• Title/Summary/Keyword: Transmission Control Protocol

Search Result 714, Processing Time 0.03 seconds

Simultaneous Burst and Burst Control Packet Transmission Protocol for Optical Burst Switching Ring Networks

  • Park, Joon-Pyo;Lee, Man-Seop
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.116-119
    • /
    • 2007
  • In this letter, we design a collision resolution protocol for optical burst switching ring networks to avoid burst collision. We define the offset time condition for no burst transmission collision and manage the free time list of nodes for no burst reception collision. In order to improve the throughput, we use a fiber delay line, void-filling, and void-compression. This protocol does not require any additional procedures for bandwidth reservation such as centralized assignment of bandwidth, lightpath setup of WDM ring networks, or token capturing for the burst transmission. The simulation results show that the proposed protocol can achieve high throughput while saving 70% of wavelengths when compared to round robin with random selection, round robin with persistent, and round robin with non-persistent with only destination delay.

  • PDF

Enhanced CSMA/CA Protocol for multi-hop wireless Ad-hoc networks (멀티 홉 무선 Ad-hoc 네트워크를 위한 개선된 CSMA/CA 프로토콜)

  • 김남일;황유선;김응배
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.231-234
    • /
    • 2003
  • In this paper, we propose the enhanced CSMA/CA MAC protocol fir mobile multi-hop wireless Ad-hoc networks. In the conventional wireless Ad-hoc network such as WLAN using CSMA/CA MAC protocol, communications between terminals that fn connected within multi-hop node may degrade the transmission efficiencies as increasing the multi-hop nodes because of RTS-CTS-DATA-ACK message exchange between terminals. In this raper, we apply the ACK/RTS control message into multi-hop transmission between terminals for wireless ad-hoc networks and improve the data traffic transmission efficiencies compared with conventional CSMA/CA MAC protocol used in WLAN.

  • PDF

An MAC Protocol based on Code Status Sensing and Acquisition Indication in CDMA Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.181-184
    • /
    • 2007
  • In this paper, a CSSMA/AI MAC protocol in packet CDMA network is presented. The main features of this protocol are the code status sensing and reservation for reducing the packet collision. The base station broadcasts the code status on a frame-by-frame basis just before the beginning of each preamble transmission, and the mobile station transmits a preamble for reserving a code based on the received code status. After having transmitted the preamble, the mobile station listens to the downlink of the selected code and waits the base station reply. If this reply indicates that the code has been correctly acquired, it continues the packet transmission for the rest of the frame. If there are other packets waiting for transmission, the base station broadcasts the status of the code as reserved, and the mobile station transmits a packet on a reserved code for the successive frames.

Performance enhancement of GSO FSS TCP/IP network (정지위성 TCP/IP 네트워크 전송 성능 향상)

  • Hong, Wan-Pyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.118-123
    • /
    • 2007
  • This paper studied the transmission control protocol over IP network to enhance the performance of the GSO satellite communication networks. The focus of this study is how to reduce the long round trip time and the transmission data rates over satellite link in the bidirectional satellite network. To do it, this study applied the caching and spoofing technology. The spoofing technology is used to reduce the required time for the link connection during communication. The caching technology is to improve the transmission bandwidth efficiency in the high transmission data rate link The tests and measurements in this study was performed in the commercial GSO communication satellite network and the terrestrial Internet network. The results of this paper show that the studied protocol in this paper highly enhance the performance of the bidirectional satellite communication network compare to the using TCP/IP satellite network protocol.

Real-Time Performance Evaluation of Network in Ethernet based Intranet

  • Pae, Duck-Jin;Kim, Dae-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.133.3-133
    • /
    • 2001
  • This paper analyses the real-time performance of Ethernet based intranet whether it is applicable to the real-time network. Unpredictability of transmission delay by collision-delay-retransmission mechanism in CAMA/CD(Carrier Sense Multiple Access with Collision Detect) of Ethernet is the major reason making hard to apply to real-time system. Both retransmission mechanism of TCP(Transmission Control Protocol) for reliability and sliding windows algorithm for high utilization make hard to predict transmission delay. Because real-time control network require fast responsibility and bustle of short-periodic messages, global-clock for collision avoidance and UDP(User Datagram Protocol) for high utilization of network are used. The mathematical models for time-delay that can be occured between ...

  • PDF

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

Implementation of a Transmission Error Control Protocol for Biological Data in a Wireless Data Communication System (무선환경에서의 생체 데이터 전송 오류 제어 프로토콜의 구현)

  • Lim, Young-Ho;Yoon, Tae-Sung;Yoo, Sun-Kook
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.450-453
    • /
    • 2002
  • In emergency telemedicine system based on wireless communication system with limited transmission capacity, it is necessary to transmit the biological data (ECG, BP, Respiration, $SpO_2$) of the patient continuously and reliably in real time. For this service, it is necessary to data compression and error control. In this study, we designed an protocol for error control in application layer and implemented it on the biological data transmission program for an emergency telemedicine system based on wireless data communication system.

  • PDF

차세대인터넷 IPv6 Address 표준화 동향

  • Lee, Hyeok-Ro;Kim, Dong-Gyun
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.9
    • /
    • pp.52-59
    • /
    • 2002
  • 현재 우리가 사용하고 있는 Internet Protocol인 TCP/IP(Transmission Control Protocol/Internet Protocol)중 어드레스 IPv4 10진수 체계가 16진수 체계로 변화된 것이 바로 IPv6 Address이다. IPv6 Address특징으로서는 기하 급수적으로 늘어나는 Internet Address를 감당해낼 수 있고, Multi-Media Data 처리가 능숙한 데다 보안성까지 갖추고 있어 앞으로 이용에 대한 장래성이 기대되는 프로토콜이다.

  • PDF

Performance Improvement of STAC Protocol by Early Release of Reply Round and Transmission Probability Control (응답 라운드 조기종료와 전송확률 제어를 통한 STAC 프로토콜의 성능 개선)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2569-2574
    • /
    • 2013
  • In 13.56MHz RFID system of Auto-ID center, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. In STAC protocol, the reader uses the tag number estimation scheme to determine the number of slots for the next reply round. If errors occur in the estimated number of tags, the identification performances will be degraded due to a lot of collision or idle slots. Therefore, in this paper, we propose an ERPB algorithm that the reader cancels the reply round when it experiences a series of collision or idle slots during the current round. The transmission probability control for the tag is also applied to the proposed algorithm. Through simulations, it is demonstrated that the collision rate for the proposed scheme is about 39% lower than STAC protocol. Therefore, the proposed scheme can achieve faster tag identification time compared with STAC protocol due to the low collision rate.

Improved Ad Hoc On-demand Distance Vector Routing(AODV) Protocol Based on Blockchain Node Detection in Ad Hoc Networks

  • Yan, Shuailing;Chung, Yeongjee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.46-55
    • /
    • 2020
  • Ad Hoc network is a special wireless network, mainly because the nodes are no control center, the topology is flexible, and the networking could be established quickly, which results the transmission stability is lower than other types of networks. In order to guarantee the transmission of data packets in the network effectively, an improved Queue Ad Hoc On-demand Distance Vector Routing protocol (Q-AODV) for node detection by using blockchain technology is proposed. In the route search process. Firstly, according to the node's daily communication record the cluster is formed by the source node using the smart contract and gradually extends to the path detection. Then the best optional path nodes are chained in the form of Merkle tree. Finally, the best path is chosen on the blockchain. Simulation experiments show that the stability of Q-AODV protocol is higher than the AODV protocol or the Dynamic Source Routing (DSR) protocol.