• Title/Summary/Keyword: Packet forwarding

Search Result 215, Processing Time 0.025 seconds

Parallel IP Address Lookup using Hashing with Multiple SRAMs (여러 개의 SRAM과 해슁을 이용한 병렬 IP 어드레스 검색에 대한 연구)

  • Seo, Ji-Hyun;Lim, Hye-Sook;Jung, Yeo-Jin;Lee, Seung-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.138-143
    • /
    • 2003
  • One of the important design issues for IP routers responsible for packet forwarding in computer networks is the route-lookup mechanism. For each incoming packet, IP routing requires that a router performs a longest-prefix-match address lookup in order to determine the next hop that the incoming packet should be forwarded to. In this paper, we present a new scheme which applies the hashing function for IP address lookup. In the proposed scheme, the forwarding table is composed of multiple SRAMs, and each SRAM represents an address lookup table in each prefix. Hashing function is applied in order to find out the matching entries from the address lookup tables in parallel, and the entry with the longest prefix match among them is selected. Simulation using the MAE-WEST router example shows that a large routing table with 37000 entries can be compacted to a forwarding table of 300 Kbytes in the proposed scheme. It is also shown that the proposed scheme achieves one route lookup every 1.93 memory accesses in average.

A Routing Independent Selfish Node Management Scheme for Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 라우팅 방식과 무관한 이기적인 노드 관리 방안)

  • Ahn, Sang-Hyun;Yoo, Young-Hwan;Lee, Jae-Woon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.149-155
    • /
    • 2006
  • Existing routing protocols for mobile ad hoc networks (MANETs) have assumed that all nodes voluntarily participate in forwarding others' packets. In the case when a MANET consists of nodes belonging to multiple organizations, mobile nodes may deliberately avoid packet forwarding to save their own energy, resulting in network performance degradation. In this paper, to make nodes volunteer in packet forwarding, a credit payment scheme called Protocol-Independent Fairness Algorithm (PIFA) is proposed. PIFA can be utilized irrespective of the type of basic routing protocols, while previous methods are compatible only with source routing mechanisms like DSR. According to simulation results, we can know that PIFA can prevent network performance degradation by inducing selfish nodes to participate in packet forwarding.

On the Technology for High-speed Router Design (고속 라우터 기술)

  • 주성순
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.105-108
    • /
    • 1999
  • In this paper, we define the high-speed router as a router, which can support aggregated ports over 25Gbps, and provide issues and trends in high-speed router design. We propose design considerations on IP packet forwarding, switching fabric, packet scheduling and buffer management, network resource reservation, and router operation and administration.

  • PDF

A Mechanism for Handling Selfish Nodes using Credit in Sensor Networks (센서 네트워크에서 크레딧을 이용한 이기적인 노드 처리 방안)

  • Choe, Jong-Won;Yoo, Dong-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.120-129
    • /
    • 2008
  • The purpose of sensor network is gathering the information from sensor nodes. If there are selfish node that deliberately avoid packet forwarding to save their own energy, the sensor network has trouble to collect information smoothly. To solve this problem we suggest a mechanism which uses credit payment schema according to the amount of forwarding packets. Sensor nodes use credits to send their own message and they forward packets of other sensor nodes to get credits. To offer authenticity we combined the roles of sink node and server, also we used piggybacking not to send additional report message. The packet trace route is almost fixed because sensor node doesn't have mobility. In this case, it happens that some sensor nodes which don't receive forwarding packets therefore they can't get credit. So, we suggested the way to give more credits to these sensor nodes. Finally, we simulated the suggested mechanism to evaluate performance with ns2(network simulator). As a result, packet transmission rate was kept on a high rate and the number of arrival packets to sink node was increased. Also, we could verify that more sensor nodes live longer due to deceasing the energy consumption of sensor nodes.

