• 제목/요약/키워드: Link-Node

검색결과 623건 처리시간 0.026초

버티컬 핸드오버 환경에서 종단간 이동성 관리 및 TCP 흐름 제어기법 (An E2E Mobility Management and TCP Flow Control Scheme in Vertical Handover Environments)

  • 서기남;임재성
    • 한국통신학회논문지
    • /
    • 제30권6B호
    • /
    • pp.387-395
    • /
    • 2005
  • 본 논문에서는 이종망간의 핸드오버 환경에서 MN가 종단간이동성 관리를 하면서 동시에 네트워크의 링크 특성을 고려하여 TCP 흐름 제어를 할 수 있는 새로운 버티컬 핸드오프 기법을 제안한다. MN가 버티컬 핸드오버를 수행할 때 종단간 이동성 관리를 위해서 SIP INFO 메시지를 이용하여 CN에게 새로운 네트워크에서 사용할 자신의 IP 주소를 전달하게 되면 CN는 IP 인캡슐레이션을 통해 MN에게 데이터 패킷을 전달한다. 만약 MN가 WLAN에서 cdma2000망으로 이동하는 상향 핸드오버가 발생하면 RTT의 차이로 TCP 재전송 타임아웃이 발생하게 된다. 그 결과 TCP 혼잡 윈도우 크기가 1로 감소되어 결국 TCP Throughput이 떨어지게 된다. 본 논문에서는 이러한 현상을 방지하기 위해 CN가 probe packet을 전송하여 RTT를 측정하는 방법과 각 네트워크의 전송대역의 비에 따라 재전송 타이머를 조정하는 두 가지 방법을 제안한다. 제안하는 버티컬 핸드오버 기법의 성능을 NS-2 시뮬레이션을 통해 비교 분석하였다.

노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법 (Dual Process Linear Protection Switching Method Supporting Node Redundancy)

  • 김대업;김병철;이재용
    • 전자공학회논문지
    • /
    • 제53권9호
    • /
    • pp.26-37
    • /
    • 2016
  • 현재 전달망의 핵심기술은 링크 또는 노드 장애가 발생했을 경우에 경로 이중화를 통해 50ms이내에 망을 복구하는 OAM 및 보호절체 기술이다. 개별 통신사업자, 지방/중앙 정부, 중요 기업의 전달 망은 장애에 대한 실시간 망 복구를 위해 보호 서브네트워크를 개별적으로 설정, 관리되고 있다. 그래서 개별 보호 서브네트워크의 종단 노드에 대해 노드 이중화를 적용하여 종단 노드 장애에 대해 대비하는 것이 중요하다. 하지만 MPLS-TP, 캐리어 이더넷과 같은 패킷 전달망에서 선형 보호절체가 적용되는 보호 서브네트워크는 이중 노드 상호 연결 방안이 존재하지 않는다. 비록 이더넷 링 보호절체는 이중 노드 상호 연결방안을 포함하고 있지만 이더넷 링 보호절체의 기술적 특성상 연결 노드에서 장애가 발생하면 전이 트래픽이 급격하게 증가될 수 있다. 본 논문에서는 보호 서브네트워크에서 연결 노드 이중화를 위한 선형 보호절체 적용 방안을 제시한다. 그리고 링크와 상호 연결 노드의 장애에 대한 여러 실험을 통해 제안된 선형 보호와 링 보호 프로세스의 다양한 조합이 어떻게 다중 보호 서브네트워크에서 서비스 트래픽의 복구 탄력성에 영향을 미치는 지를 분석한다.

Security Architecture for T4 Class Common Data Link

  • Lee, Sang-Gon;Lee, Hoon-Jae;Kim, Hyeong-Rag;Ryu, Young-Jae
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.63-72
    • /
    • 2017
  • In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition

  • Li, Li;Jia, Qing-Shan;Guan, Xiaohong;Wang, Hengtao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권5호
    • /
    • pp.1333-1353
    • /
    • 2012
  • The robustness of a network is usually measured by error tolerance and attack vulnerability. Significant research effort has been devoted to determining the network design with optimal robustness. However, little attention has been paid to the problem of how to improve the robustness of existing networks. In this paper, we investigate how to optimize attack tolerance and communication efficiency of an existing network under the limited link addition. A survival fitness metric is defined to measure both the attack tolerance and the communication efficiency of the network. We show that network topology reconfiguration optimization with limited link addition (NTRLA) problem is NP-hard. Two approximate solution methods are developed. First, we present a degree-fitness parameter to guide degree-based link addition method. Second, a preferential configuration node-protecting cycle (PCNC) method is developed to do trade-off between network robustness and efficiency. The performance of PCNC method is demonstrated by numerical experiments.

M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering

  • Hong, Daniel W.;Hong, Choong-Seon;Lee, Gil-Haeng
    • ETRI Journal
    • /
    • 제27권6호
    • /
    • pp.733-746
    • /
    • 2005
  • In the context of multi-protocol label switching (MPLS) traffic engineering, this paper proposes a scalable constraintbased shortest path first (CSPF) routing algorithm with multiple QoS metrics. This algorithm, called the multiple constraint-based shortest path first (M_CSPF) algorithm, provides an optimal route for setting up a label switched path (LSP) that meets bandwidth and end-to-end delay constraints. In order to maximize the LSP accommodation probability, we propose a link weight computation algorithm to assign the link weight while taking into account the future traffic load and link interference and adopting the concept of a critical link from the minimum interference routing algorithm. In addition, we propose a bounded order assignment algorithm (BOAA) that assigns the appropriate order to the node and link, taking into account the delay constraint and hop count. In particular, BOAA is designed to achieve fast LSP route computation by pruning any portion of the network topology that exceeds the end-to-end delay constraint in the process of traversing the network topology. To clarify the M_CSPF and the existing CSPF routing algorithms, this paper evaluates them from the perspectives of network resource utilization efficiency, end-to-end quality, LSP rejection probability, and LSP route computation performance under various network topologies and conditions.

