 데이터링크계층 프로토콜 설계 및 구현)

  • Kim, Yu-Chul;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.945-947
    • /
    • 1999
  • 첨단의 자동화 시스템을 구축하기 위해서는 각 필드기기에서 생산되는 정보들을 적절한 형태로 가공하여 적시에 필요한 공정으로 제공하여 줄 수 있는 지능형 센서 및 필드기기의 도입이 필요하다. 이러한 필드기기들이 유기적으로 정보를 교환하고 공유하기 위해서는 통신망 시스템을 구축할 필요가 있다. 필드버스는 자동화 및 분산 제어 시스템의 컴퓨터 통신망 계층구조에서 최하위 계층 기기들 간에 실시간 통신을 제공하는 산업용 통신망이다. 본 연구에서는 통신용 프로세서인 Mc68360을 기반으로 하여 필드버스의 일종인 Profibus의 물리계층과 데이터링크계층 프로토콜을 구현하였다. 물리계층은 프로세서의 UART 통신 기능과 RS-485칩을 사용하여 구현하고, 데이터링크계층 프로토콜은 프레임 분석과 송수신, 에러처리, 흐름제어, 매체접속권한 관리 등의 기능을 소프트웨어로 구현하였다. 또한 지능형 센서 본래의 목적중의 하나인 원격관리 기능을 위하여 각 필드기기의 노드 주소, 타이머 값 등의 통신 파라미터를 원격 마스터에서 설정할 수 있도록 관리계층의 기능을 추가하였다. 본 연구에서는 각각 하나의 노드기능을 담당하는 여러 개의 보드들로 구성된 testbed를 구축하고, 다양한 통신환경에서 초기화, 정상, 비정상 상태 등의 동작을 실험하였으며, 이를 통하여 지능형 센서용 필드버스의 데이터링크계층 프로토콜이 정상적으로 동작됨을 확인하였다.

  • PDF

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

A design of HomePNA2.0 PHY. (10Mbps급 HomePNA2.0 PHY. 회로 설계)

  • 박성희;구기종;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1282-1287
    • /
    • 2002
  • In this Paper, we present the design of 10Mbps HomePNA(Home Phoneline Networking Alliance) PHY which is Home Network Technology using phone-line. It is connected with external interface through MII(Media Independent Interface) and AFE(Analog Front End) Interface. 10Mbps HomePNA PHY is composed with Management Block IEEE 802.3 CSMA/CD MAC(Media Access Control) Block Modulator block and Demodulator block. For their verification, we designed a prototype FPGA PCB board using XPC860T made in Motorola. We verified HomePNA frame data transmission using a driver program based Linux kernel. we verified rate negotiation by HomepNA 2.0 Link Layer Protocol.

Design and Implementation of a Bluetooth Encryption Module (블루투스 암호화 모듈의 설계 및 구현)

  • Hwang, Sun-Won;Cho, Sung;An, Jin-Woo;Lee, Sang-Hoon;Shin, We-Jae
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.276-279
    • /
    • 2003
  • 본 논문에서는 블루투스 장비 간 암호화를 위해 사용되는 암호화 모듈의 설계 및 구현에 관한 내용을 다룬다. 암호화 모듈은 기저 대역내에 암호화 키 생성 모듈과 암호화 엔진 모듈로 구성된다. 암호화 키 생성 모듈은 Cylink사에서 제안한 공개 도메인인 SAFER+(Secure And Fast Encryption Routine) 알고리즘을 사용하여 128bit 키를 생성한다. 그 구성은 키 치환을 위한 치환 함수(key-controlled substitution)와 선형 변환을 위한 PHT(Pseudo-Hadamard Transform)와 Armenian Shuffle 변환기로 구성된다. 암호화 엔진 모듈은 전송 패킷내의 페이로드 데이터와 생성된 사이퍼 키 스트림 데이터와 XOR연산을 통하려 암호화를 행하며 그 구성은 LFSR (Linear Feedback Shift Register)와 합 결합기로 구성된다. 이 중 암호화 키 생성 모듈은 LM(Link Manager)의 PDU(Protocol Data Unit) 패킷을 통해 상호 정보가 교환되므로 암호화키를 생성하는데 있어 시간적 제약이 덜 하다. 따라서 본 논문에서는 변형된 SAFER+ 알고리즘 구현하는데 있어 치환 함수의 덧셈과 XOR, 로그, 지수연산을 바이트 단위의 순차 계산을 수행함으로써 소요되는 하드웨어 용량을 줄이도록 설계하였다. 본 논문에서 제시한 모듈은 블루투스 표준안 버전 1.1에 근거하여 구현하였으며 시뮬레이션 및 테스트는 Xilinx FPGA를 이용하여 검증하였다.

  • PDF

A Design of the Structure of Net-Enabled Weapon Model for Scalability of Weapon Model and Modifiability of the Protocol in The Weapon Data Link Simulation (무장데이터링크 시뮬레이션 환경에서 유도탄모델 확장성과 프로토콜 변경용이성을 고려한 네트워크기반 유도탄모델 시뮬레이션 구조 설계)

  • Kim, Sung-Tae;Shim, Jun-Young;Lee, Won-Sik;Wi, Soung-Hyouk;Kim, Ki-Bum
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.697-700
    • /
    • 2019
  • 무장데이터링크 시뮬레이션은 네트워크 기반 유도무기 모델링을 위하여 M&S 기술을 바탕으로 무장데이터링크의 운용성 및 정밀타격 성능을 검증하기 위한 시뮬레이션 소프트웨어다. 네트워크 기반 유도무기 모델은 원격임무통제를 위한 무장데이터링크망과 가상전장을 위한 시뮬레이션망이 연동하는 분산네트워크 환경에서 동작한다. 이때 유도탄모델 인터페이스는 다수의 프로토콜과 종속관계를 갖게 된다. 따라서 프로토콜이 수정될 때마다 유도탄모델 뿐만 아니라, 해당 인터페이스를 사용하는 다른 프로토콜도 수정되어야 한다. 또한 시뮬레이션 특성상 다양한 운용개념이 유도탄모델에 적용될 수 있다. 기존 고정표적 유도탄모델에 임무통제기능을 적용할 경우, 기존 모델이 훼손될 뿐만 아니라 기능 추가 및 삭제가 쉽지 않다는 문제가 있다. 본 논문은 서로 다른 프로토콜을 유도탄모델에 쉽게 적용하고 변경할 수 있는 프로토콜 변경용이성과 기 개발된 고정표적 유도탄모델을 변경하지 않고 무장데이터링크 운용 개념을 적용할 수 있는 유도탄모델 확장성을 위한 구조를 제안한다.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.