• Title/Summary/Keyword: TCP/UDP

Search Result 215, Processing Time 0.026 seconds

Implementation and Performance Analysis of UDP/IP Header Compression (UDP 헤더압축 구현 및 성능분석)

  • 나종민;이종범;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.704-711
    • /
    • 2003
  • Recently, the demands for real-time service and multimedia data are rapidly increasing. There are significant redundancies between header fields both within the same packet header and in consecutive packets belonging to the same packet stream. But there are many overheads in using the current UDP/IP protocol. Header compression is considered to enhance the transmission efficiency for small size of payload. By sending the static field information only once initially and by utilizing dependencies and predictability for other fields, the header size can be significantly reduced for most packets. This work describes an implementation for header compression of the headers of U/UDP protocols to reduce overhead on Ethernet network. Typical UDP/IP Header packets can be compressed down to 7 bytes and the header compression system is designed and implemented on the Linux environment. Using the designed Header compression system between a server and a client have the advantage of effective data throughput in network.

  • PDF

Applying Lightweight DTLS Protocol for Low-energy IoT (저전력 IoT 상에서의 경량 DTLS 프로토콜 적용 방안)

  • Song, Kyoungjin;Kim, Dongho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.972-974
    • /
    • 2016
  • 최근 전 세계적으로 IoT(Internet of Things) 기술이 활발히 연구되고 있다. IoT 환경은 임베디드나 센서 등의 시스템에 적용되는 경우가 많다. 그 특성으로 인해, 적용된 장치들은 경량화되기 때문에 통신을 위한 프로토콜로 UDP 기반 프로토콜을 많이 사용한다. UDP 기반 프로토콜은 TCP 기반 프로토콜보다 보안 기능이 미비하므로 UDP 상에서도 보안 기능을 제공해 줄 수 있는 DTLS(Datagram Transport Layer Security)가 권고된다. 하지만 DTLS는 저전력 IoT 환경을 고려하여 만들어진 프로토콜이 아니다. 그래서 저전력 IoT 환경에서 사용하기에는 힘들다. 하지만 HIGHT(HIGh security and light weigHT) 알고리즘을 사용하면 보안적인 측면을 고려하면서도 DTLS의 알고리즘인 AES(Advanced Encryption Standard)의 높은 에너지 소모량이 해결된다. 본 논문에서는 보안 측면을 고려하면서 에너지 효율까지 고려한 KISA(Korea Internet & Security Agency, 한국인터넷진흥원)의 HIGHT 암호화 알고리즘을 기반으로 DTLS를 경량화하여 저전력 기기에서 적용할 수 있는 방안을 제안한다.

TCP-friendly RTP Rate Control

  • 하상석;정선태
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.255-258
    • /
    • 2003
  • TCP is taking over 95% among the Internet traffics. Recently the demands of multimedia services in the Internet has been increasing. These multimedia services mostly need real-time deliverly, and then RTP has been a de facto to transmission protocol for these real-time multimedia services. RTP uses UDP as its underlying transport protocol, and thus it does not support any rate and congestion control. Thus, for fair use of the Internet bandwidth with TCP traffics. RTP also needs a rate control. One constraint of RTP is that the feedback information(delivered by, RTP's twin protocol, RTCP) is recommended to be sent no less than 5 seconds. In this paper, we propose a TCP-friendly RTP rate control which use only RTCP feedback information at every 5 seconds. The experiment results show that our proposed algorithm works. But, it is found that we need more time to test the effects of parameters and policies of the algorithms, which will be reported later.

