• Title/Summary/Keyword: TCP/IP Network

Search Result 506, Processing Time 0.032 seconds

Efficient TCP/IP Transmission Technology in Wireless Sensor Network for ITS Applications (ITS용 무선센서네트워크에서 효율적인 TCP/IP 전송기술)

  • Oh, Jong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.76-81
    • /
    • 2009
  • The transmitting node in WSN for ITS would be small and operated by battery, and the MCU in the node would be low speed with small sized memory and low power consumption. In this paper, the post-checksum method in which the checksum field is added to the tail of the TCP segment for ITS applications, is proposed to reduce data processing time and power consumption, and so there is no limitation of the transmitting data size.

  • PDF

Transmission Characteristics LonWorks/IP-based Virtual Device Network for Predictive Maintenance (예지보전을 위한 LonWorks/IP 가상 디바이스 네트워크의 통신특성에 관한 연구)

  • Choi, Gi-Heung
    • Journal of the Korean Society of Safety
    • /
    • v.17 no.4
    • /
    • pp.196-201
    • /
    • 2002
  • Web-based predictive maintenance (PM) utilizes Virtual Device Network (VDN). VDN inevitably the implementation of Distributed Monitoring and Control Networks (DMCN). In general, one needs to integrate fieldbus protocol and TCP/IP to realize DMCN over IP network or internet, which can be viewed as Virtual Device Network (VDN). Interoperability between devices and equipments is essential to enhance the quality and the performance of predictive maintenance (PM). This paper investigates the transmission characteristics of VDN and suggests a basic framework for web-based PM using DMCN over IP network.

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

Modified BLUE Packet Buffer for Base-Stations in Mobile IP-based Networks

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.530-538
    • /
    • 2011
  • Performance of TCP can be severely degraded in Mobile IP-based wireless networks where packet losses not related to network congestion occur frequently during inter-subnetwork handoffs by user mobility. To solve such a problem in the networks using Mobile IP, the packet buffering method at a base station(BS) recovers those packets dropped during handoff by forwarding the buffered packets at the old BS to the mobile users. But, when the mobile user moves to a congested BS in a new foreign subnetwork, those buffered packets forwarded by the old BS are dropped and TCP transmission performance of a mobile user degrades severely. In this paper, we propose a Modified BLUE(MBLUE) buffer required at a BS to increase TCP throughput in Mobile IP-based networks. When a queue length exceed a threshold and congestion grows, MBLUE increases its packet drop probability. But, when a TCP connection is added at new BS by a handoff, the old BS marks the buffered packets. And new BS receives the marked packets without dropping. Simulation results show that MBLUE buffer reduces congestion during handoffs and increases TCP throughputs.

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

QoS Implementation by using PID Control of TCP Buffer in Data Grid (데이타 그리드상에서 TCP 버퍼의 PID 제어를 통한 QoS 구현)

  • Lee Hong-Seok;Huh Eui-Nam;Choo Hyun-Seung;Cho Kum-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.363-369
    • /
    • 2006
  • It is aware that Bandwidth management with dramatically increasing traffic on account of frequent and large file transmission in a data grid environment is one of essential needs. A this paper we propose new method which guarantees QoS (Quality of Service) by being in control of resources in TCP layer based on existing studies that manage bandwidth over TCP buffer tuning. General QoS solutions manage network resources subsequent to observing them in IP or link layer, but the scheme in the paper is able to control network resources in TCP layer that is network upper layer. Consequently, bandwidth allocation to each user can be efficiently controlled depending on an authority each user is given so that users could be use different bandwidth. It is expected that a new paradigm is supposed in network resource management and the method of levies for users' bandwidth uses.

Approach for OSI Protocol Communication through IP Network (IP 네트워크를 이용한 OSI 프로토콜간의 통신 연구)

  • Yang, Ki-Seon;Kim, Sun-Hyoung;Im, Su-Chul;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1619-1622
    • /
    • 2002
  • 인터넷의 급속한 성장으로 현재 통신 네트워크에서는 통신 프로토콜로서 TCP/IP 프로토콜을 주로 사용하고 있다. 그러나 이와는 달리 국내의 TMN(Telecommunication Management Network) 등에서는 ISO(International Organization for Standardization)에서 제안한 OSI(Open System Interconnection) 프로토콜을 통신 프로토콜로서 여전히 사용하고 있다. 대표적 통신 프로토콜인 TCP/IP와 OSI 프로토콜은 특성, 구조 및 제공하는 기능에서 서로 많은 차이점을 가지고 있어 두 프로토콜간의 연동은 쉽지 않다. 본 연구를 통하여 얻고자 하는 목표는 IP 네트워크클 통하여 연결된 OSI 프로토콜 시스템들간의 상호 연동이나. 본 논문에서는 IP 네트워크를 통한 OSI 프로토펄 시스템간의 상호 연동 방안으로, 멀티캐스트 통신을 간편하고 효율적으로 수행하는 CBT(Core Based Trees) 멀티캐스트 라우팅을 이용한 새로운 네트워크 터널 방안을 제안하고자 한다.

  • PDF

A Novel Cost-Effective Firewall Token for Hacking Protection on TCP/IP Based Network (TCP/IP를 이용하는 전산망의 해킹방지를 위한 경제적인 방화벽 토큰 설계 방안)

  • 고재영
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.159-169
    • /
    • 1999
  • Recently a firewall is being employed to protect hacking by controlling the traffics. The security services in the firewall include authentication, access control, confidentiality, integrity, and audit trail. A token is adapted for authentication to the firewall. A token has a small battery within which has restricted power capacity, This paper proposes a novel cost-effective firewall token for hacking protecting on transmission control protocol/internet protocol (TCP/IP) based network. This paper proposes a fast exponentiation method with a sparse prime that take a major operation for a public-key crypto-system and a major power consumption in the token. The proposed method uses much less amount of modular operations in exponentiation that is reduced of battery's capacity or CPU's price in the token.

  • PDF

A Study on MT-Serpent Cryptographic Algorithm Design for the Portable Security System (휴대용 보안시스템에 적합한 MT-Serpent 암호알고리즘 설계에 관한 연구)

  • Lee, Seon-Keun;Jeong, Woo-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.195-201
    • /
    • 2008
  • We proposed that is suitable network environment and wire/wireless communication network, easy of implementation, security level preservation, scalable & reconfigurable to TCP/IP protocol architecture to implement suitable smart card MS-Serpent cryptographic algorithm for smart card by hardware base chip level that software base is not implement. Implemented MT-Serpent cryptosystem have 4,032 in gate counter and 406.2Mbps@2.44MHz in throughput. Implemented MS-Serpent cryptographic algorithm strengthens security vulnerability of TCP/IP protocol to do to rescue characteristic of smart card and though several kind of services are available and keep security about many user in wire/wireless environment, there is important purpose.

  • PDF

Minimizing Machine-to-Machine Data losses on the Offshore Moored Buoy with Software Approach (소프트웨어방식을 이용한 근해 정박 부이의 기계간의 데이터손실의 최소화)

  • Young, Tan She;Park, Soo-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1003-1010
    • /
    • 2013
  • In this paper, TCP/IP based Machine-to-Machine (M2M) communication uses CDMA/GSM network for data communication. This communication method is widely used by offshore moored buoy for data transmission back to the system server. Due to weather and signal coverage, the TCP/IP M2M communication often experiences transmission failure and causing data losses in the server. Data losses are undesired especially for meteorological and oceanographic analysis. This paper discusses a software approach to minimize M2M data losses by handling transmission failure and re-attempt which meant to transmit the data for recovery. This implementation was tested for its performance on a meteorological buoy placed offshore.