• Title/Summary/Keyword: TCP traffic

Search Result 283, Processing Time 0.021 seconds

Traffic Throughput on based Link Available in M-TCP Transfer (M-TCP 전송에서 링크 이용율에 따른 트래픽 처리)

  • Song, Sun-Hee;Suk, Kyung-Hyu;Kim, Kwan-Jun;Kim, Moon-Hwan;Park, Dong-Suk;Bae, Chul-Soo;Ra, Sang-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.599-602
    • /
    • 2005
  • 무선네트워크 TCP는 패킷손실을 혼잡에 의한 것으로 보고 전송률을 감소시키는데, 고대역폭 연결의 효율성을 높이기 위해 M-TCP에서의 링크이용율에 따른 트래픽 처리를 연구한다. M-TCP는 무선네트워크에서 연결 중단이 자주 발생하고 동적으로 변하는 대역폭으로 인한 비트율이 낮은 무선 링크에 효과적인 프로토콜이다. 연견 중단 시 송신노드가 인접한 경우나 멀리 떨어져 있는 경우 유리하며, M-TCP가 링크 계층 솔루션과 함께 사용될 경우 TCP 성능이 향상된다. 본 논문에서는 백그라운드 트래픽 흐름은 그대로 유지하여 M-TCP상에서 연결의 개수를 늘린 후 그 결과 발생하는 대역폭 공유 반응 및 링크 이용율로 M-TCP 연결로부터 생긴 트래픽 처리를 분석한다.

  • PDF

The Performance Improvement for Congestion Control under TCP Traffic in Wireless Network (무선네트워크 전송기반에서 프로토콜에 의한 트래픽 혼잡제어)

  • Ra, Sang-Dong;Kim, Moon-Hwan;Lee, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10A
    • /
    • pp.965-973
    • /
    • 2007
  • We analyzed that the loss of data in TCP protocol based wireless networks caused by overlapped responses in bi-directional nodes that were resulted in out of the data sequence. This loss can be prevented by using revised TCP rate control algorithm and the performance of throughput can also be improved. The rate control algorithm is applied when the congestion happens between nodes while traffic packets are retransmitting in TCP bandwidth. In addition to applying the rate control algorithm, we determine the number of system clients in bandwidth and the average of pausing time between transmitting serial files to produce a competitive level so that an efficient performance of rapid retransmitting for the loss of multi-packets. This paper discusses the improvement of congestion control in that the decrease of the loss, firstly, as ensuring an efficient connection rate and, secondly, as using sliding window flow control.

Direct-Sequence Spread-Spectrum Systems for Interference Signal Control (직접 대역 확산 시스템을 위한 간섭 신호 제어)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1976-1981
    • /
    • 2013
  • In this paper, we propose a frequency-domain interference cancellation algorithm for direct-sequence spread spectrum systems. In the previously proposed frequency-domain interference cancellation algorithms that protocol defines the rules concerning the collection of means of Transmission Control Protocol (TCP: Transmission Control Protocol) is the most widely used in the transport layer. Two-way traffic through the network path to the same end-to-end transfer of data in the opposite direction between pairs of nodes are infused with two or more TCP connection using the network traffic patterns from the exchanger and routers share results of approval. Per-flow input/output structure of matter using the LTS online reaction when evaluated as this is the most important factor. TCP-MT when the connection duration is one of the largest performance gains.

The Study of the Performance Improvement of UDP Packet Loss affected by TCP Flows (TCP Flows의 영향하에서 UDP 패킷손실을 줄이는 방법에 관한 연구)

  • 조기영;문호림;김서균;남지승
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.1061-1064
    • /
    • 1999
  • UDP has likely been used for real-time applications, such as video and audio. UDP supplies minimized transmission delay by omitting the connection setup process, flow control, and retransmission In general, more than 80 percent of the WAN resources are occupied by Transmission Control Protocol(TCP) traffic as opposed to UDP's simplicity, TCP adopts a unique flow control in this paper, I report new methods to minimize a udp packet loss considering TCP flow control on the real-time application the better performance of real time application can be obtained when they reduce a packet size and FIFO buffer scheduling method competing with TCP bandwidth for the bandwidth and buffering.