The Implementation of Multi-Port UTOPIA Level2 Controller for Interworking ATM Interface Module and MPLS Interface Module (MPLS모듈과 ATM모듈과의 Cell Mode 인터페이스를 위한 Multi-Port지원 UTOPIA-L2 Controller구현)

  • 김광옥;최병철;박완기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1164-1170
    • /
    • 2002
  • In the ACE2000 MPLS system, MPLS Interface Module(MIM) is composed of an ATM Interface Module and a HFMA performing a packet forwarding. In the MIM, the HFMA RSAR receive cells from the Physical layer and reassemble the cells. And the IP Lookup controller perform a packet forwarding after packet classification. Forwarded packet is segmented into cells in the HFMA TSAR and transfer to the ALMA for the transmission to an ATM cell switch. When the MIM make use of an ATM Interface Module, it directly connect the ALMA with a PHY layer using the UTOPIA Level2 interface. Then, an ALMA performs Master Mode. Also, the HFMA TSAR performs the Master Mode in the MIM. Therefore, the UTOPIA-L2 Controller of the Slave Mode require for interfacing between an ALMA and a HFHA TSAR. In this paper, we implement the architecture and cell control mechanism for the UTOPIA-L2 Controller supporting Multi-ports.

Cycling Packet Dropping Mechanism for Assured Forwarding Packets in Internet (인터넷에서 Assured Forwarding 패킷을 위한 사이클링 패킷 폐기 메커니즘)

  • Kim, Su-Yeon;Gang, Hyeon-Guk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.221-226
    • /
    • 2002
  • Cycling Packet Dropping mechanism we proposed in this paper adaptively drops packets, as predicting traffic pattern between each cycle. Therfore the proposed mechanism makes up for the drawback of RIO mechanism and minimizes errors being capable of predicting in Dynamic and Strict Packet Dropping mechanism. And we executed a simulation and analyzed the throughput and packet drop rate based on the Sending Drop Precedence changing dynamically depending on the network traffic. The results show that the proposed mechanism provides better performance on drop precedence levels and stricter drop precedence policy for AF class.

Scalable Packet Classification Algorithm through Mashing (Hashing을 사용한 Scalable Packet Classification 알고리즘 연구)

  • Heo, Jae-Sung;Choi, Lynn
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.113-116
    • /
    • 2002
  • It is required to network to make more intelligent packet processing and forwarding for increasing bandwidth and various services. Classification provides these intelligent to network which is acquired by increasing number of rules in classification rule set. In this Paper, we propose a classification algorithm efficient to scalable rule set ahead as well as Present small rule set. This algorithm has competition to existing methods by performance and advantage that it is mixed with another algorithm because il does not change original shape of rule set.

  • PDF

Digital Signature Model of Sensor Network Using Hash Chain (해쉬체인을 이용한 센서네트워크의 디지털서명 모델)

  • Kim, Young-Soo;Cho, Seon-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2459-2464
    • /
    • 2009
  • In sensor network there are no nodes or servers that are exclusively responsible for packet forwarding and routing. Instead, sensor nodes participating in network communications perform these activities. Thus, they are vulnerable to the alteration and forgery of message in the process of packet forwarding and routing. To solve this problem, a security to ensure authentication and integrity of routing and forwarding messages should be required. To do this, we propose the hash chain-based digital signature model where it takes less time to compute in generating and verifying the digital signature model, unlike he public key-based digital signature model, and verify if this model is proper by comparing computation times between tow models.

Dynamic and Strict Packet Dropping Mechanism for Assured Forwarding Classes (Assured Forwarding 클래스를 위한 동적 엄격 패킷 폐기 메커니즘)

  • Kim, Su-Yeon;Lee, Ho-Gyun;Kim, Cheol-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3251-3259
    • /
    • 1999
  • In this paper, we present a new mechanism applying more strict priority than RIO mechanism proposed as a drop precedence policy of AF classes in differentiated services. In this mechanism, applying strict priority to drop precedence policy, we get better performance on priority level. Simulation results indicate that the proposed mechanism may provide more efficient and more strict priority transmissions as compared to RIO regardless of traffic load.

  • PDF

An Efficient Packet Forwarding Method for Internet an IP-based Wireless Access Network (IP 기반 무선 인터넷 접속망에서의 효율적인 패킷 전달 방법)

  • 노병희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4B
    • /
    • pp.281-290
    • /
    • 2002
  • In this paper, we propose an efficient packet forwarding method for an IP-based wireless Internet access network. Packets are forwarded along with a flow, that is a kind of connection-oriented connection and established before delivering packets. For this purpose, we also propose a flow resolution method and a modified IPv6 header for delivering packet in the wireless Internet access network. In addition, the method to support the mobility of mobile stations is explained, and the implementation issues are discussed. In order to estimate the performance of the proposed method, we analyzed the delay time to deliver packets in the wireless Internet access network. The numerical results show that the proposed method is very efficient, in the view point of delay.