• Title/Summary/Keyword: Protocol Encapsulation

Search Result 29, Processing Time 0.021 seconds

Route Optimization Scheme in Nested NEMO Environment based on Prefix Delegation (프리픽스 할당에 기반한 중첩된 NEMO 환경에서의 경로최적화 기법)

  • Rho, Kyung-Taeg;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.95-103
    • /
    • 2008
  • The Network Mobility (NEMO) basic support protocol extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol is not efficient to offer delays in data delivery and higher overheads in the case of nested mobile networks because it uses fairly sub-optimal routing and multiple encapsulation of data packets. In this paper, our scheme combining Hierarchical Mobile IPv6 (HMIPv6) functionality and Hierarchical Prefix Delegation (HPD) protocol for IPv6, which provide more effective route optimization and reduce packet header overhead and the burden of location registration for handoff. The scheme also uses hierarchical mobile network prefix (HMNP) assignment and tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility and intra-domain data communication. The performance is evaluated using NS-2.

  • PDF

ARARO: Aggregate Router-Assisted Route Optimization for Mobile Network Support

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.11 no.4
    • /
    • pp.9-17
    • /
    • 2007
  • Network Mobility basic support protocol (NEMO Basic) extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol uses a mobile router (MR) in the mobile network to perform prefix scope binding updates with its home agent (HA) to establish a bi-directional tunnel between the HA and MR. This solution reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the MR. However, delays in data delivery and higher overheads are likely to occur because of sub-optimal routing and multiple encapsulation of data packets. To manage the mobility of the mobile network, it is important to minimize packet overhead, to optimize routing, and to reduce the volume of handoff signals over the nested mobile network. This paper proposes en aggregate router-assisted route optimization (ARARO) scheme for nested mobile networks support which introduces a local anchor router in order to localize handoff and to optimize routing. With ARARO, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to aggregate router (AGR) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new architecture and mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead. To evaluate the scheme, we present the results of simulation.

  • PDF

Implementation of IPSec Cryptographic Processor Based AMBA Architecture (AMBA(Advanced Microcontroller Bus Architecture) 기반의 IPSec 암호 프로세서의 구현)

  • Hwang, Jae-Jin;Choi, Myung-Ryul
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.123-125
    • /
    • 2004
  • The importance for Internet security has being increased and the Internet Protocol Security (IPSec) standard, which incorporates cryptographic algorithms, has been developed as one solution to this problem. IPSec provides security services in IP-Layer using IP Authentication Header (AH) and IP Encapsulation Security Payload (ESP). In this paper, we propose IPSec cryptographic processor design based AMBA architecture. Our design which is comprised Rijndael cryptographic algorithm and HAMC-SHA-1 authentication algorithm supports the cryptographic requirements of IP AH, IP ESP, and any combination of these two protocols. Also, our IPSec cryptographic processor operates as AMBA AHB Slave. We designed IPSec cryptographic processor using Xilinx ISE 5.2i and VHDL, and implemented our design using Xilinx's FPGA Vertex XCV600E.

  • PDF

Implementation and Analysis of Tunneling Method for Mobile Service (이동 서비스를 위한 터널링 기법의 구현과 성능분석)

  • 천정훈;정진우강현국
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

Support of IPv4 Service using the DSTM in IPv6 Netwroks (IPv6망에서 DSTM을 이용한 IPv4 서비스 제공방안)

  • 이승민;민상원;이숙영;신명기;김용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.535-537
    • /
    • 2001
  • IPv6 초기 도입단계에서는 IPv4와 IPv6 (Internet protocol version 6)의 혼용이 예상됨에 따라 초기 IPv6 네트워크는 기존 IPv4와의 연동 및 호환을 위해 트랜지션 (transition) 메커니즘과 상호공존 (coexistence mechanism) 메커니즘을 필요로 한다. 이를 위해 다양한 트랜지션 메커니즘들이 제안되고 있는데 크게 터널링 (tunneling)과 변환 (translation) 방식으로 구분할 수 있다. 본 논문은 이러한 메커니즘 중에서 터널링을 이용한 DSTM (dual stack transition mechanism)을 분석한 후 제안된 DSTM의 각 연결별 임시 IPv4 주소할당에 대한 비합리적인 문제점을 개선한 모델을 제시하였다. 본 논문예서 제안한 모델은 기존의 NAT (network address translation) 방식과 유사하게 단일 IPv4 주소와 포트 넘버를 이용하여 각 연결을 식별할 수 있도록 한다. 그리고 DSTM 시스템 구현을 위한 효율적인 알고리즘 설계를 통해 IPv4 패킷을 IPv6 패킷으로 캡슐화 (encapsulation)하여 전송할 수 있는 인터페이스를 구현하여 결과를 분석하였다.