  • PDF

Realtime Long-Distance Transmission Method of DGPS Error Correction Signal (DGPS 보정 신호 실시간 장거리 전송 방안)

  • 조익성;임재홍
    • Korean Journal of Remote Sensing
    • /
    • v.17 no.3
    • /
    • pp.243-251
    • /
    • 2001
  • GPS is one of today's most widely used surveying techniques. But, users can't acquire an enough accuracy in applications of the navigation or geodesy by the GPS positioning technique because of the effects of the ionosphere and troposphere. The solution of these restrictions in the DGPS technique that is to eliminate the common errors and can achieve a high accuracy. Although of sufficient density for good DGPS, accuracy of positioning is just not dense enough to provide complete coverage for real-time positioning, because distances between base and rover is short. In this paper, we suggest Realtime Long-Distance Transmission Method of DGPS Error Correction Signal, which consist of TCP, UDP and IP, which allows a user to increase the distance at which the rover receiver is located from the base, due to radio modem.

The Research about a Control Data Duplication Transmission Technique (제어데이터 중복전송기법에 관한 연구)

  • Lee, Young-Ju;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2006
  • The intelligent elder brother groove network robot service the new broadband presence line is conversionce application service. Robot control data transmission hazard UDP packet of the remote control data which stands duplication necessary to transmit. TCP the error ratio to be high qualitative recording transmission pattern it of the transmission unit and is irregular the distance is distant to show and also the transmission lag is visible increases. The recording packet drop whose UDP degree error ratio will be high is frequent and does not arrive packet little by little increases is a possibility of knowing in the transmission unit. The technique which it proposes with traffic pattern of the transmission unit is visible the transfer characteristic of the same shape from 1% packet error ratio degree. The effective transmission technique of the robot control data which puts a base in UDP protocols was proposed from the present paper. Following research it leads and it follows the duplication transmission number of time in error rate of radio link and it was thought all that controls petty the research of the mechanism which progresses is necessary.

  • PDF

Transmission Algorithm with QoS Consideration in Reliable MPEG System (신뢰성있는 MPEG 시스템에서의 QoS를 고려한 전송 알고리즘)

  • Kim, Sang-Hyong;Lee, Sung-In;Yoo, Weon-Kyung;Yoo, Kwan-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.100-108
    • /
    • 2007
  • Currently, multimedia stream services are provided in various network environments such as wireless networks. It is crucial to address QoS problem for multimedia service in heterogeneous networks. This paper suggests the scheme to increase the efficiency for the transmission of multimedia data. We also propose the adaptive algorithm that switch between UDP and TCP based on the size of the transmitted multimedia data. In addition, it presents the method that duplicates the multimedia data for the efficiency of transmission. We designed the MPEG stream service and conducted the simulation to verify our adaptive MPEG stream service.

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.

Performance Improvement of IP Handover by Data Link Trigger (데이터링크 트리거에 의한 IP 핸드오버 성능 개선)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.55-60
    • /
    • 2016
  • In the traditional wireless LAN model, scan procedure to search a new AP starts when the predefined number of Rx failure of beacon frames are occurred. In this case, lots of data packet loss occur during MN's handover because loss of the relatively longer data packet starts before the small-sized beacon loss. Newly developed scanning mechanism in this paper has the beacon counter that increases when the Rx power level of beacon frame is less than the threshold and the previous rx power level. New scan procedure starts when the counter exceeds the predefined number. Beacon Rx power threshold is verified and performance of the new WLAN model is evaluated under UDP and TCP traffic environment.

Design of IPv6 Based Traffic Analysis Tool (IPv6 기반 트래픽 분석 도구 설계)

  • Lee Hong-Kyu;Oh Seung-Hee;Seo Dong-Il;Oh Chang-Suk;Kim Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.115-121
    • /
    • 2005
  • In the present internet environment, various traffic flooding attacks and worm attacks cause economical loss. If IPv4 is substituted by IPv6 because of the lack of IP address, it will be more serious. Therefore, we design and implement the traffic analysis tool which can detect attacks by expecting them encountered in the IPv6 environment. Proposed tool is composed of packet generation module, packet gathering module, discrimination module, and display module in X-windows. As a simulation result, it is proved that it can effectively detect DAD-NA message attack, TCP SYN flooding attack, UDP flooding attack and ICMP flooding attack in the IPv6 environment.

  • PDF

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.