• Title/Summary/Keyword: TCP/IP Network

Search Result 505, Processing Time 0.028 seconds

A LAN Protocol Analyzer including Simulation Function for PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 LAN 프로토콜 분석장비)

  • Chung, Joong-Soo;Lee, Jun-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.583-589
    • /
    • 2002
  • The Internet is absolutely contributed to information telecommunication revolution nowadays. Realizing local network at the various type of buildings such as a company and a university, ethernet is used for subnet and FDDI, ATM are used for backbone mainly in order to get internet services. Processing TCP/IP protocol suite and analyzing the protocol exactly is essential to detecting the problem occurring in the network and developing communication equipment. This paper presents implementation of ethernet LAN protocol analyser which monitors and simulates ICP/IP protocol suite carrying the Internet and non-Internet protocol such as Netware and NetBIOS. MS window98 and visual C are used for development environment and application program operates on the NDIS firmware. The performance analysis on the proposed system is carried out as monitoring and simulating the traffic over LAN of a university. In the result of monitoring the system, the processing time of a packet captured over the LAN is about 1.5ms. In case of simulating the system, the processing time to be taken carrying out TCP connection and disconnection once is packet is about 8.6ms. The performance analysis of monitoring and simulation results satisfies with 10 Mbps ethernet LAN environment.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

SHD Digital Cinema Distribution over a Fast Long-Distance Network

  • Takahiro Yamaguchi;Daisuke Shirai;Mitsuru Nomura;Kazuhiro Shirakawa;Tatsuya Fujii;Tetsuro Fujii;Kim, io-Oguchi
    • Journal of Broadcast Engineering
    • /
    • v.9 no.2
    • /
    • pp.119-130
    • /
    • 2004
  • We have developed a prototype super-high-definition (SHD) digital cinema distribution system that can store, transmit, and display eight-million-pixel motion pictures that have the image quality of a 35-mm film movie. The system contains a movie server, a real-time decoder, and an SHB projector. Using a Gigabit Ethernet link and TCP/IP, the server transmits JPEG2000 compressed motion picture data streams to the decoder at transmission speeds as high as 300 Mbps. The received data streams are decompressed by the decoder, and then projected onto a screen via the projector. By using an enlarged TCP window, multiple TCP streams, and a shaping function to control the data transmission quantity, we achieved real-time streaming of SHD movie data at about 300 Mbps between Chicago and Los Angeles, a distance of more than 3000 km. We also improved the decoder performance to show movies with Image qualities of 450 Mbps or higher. Since UDP is more suitable than TCP for fast long-distance streaming, we have developed an SHD digital cinema UDP relay system, in which UDP is used for transmission over a fast long-distance network. By using four pairs of server-side-proxy and decoder-side-proxy, 450-Mbps movie data streams could be transmitted.

Real-time Image Transmission on the Internet Using Wavelet Transform and Neural Network (웨이블릿변환과 신경회로에 의한 칼라 동영상의 실시간 전송)

  • Kim, Jeong-Ha;Kim, Hyeong-Bae;Sin, Cheol-Hong;Lee, Hak-No;Nam, Bu-Hui
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.203-206
    • /
    • 2003
  • In this paper we discuss an algorithm for a real time transmission of moving color images on the TCP/IP network using wavelet transform and neural network. The image frames received from the camera are two-level wavelet-transformed in the server, and are transmitted to the client on the network. Then, the client performs the inverse wavelet-fransform using only the received pieces of each image frame within the prescribed time limit to display the moving images. When the TCP/IP network is busy, only a fraction of each image frame will be delivered. When the line is free, the whole frame of each image will be transferred to the client. The receiver warns the sender of the condition of traffic congestion in the network by sending a special short frame for this specific purpose. The sender can respond to this condition of warning by simply reducing the data rate which is adjusted by a back-propagation neural network. In this way we can send a stream of moving images adaptively adjusting to the network traffic condition.

  • PDF

Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card (TCP 플러딩 공격 방어를 위한 네트워크 인터페이스용 고성능 TCP 프락시 제어 로직 구현)

  • Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.119-129
    • /
    • 2011
  • TCP-related Flooding attacks still dominate Distributed Denial of Service Attack. It is a great challenge to accurately detect the TCP flood attack in hish speed network. In this paper, we propose the NIC_Cookie logic implementation, which is a kind of security offload engine against TCP-related DDoS attacks, on network interface card. NIC_Cookie has robustness against DDoS attack itself and it is independent on server OS and external network configuration. It supports not IP-based response method but packet-level response, therefore it can handle attacks of NAT-based user group. We evaluate that the latency time of NIC_Cookie logics is $7{\times}10^{-6}$ seconds and we show 2Gbps wire-speed performance through a benchmark test.

