• Title/Summary/Keyword: IP Router

Search Result 211, Processing Time 0.025 seconds

Video Stream broadcast transmission optimization using MPLS Networks (MPLS망을 이용한 Video Stream 방송 전송 최적화 기법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2871-2877
    • /
    • 2014
  • Real-time communication and diversification of multimedia application services using high-capacity data over the Internet demand high speed connection, and real-time and high-speed access internet service such as multimedia make Internet traffic increase rapidly. Meanwhile, QoS (Quality of Service) of internet service is not satisfied. In this situation, ISP (Internet Service Provider) has been required to improve service quality and extend network according to the user's needs. This request includes issue of extending network focused on increasing router and the number of routing table as well as simply extending bandwidth.

Analysis of the Percentage Articulation and Voice Packet Loss over the Internet (인터넷상의 음성 패킷손실과 명료도 분석)

  • 고대식;박준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2090-2095
    • /
    • 1998
  • In this paper, we measured voice packet loss over the Korean Internet and analyzed percentage articulation by variation of the packet loss. To do this, we reviewed real-time transmission service based on RTP/UDP/IP and test method of the transmission quality. and implemented the real-time speech transmission system using GSM and UDP/IP. Monosyllable list has been chosen for the percentage articulation test, each voice packet has been coded and compressed by GSM and it has sequence number to measured packet loss and to recover out-of-order packets. In transmission results using seven router over the Korean Internet, we have show that loss rates reached 1.6% (unload), 22.5%(load) and loss rates after packet recovery by resequencing and FEC are from 9% to 35%. Finally, we have shown that percentage articulations by variation of the network traffic are Table 4.

  • PDF

A Scheduling of Switch Ports for IP Forwarding (IP 포워딩을 위한 스위치 포트 스케쥴링)

  • Lee, Chae-Y.;Lee, Wang-Hwan;Cho, Hee-K.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.2
    • /
    • pp.233-239
    • /
    • 1999
  • With the increase of Internet protocol (IP) packets the performance of routers became an important issue in internetworking. In this paper we examined the matching algorithm in gigabit router which has input queue with virtual output queueing. Port partitioning concept is employed to reduce the computational burden of the scheduler within a switch. The input and output ports are divided into two groups such that the matching algorithm is implemented within each input-output pair group in parallel. The matching is performed by exchanging input and output port groups at every time slot to handle all incoming traffics. Two algorithms, maximal weight matching by port partitioning (MPP) and modified maximal weight matching by port partitioning (MMPP) are presented. MMPP has the lowest delay for every packet arrival rate. The buffer size on a port is approximately 20-60 packets depending on the packet arrival rates. The throughput is illustrated to be linear to the packet arrival rate, which can be achieved under highly efficient matching algorithm.

  • PDF

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

Study on Architecture of ATM LSR Supporting VC Merging and Traffic Engineering over It (VC 머징이 가능한 ATM LSR의 구조 및 트래픽 엔지니어링 연구)

  • Chung, Ho-Yeon;Seo, Jae-Young;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.15 no.2
    • /
    • pp.152-158
    • /
    • 2002
  • The explosive growth of the internet traffic in the last few years has imposed tremendous stress on today's routers, particularly in the core network. Recently, ATM LSRs(Label Switching Router) are potentially capable of providing the highest forwarding capacity in the backbone Internet network. VC merging is a mechanism in an ATM LSR that allows many IP routes to be mapped to the same VC label, and provides a scalable mapping method that can support thousands of destinations. VC merging requires reassembly buffers so that cells belonging to different packets intended for the same destination do not interleave with each other. In this study, we propose an architecture of the ATM LSR which supports VC merging. We propose traffic control scheme called APD(Active Packet Discard) algorithm so that predicts and controls the congestion of the Internet traffic effectively. We study the performance of this algorithm using simulation.