  • PDF

Research of Media-independent Error Correction Scheme (Media-independent Error Correction Scheme에 관한 연구)

  • 박덕근;박원배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.454-456
    • /
    • 2000
  • 실시간의 특성을 가지는 데이터의 경우 네트워크상에서 분실된 패킷을 복구시키기 위해서 FEC 방법을 사용한다. FEC는 최소한의 지연만으로 손실 패킷의 복구를 효율적으로 할 수 있는 장점을 가지고 있으나 네트워크상에서의 패킷 손실 특성에 많이 의존되는 경향이 있다. ITU-T의 Study Group 16 에서의 Real-Time Transport Protocol(RTP)를 사용하여 네트워크에서 분실된 패킷을 복원시키는 방법으로 Media-independent error-correction scheme을 정하였다. 이 Scheme에 의해 만들어진 error-correction을 위한 신호화 media bitstream은 UDP 에 의해 encapsulation될 RTP에 실리게 된다. Scheme은 real-time이라는 환경에 유리하도록 bandwidth 와 latency 그리고 cost를 최소화하려고 했으며 이에 따라 네 가지 scheme을 정하였다. 네 가지의 Scheme은 오버헤드와 지연시간이 크기가 차별화를 두어 네트워크 환경의 변화에 적응하도록 하였다. 그러나 네트워크 환경에 보다 더 탄력적이며 효율적으로 적응하기 위해서 또 하나의 scheme을 제안한다. 새로 고안한 이 다섯 번째 scheme은 scheme 3 에 비해 작은 latency를 가지고 장점이 있는 반면 연속적으로 분실된 패킷에 대한 복원확률이 다소 떨어진다. 하지만 scheme 1과 2에 비해서는 연속적인 패킷 분실의 복원확률이 높아 네트워크환경에 따라 scheme 4를 사용하면 네 개의 scheme을 사용하여 분실패킷의 복원을 하는 경우보다 보다 효율적인 전송과 복원이 이루어질 것이다.

  • PDF

Design and Implementation of Mobility Support System for Bluetooth and IEEE 802.11 (무선 LAN과 블루투스 네트워크에서 블루투스 단말의 이동성 지원)

  • Kang, Byoung-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.301-307
    • /
    • 2008
  • 모바일 기기가 무선 LAN, 블루투스 등을 지원하면서 언제 어디서나 다양한 네트워크와의 접속은 물론 끊김이 없는 서비스를 요구한다. 이에 사용자의 이동과 물리적 환경의 변화에도 네트워크 접속을 유지할 수 있는 통신 메카니즘과 모바일 장치의 이동성 관리가 중요하다. 본 논문에서는 Personal Area Networking Profile의 BNEP (Bluetooth Networking Encapsulation Protocol)를 사용하여 BAP(블루투스 AP)와 모바일 기기의 LAN 접속은 물론, 이종 네트워크 환경에서 사용자 이동에도 끊김 없는 서비스가 가능하게 하여 블루투스 단말의 인터넷 접근과 IP 이동성을 효율적으로 지원한다. 테스트베드를 구축하여, USB 타입의 블루투스 Dongle을 이용한 AP를 구현하고 이종 네트워크 접속 가능과 네트워크 상황에 따른 이종 네트워크 장치의 적절한 사용을 확인하였다. 이종 네트워크의 핸드오버에 필요한 설정을 미리 실행하여 핸드오버에 발생하는 지연시간과 패킷 손실을 확연히 줄였다.

  • PDF

Data Interworking Model Between DLMS and LwM2M Protocol (DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구)

  • Myoung, Nogil;Park, Myunghye;Kim, Younghyun;Kang, Donghoon;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2020
  • Despite the same system architecture and operation principle, Advanced Metering Infrastructure (AMI) and Internet of Things (IoT) are recognized as a heterogeneous system. This is due to the different object modeling and communication protocols used in smart meters and sensors. However, data interworking between AMI and IoT is expected to be inevitable in the future. In this paper, we propose Device Language Message Specification (DLMS) to Lightweight Machine to Machine (LwM2M) conversion model. The proposed interworking model can reduce the packet size by 46.5% compared to that of the encapsulation method.

The Design and Implementation of WiMedia Bridge for Scale-free uPAN System (Scale-free uPAN 시스템을 위한 효율적인 WiMedia Bridge의 설계 및 구현)

  • Ahn, Jae-Hoon;Kook, Joong-Jin;Lee, Jang-Yeon;Kwon, Tai-Gil;Hong, Ji-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.21-27
    • /
    • 2008
  • Ubiquitous environments make it possible to connect people and objects together seamlessly using networking technology. To realize ubiquitous environments many kinds of devices should follow the exact protocol. To observe protocol and prepare the increasing network traffic are very difficult in the aspects of maintenance, so the new efficient technology is required. Wimedia technology is a prominent ubiquitous technology which can make connection with many devices. This paper propose a energy efficient method for Wimedia bridge implementation which is a part of scale-free uPAN systems. The proposed method can reduce network expenses which is generated by protocol requirements by adding efficient packet encapsulation and bridging technology. It can be proved to be more time and energy efficient by simulations.

  • PDF

Implementation of an Ethernet Adapter for the G-PON TC Layer (G-PON TC 계층을 위한 이더넷 정합기의 구현)

  • Chung, Hae;Ahn, Eu-Kwang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.429-436
    • /
    • 2011
  • The G-PON is an efficient solution to implement the FTTH and have GEM frame to accomodate various protocols like Ethernet frames, IP packets, and TDM signals. Above all, the Ethernet is one of the most widely used 2nd layer protocol in the campus, the subscriber access, and the carrier service. So G-PON system has to provide an Ethernet interface with top priority. In this paper, we implement a gigabit Ethernet adapter based on Ethernet over GEM in the ITU-T G.984.3 to accommodate Ethernet protocol in the G-PON TC chip. The adapter maps each Ethernet frame to a single or multiple GEM frames and has several functions including generation of the GEM header, encapsulation of frames and the SAR. In particular, the adapter have converter (LUT) MAC address to port-ID which is a key to identify logical connections though it is not defined in specification but important. We implement the adapter with a FPGA and verify the functions of segmentation and reassembling, MAC address learning, and throughput with the logic analyzer and the Ethernet analyzer.