IEEE 802.15.4 and ZigBee Protocol : ZIGBEE Network Layer Using Ad-hoc On-Demand Distance Vector Routing (IEEE 802.15.4와 ZigBee Protocol : ZIGBEE Network Layer이 사용하는 AODV)

  • Lee Won-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1287-1290
    • /
    • 2006
  • 무선 네트워크의 전송 방식은 유선 네트워크와 다르며, 따라서 유선 네트워크를 기반으로 설계된 인터넷 프로토콜(TCP/IP)은 무선네트워크 환경에서 불안정 하게 작동한다. 본 논문에서는 기존의 유선 인터넷에 맞춰진 전송 프로토콜인 UDP와 TCP를 802.15.4 MAC기반의 ZigBee Protocol 환경에서 사용되는 특성과 AODV 및 확장 프로토콜인 AOMDV를 통해 인터넷에 결합된 네트워크 인터페이스를 가진 노드들의 특성과 관리의 중요함을 확인한다

  • PDF

Performance of PRC Handoff State Machine in Wireless TCP (W-TCP 망에서 PRC 핸드오프 상태 머신의 성능 개선)

  • Suk, Kyung-Hyu;Song, Sun-Hee;Kim, Chul-Young;Kim, Moon-Hwan;Yoon, Chan-Ho;Bae, Chul-Soo;Ra, Sang-dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1565-1568
    • /
    • 2004
  • W-TCP와 무선 이동 네트워크 환경에서 양질의 멀티미디어 서비스를 제공하기 위해서는 트래픽에 대한 QoS가 보장되도록 핸드오프 상태 머신에 대해 연구한다. 기존의 자원 예약 기법은 유선 네트워크를 위해 설계된 것이므로 무선 이동 네트워크에서의 QoS 보장 문제를 해결하지 못하고 빈번한 핸드오프로 인한 전송지연 문제와 MN의 위치 이동을 신속하게 제어 등 고속 페이징의 문제 들이 발생하고 있다. TCP와 셀룰라 IP 간의 상호 운용을 지원하는 기존 기법들은 적은 지역의 마이크로 셀 환경에서 그대로 사용될 경우 한계점을 가지고 있다. 본 논문에서는 무선 마이크로 셀룰러 네트워크에서 QoS를 보장하기 위해 셀룰라 IP을 기반한 W-TCP에 핸드오프 상태 머신을 추가한 W-TCP/PRC 핸드오프 상태 머신을 제안한다. 제안된 상태 머신에 대한 특성을 고찰한 결과 액세스 네트워크 내에서 고속 페이징이 가능하고 트래픽 부하가 개선됨을 보인다.

  • PDF

TCP Performance Enhancement by Implicit Priority Forwarding (IPF) Packet Buffering Scheme for Mobile IP Based Networks

  • Roh, Young-Sup;Hur, Kye-Ong;Eom, Doo-Seop;Lee, Yeon-Woo;Tchah, Kyun-Hyon
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.367-376
    • /
    • 2005
  • The smooth handoff supported by the route optimization extension to the mobile IP standard protocol should support a packet buffering mechanism at the base station (BS), in order to reduce the degradation in TCP performance caused by packet losses within mobile network environments. The purpose of packet buffering at the BS is to recover the packets dropped during intersubnetwork handoff by forwarding the packets buffered at the previous BS to the new BS. However, when the mobile host moves to a congested BS within a new foreign subnetwork, the buffered packets forwarded by the previous BS are likely to be dropped. This subsequently causes global synchronization to occur, resulting in the degradation of the wireless link in the congested BS, due to the increased congestion caused by the forwarded burst packets. Thus, in this paper, we propose an implicit priority forwarding (IPF) packet buffering scheme as a solution to this problem within mobile IP based networks. In the proposed IPF method, the previous BS implicitly marks the priority packets being used for inter-subnetwork handoff. Moreover, the proposed modified random early detection (M-RED) buffer at the new congested BS guarantees some degree of reliability to the priority packets. The simulation results show that the proposed IPF packet buffering scheme increases the wireless link utilization and, thus, it enhances the TCP throughput performance in the context of various intersubnetwork handoff cases.

Development of a Home Gateway na a Management Server for Home Network Environments (홈 네트워크 환경에서 홈 게이트웨이와 관리 서버 개발)

  • Kwon Jinhyuck;Jung Jaeyun;Kim Hagbae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.261-266
    • /
    • 2005
  • This paper proposes two systems. One is a Home Gateway(HG) which efficiently connects and controls digital appliances in the home network environments. The other is a Management Server(MS) that overcomes the physical limitation of the HG. The HG supports networking modules(TCP/IP for Ethernet, ADSL), home networking functions(HomePNA, IEEE1394 PLC) and telecommunication system(PSTN/SLT, VoIP, Video Communication). The HG is expected to be a core device for the integrated digital home environments. The MS is a dedicated server which manages and controls individual HG, home appliances and HA devices implemented at an area.

A Maximum Mechanism of Data Transfer Rate using Parallel Transmission Technology on High Performance Network (고성능 네트워크에서 병렬 전송 기술을 이용한 전송률 극대화 메커니즘)

  • Kim, Young-Shin;Huh, Eui-Nam
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.9
    • /
    • pp.425-434
    • /
    • 2007
  • Even though Internet backbone speeds have increased in the last few years due to projects like Internet 2 and NGI, many high performance distributed applications are able to achieve only a small fraction of the available bandwidth. The cause of such problem is due to a character of TCP/IP. The primary goal of this protocol is reliable data transmission. Therefore high speed data transmission didn't be considered when TCP/IP is designed. Hence several researchers have been studied in order to solve the problem of TCP/IP. One of these research results, parallel transfer technique, solves this problem to use parallel TCP connections on application level. Additionally, this technique is compatibility. Recently, these researchers have been studied a mechanism to decide the number of parallel TCP connections. However, some researchers reported the number of parallel TCP connection base on only empirical results. Although hardware performance of host affects transmission rate, the hardware performance didn't be considered in their works. Hence, we collect all data related to transmission rate, such as hardware state information (cpu utilization, interrupt, context switch). Then, we analyzed collected data. And, we suggest a new mechanism determining number of parallel TCP connections for maximization of performance based on our analysis.