  • PDF

Efficient TCP Traffic Control Over ATM Networks (ATM에서 TCP의 효율적 동작에 관한 연구)

  • 이재원;윤현수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.05a
    • /
    • pp.77-81
    • /
    • 1998
  • 컴퓨터가 발전해오고 그 활용폭이 넓어지면서 컴퓨터 네트워크의 중요성이 점차 증가하고 있다. 단독으로 실행되는 컴퓨터 그 자체만으로는 활용에 제한이 있다. 다른 컴퓨터들과 유기적으로 연결된 상태에서 데이타의 공유와 작업의 분산을 통해 좀 더 효율적인 작업을 할 수 있는 것이다. 따라서 컴퓨터를 논함에 있어서 네트워크는 결코 빠질 수 없는 존재가 된 것이다. 이에 우리는 차세대 네트워크라 불리우는 ATM network에 대해 알아보고 여기에서의 현안 문제의 하나인 TCP의 동작에 대해 논하기로 한다.

  • PDF

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.

Anomaly Detection Method Using Entropy of Network Traffic Distributions (네트워크 트래픽 분포 엔트로피를 이용한 비정상행위 탐지 방법)

  • Kang Koo-Hong;Oh Jin-Tae;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.283-294
    • /
    • 2006
  • Hostile network traffic is often different from normal traffic in ways that can be distinguished without knowing the exact nature of the attack. In this paper, we propose a new anomaly detection method using inbound network traffic distributions. For this purpose, we first characterize the traffic of a real campus network by the distributions of IP protocols, packet length, destination IP/port addresses, TTL value, TCP SYN packet, and fragment packet. And then we introduce the concept of entropy to transform the obtained baseline traffic distributions into manageable values. Finally, we can detect the anomalies by the difference of entropies between the current and baseline distributions. In particular, we apply the well-known denial-of-service attacks to a real campus network and show the experimental results.

A study on the outbound traffic controller for prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.759-761
    • /
    • 2016
  • ICMP(Internet Control Message Protocol) supports the processing of error in the communication network based TCP/IP. If a problem is occurred in a data transmission process, router or receiving host sends ICMP message containing the error cause to sending host. However, in this process an attacker sends a fake ICMP message to the host so that the communication between the hosts can be abnormally terminated. In this paper, we performed a study to prevent several attacks related to ICMP. To this, we have designed outbound traffic controller so that attack packet is not transmitted to network in operating system of host.

  • PDF

A buffer management scheme of GFR Service for fairness improvement of TCP/IP traffic (TCP/IP 트래픽의 공평성 향상을 위한 GFR 서비스의 버퍼관리 기법)

  • Kwak, Hyun-Min;Kim, Nam-Hee;Lee, Sang-Tae;Chon, Byong-Sil
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.595-602
    • /
    • 2003
  • In this paper, we proposed new buffer management and cell scheduling scheme of GFR service for improving fairness of TCP/IP traffic in ATM networks. The proposed algorithm used untagged cell, which came to ATM switch, to decide the policy for discard of frame and what kind of VC cell it would serve. Performance analysis through the simulation present that proposed scheme can meet fairness 2 (MCR Plus equal share), which are not met by conventional scheduling mechanism such as WRR. Also, proposed scheme is superior to WRR about 30% in throughput and more efficiency in fairness criteria.

Analysis of Traffic Control System for Supporting MCS Multicasting on ATM Subnetworks (ATM 서브망에서 MCS 멀티캐스트 구현을 위한 전송 제어 시스템의 성능 평가)

  • Park, Sang-Joon;Lee, Hyo-Jun;Kim, Kwan-Joong;Kim, Young-Han;Kim, Byung-Gi
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.6
    • /
    • pp.48-53
    • /
    • 1997
  • The multicasting of MCS(Multicast Server) requires a effective traffic control scheme to prevent buffer overflow on ATM subnetworks. This paper considers MCS multicasting to TCP packets, and propose EPD + SPD scheme(Early Packet Discard-same Source Packet Discard) using common buffer. When the threshold of output buffer is reached, MCS drops an entire packet prior to buffer overflow, so that corrupted packets will not be transmitted by the server. And SPD scheme show that the EPD + SPD results in higher TCP throughput than that of tail drop and EPD + DFF.

  • PDF