Quality-of-Service Mechanisms for Flow-Based Routers

  • Ko, Nam-Seok;Hong, Sung-Back;Lee, Kyung-Ho;Park, Hong-Shik;Kim, Nam
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.183-193
    • /
    • 2008
  • In this paper, we propose quality of service mechanisms for flow-based routers which have to handle several million flows at wire speed in high-speed networks. Traffic management mechanisms are proposed for guaranteed traffic and non-guaranteed traffic separately, and then the effective harmonization of the two mechanisms is introduced for real networks in which both traffic types are mixed together. A simple non-work-conserving fair queuing algorithm is proposed for guaranteed traffic, and an adaptive flow-based random early drop algorithm is proposed for non-guaranteed traffic. Based on that basic architecture, we propose a dynamic traffic identification method to dynamically prioritize traffic according to the traffic characteristics of applications. In a high-speed router system, the dynamic traffic identification method could be a good alternative to deep packet inspection, which requires handling of the IP packet header and payload. Through numerical analysis, simulation, and a real system experiment, we demonstrate the performance of the proposed mechanisms.

  • PDF

A Study on the Application method of Server Router for Reliable Multicast (신뢰성 있는 멀티캐스트를 위한 서버라우터의 활용 방안에 관한 연구)

  • Choi, Won-Hyuck;Lee, Kwang-Jae;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1483-1486
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The purpose of this dissertation is to find a method to utilize sewer routers to form multicasts that can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM method has been used. Three packets per TCP transmission control window size are used for transport and an ACK is used for flow control. A CBR and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

Design and Analysis of Resource Management Architecture for Network Mobility (네트워크 이동성을 위한 자원 관리 구조의 설계와 분석)

  • 백은경;조호식;최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.628-640
    • /
    • 2004
  • The demand for next generation networks can be condensed into always-best-connected, ubiquitous, mobile, all-lP, and converged networks. IPv6 has been introduced for all-IP ubiquitous communications, and vehicles are coming to represent an important communication platform. In this paper. we propose various resource management schemes for in-vehicle mobile networks, which are adaptive to different hardware configurations. We focus on power and wireless bandwidth since they are critical resources for mobile communications. Based on the mobility characteristics of in-vehicle networks, we propose vehicle-aware power saving schemes. The main idea behind these power saving schemes is to adjust mobile router (MR) advertisement interval and binding lifetime. In addition, according to different wireless environments, we propose adaptive bandwidth management schemes using multihoming: best-connected MR selection based on location, and high-data-rate MR selection based on priority By mathematical analysis, it is shown that our schemes save power prominently for both the dormant nodes and active nodes. In addition, simulation results show that proposed multiple mobile router architecture outperforms previous simple redundant router architecture in preserving session and providing sufficient bandwidth.

A Packet Forwarding Control Scheme for TCP Performance Improvement in Mobile Networks (모바일 네트워크에서 TCP 성능 향상을 위한 패킷 포워딩 제어 방안)

  • Hur, Kyeong;Eom, Doo-Seop;Lee, Seung-Hyun;Tchah, Kyun-Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.353-364
    • /
    • 2002
  • To prevent the performance degradation of TCP due to packet loss in the smooth handoff by the route optimization extension of Mobile If protocol, a buffering of packets at a base station is needed. A buffering of packets at a base station recovers the packets dropped during the handoff by forwarding the buffered packets at the old base station to the mobile user. But, when the mobile user moves to a new foreign network which is connected to a congested router, the buffered packets forwarded by the old base station are dropped and the link utilization performance degraded due to increased congestion by the forwarded packets. In this paper, when the mobile user moves to a new foreign network which is connected to a congested router, Ive propose a packet forwarding control scheme required far the old base station to improve TCP performance in mobile networks. The old base station forwards or discards the buffered packets during handoff by proposed packet forwarding control scheme based on congestion states of RED(Random Early Detection) at the congested router. Simulation results slow that link utilization performance can be improved by applying proposed packet forwarding control scheme.