  • PDF

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

3GPP LTE-Advanced 시스템의 Relay 환경에서 효율적인 Serving Cell 선택을 위한 Power Control 기법 (Power Control Scheme for Effective Serving Cell Selection in Relay Environment of 3GPP LTE-Advanced System)

  • 민영일;장준희;최형진
    • 한국통신학회논문지
    • /
    • 제36권3A호
    • /
    • pp.215-222
    • /
    • 2011
  • 본 논문에서는 3GPP (3rd Generation Partnership Project) LTE (Long Term Evolution)-Advanced 시스템의 Relay 환경에서 효율적 serving cell 선택을 위한 power control 기법을 제안한다. Relay를 사용하는 환경에서 UE가 백홀 링크의 채널 상태를 고려하지 못하는 기존의 serving cell 선택 과정은 백홀 링크 (backhaul link)가 좋지 않은 상황에서도 액세스 링크 (access link)가 다이렉트 링크 (direct link)보다 채널 상태가 좋다면 RN (Relay Node)을 serving cell로 선택하여 최대 throughput을 얻을 수 없는 문제점을 갖는다. 또한, 제안된 기존의 해결 기법인 eNB (evolved NodeB)나 RN이 백홀 링크의 채널 정보를 리포팅하는 방식은 추가적인 데이터 전송이 필요하고, UE (User Equipment)가 백홀 링크의 채널 상태까지 고려하여 serving cell을 선택하기 때문에 serving cell 선택 과정의 복잡도가 증가하며, 백홀 링크의 채널 상태가 좋지 않아서 serving cell을 eNB로 선택한 경우에 RN에 의한 강한 간섭의 영향으로 수산 신호가 열화되는 문제점을 가지고 있다. 따라서, 이러한 문제점들을 해결하기 위하여 RN이 백홀 링크의 수신 SINR (Signal to Interference plus Noise Ratio) 에 따라 송신 전력을 조절하는 power control 기법을 제안하며, 다양한 모의실험을 이용한 성능 분석을 통해 제안하는 방식이 3GPP LTE-Advanced 시스템의 Relay 환경에서 매우 유용한 것을 입증하였다.

Simplified Predicate Locking Scheme for Concurrency Control on R-tree

  • Ying Xia;Rim, Kee-Wook;Lee, Jae-Dong;Bae, Hae-Young
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2001년도 봄 학술발표논문집 Vol.28 No.1 (B)
    • /
    • pp.16-18
    • /
    • 2001
  • Despite extensive research on R-trees, most of the proposed schemes have not been integrated into existing DBMS due to the lack of protocol to provide consistency in concurrent environment. R-link tree is an acceptable data structure to deal with this issue., but still not enough. In this paper, we focus on a simplified predicate locking mechanism based on R-link tree for concurrency control and phantom protection. An in-memory operation control list (OCList) used to suspend some conflicting operations is designed here. The main features of this approach are (1) it can be implemented easily and do not need any extra information. (2) Only-one-lock is held when descending R-tree even when node split happens, while lock-coupling scheme is performed when ascending. No deadlocks are possible. (3) Searches and insertions are not unnecessarily restricted. (4) Insert and Delete phantom in R-link tree are avoid through beforehand predication.

  • PDF

Channel Assignment, Link Scheduling, Routing, and Rate Control for Multi-Channel Wireless Mesh Networks with Directional Antennas

  • Roh, Hee-Tae;Lee, Jang-Won
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.884-891
    • /
    • 2016
  • The wireless mesh network (WMN) has attracted significant interests as a broadband wireless network to provide ubiquitous wireless access for broadband services. Especially with incorporating multiple orthogonal channels and multiple directional antennas into the WMN, each node can communicate with its neighbor nodes simultaneously without interference between them. However, as we allow more freedom, we need a more sophisticated algorithm to fully utilize it and developing such an algorithm is not easy in general. In this paper, we study a joint channel assignment, link scheduling, routing, and rate control problem for the WMN with multiple orthogonal channels and multiple directional antennas. This problem is inherently hard to solve, since the problem is formulated as a mixed integer nonlinear problem (MINLP). However, despite of its inherent difficulty, we develop an algorithm to solve the problem by using the generalized Benders decomposition approach [2]. The simulation results show the proposed algorithm provides the optimal solution to maximize the network utility, which is defined as the sum of utilities of all sessions.

Link-Level Performance of Cooperative Multi-Hop Relaying Networks with MDS Codes

  • Sakakibara, Katsumi;Ito, Daichi;Taketsugu, Jumpei
    • Journal of Communications and Networks
    • /
    • 제13권4호
    • /
    • pp.393-399
    • /
    • 2011
  • We evaluate the link-level performance of cooperative multi-hop relaying networks with an maximum distance separable (MDS) code. The effect of the code on the link-level performance at the destination is investigated in terms of the outage probability and the spectral efficiency. Assuming a simple topology, we construct an absorbing Markov chain. Numerical results indicate that significant improvement can be achieved by incorporating an MDS code. MDS codes successfully facilitate recovery of the message block at a relaying node due to powerful error-correcting capability, so that it can reduce the outage probability. Furthermore, we evaluate the average number of hops where the message block can be delivered.