• Title/Summary/Keyword: TCP/IP Network

Search Result 505, Processing Time 0.025 seconds

Consideration of PO Simulator Implementation using Multi Thread (멀티스레드를 이용한 PO법 시뮬레이터 구현 방안)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.63-65
    • /
    • 2011
  • Current general-purpose electromagnetic field simulator has been widespread and is being used to antenna design, EMC design, measurement, and microwave device design, etc. This paper is to solve various electromagnetic problems of X-band region for the purpose multi-core-based PC utilizing network resources more efficiently, and then the electromagnetic field simulator based on TCP / IP-based network topology, configuration, and its framework design is proposed.

  • PDF

Internet Protocols Over ABR and UBR Services: Problems, Approaches, and Their Evaluation (ABR과 UBR 서비스 상에서 인터넷 프로토콜: 문제점, 해결방안, 그리고 성능평가)

  • Park, Seung-Seop;Yuk, Dong-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3260-3268
    • /
    • 1999
  • As the proliferation of multimedia traffic over High-speed Internet increases, ATM network will be vital to adopt as backbone network over various parts of Internet. In this paper, we investigate the performance of TCP/IP traffic flow over ABR and UBR of ATM service to study for the high throughput and good fairness by simulation technique. Although TCP is run in the transport layer, it is controlled by several methods, e.g, EPD, PPD, RED, EFCI, ER etc, in ATM layer when TCP uses the ABR/UBR service. Therefore, if one cell is discarded in ATM layer, a packet of TCp will be laost. And, also, along with the increasing of the number of VC among switches, the throughput and fairness will be degraded. In order to improve these degradations, we propose the effective parameter control operations of EFCI and ER on ABR service, and also suggest the buffer management methods on UBR service. Finally, through the simulation results, the improved throughput and fairness are shown.

  • PDF

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

Design and implementation of high speed Linux network protocol using network processor (네트워크 프로세서를 활용한 리눅스용 고속 네트워크 프로토콜 설계 및 구현)

  • 김주홍;조혜영;성종우;정성인;김대영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.628-630
    • /
    • 2002
  • 기가급 이상의 고속 인터넷 접속이 필수적인 고성능 리눅스 서버 시스템에 사용되는 네트워크 프로토콜의 성능향상을 위하여, 기존의 소프트웨어 성능향상 기술과 고속 패킷 처리 전용의 네트워크 프로세서를 활용하여 고속 네트워크 프로토콜을 설계 및 구현하였다. 네트워크 정합 장치로는 인텔의 IXP1200 네트워크 프로세서가 탑재된 네트워크 카드를 사용하였고, 리눅스 커널의 TCP/UDP/IP 네트워크 프로토콜 스택 중 계층 3 IP 프로토콜 이하를 네트워크 프로세서가 처리하게 함으로써 커널의 오버헤드를 줄이고, 고속의 프로토콜 처리가 가능하게 되었다.

  • PDF

NS-2를 이용한 네트워크 시뮬레이션 방법론

  • Park, Seong-Hyeon;Lee, Seung-Hyeong
    • Information and Communications Magazine
    • /
    • v.24 no.7
    • /
    • pp.79-88
    • /
    • 2007
  • 본고에서는 현재 일반적으로 가장 널리 사용되고 있는 네트워크 시뮬레이터인 NS-2(Network Simulator-2)에 대하여 알아본다. NS-2는 네트워킹의 성능분석을 목적으로 개발된 이벤트 기반(event-driven)의 시뮬레이터이다. 이 시뮬레이터의 적용 범위는 유선 네트워크의 경우 TCP/IP 프로토콜 패밀리와 각종 라우팅 프로토콜에 대한 시뮬레이션이 가능하며, 무선 네트워크에 경우에는 Ad Hoc 네트워크, WLAN, Mobile-IP와 Cellular network 등의 시뮬레이션이 가능하다. GUI가 부족하고 사용이 어렵다는 단점에도 불구하고, 공개된 소스와 두터운 이용자층에 힘입어 널리 사용되는 NS-2의 개요 및 시뮬레이션 방법에 대해 알아보기로 한다.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Integrated Management of OSI network and TCP/IP interned with Delegation and Security Features (위임과 보안 성질을 통한 OSI망과 TCP/IP 인터네트의 통합관리)

  • Kim, Tae-Yeon;Seo, Jae-Hyeon;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.891-902
    • /
    • 1995
  • To integrate both the OSI network and the TCP/IP internet, the application gateway that have the powerful and flexible paradigms has been used, but due to the micro-managements of the gateway produce the high costs and the long delay of communication in the case of emergency. The mechanism that maps the access control policies between two domains using the different security policies is needed. These problems are caused by integrating both domains with the different standards. In this paper, the application gateway that delegating to an agent the powerful and flexible services of the CMIP as well as the management functions were proposed. A proposed algorithm that delegates he management script to an gateway safely by capitalizing on the Diffie-Hellman's distribution method, and presents the security mechanism mediating the security policies for guaranteeing the secure communication between two domains using the different security policies.

  • PDF

A Study on Analysis Characteristic Self-similar for Network Traffic with Multiple Time Scale (다중화된 네트워크 트래픽의 self-similar 특성 분석에 관한 연구)

  • Cho, Hyun-Seob;Han, Gun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3098-3103
    • /
    • 2009
  • In this paper, self-similar characteristics over statistical approaches and real-time Ethernet network traffic measurements are estimated. It is also shown that the self-similar traffic reflects real Ethernet traffic chareacteristics by comparing TCP-MT source model which is exactly self-similar model to the traditional Poisson model.

Efficient Content Delivery Method in Wireless Content-Centric Network (무선 Content-Centric Network에서 효과적인 콘텐츠 전달 방식)

  • Park, Chan-Min;Kim, Byung-Seo
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.13-20
    • /
    • 2017
  • Recently, researches to adopt Content-centric network (CCN), which is one of the promising technologies for replacing TCP/IP-based networks, to wireless networks has actively performed. However, because of erroneous and unreliable channel characteristics, there are many problems to be resolved to adopt CCN to wireless networks. This paper proposes a method to reduce content download time because nodes possess only parts of content chunks. The proposed method enables a node having parts of content chunks to request the rest of parts of content chunks to a provider before a Consumer requests the content. As a consequence, the content download time is reduced.

Real-time Distributed Control in Virtual Device Network with Uncertain Time Delay for Predictive Maintenance (PM) (가상 디바이스 네트워크상에서 불확실한 시간지연을 갖는 실시간 분산제어를 이용한 예지보전에 관한 연구)

  • Kiwon Song;Gi-Heung Choi
    • Journal of the Korean Society of Safety
    • /
    • v.18 no.3
    • /
    • pp.154-160
    • /
    • 2003
  • Uncertain time delay happens when the process reads the sensor data and sends the control input to the plant located at a remote site in distributed control system. As in the case of data network using TCP/IP, VDN that integrates both device network and data network has uncertain time delay. Uncertain time delay can cause degradation in performance and stability of distributed control system based on VDN. This paper first investigates the transmission characteristic of VDN and suggests a control scheme based on the Smith's predictor to minimize the effect of uncertain varying time delay. The validity of the proposed control scheme is demonstrated with real-time velocity control of DC servo motor located in remote site.