• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.03 seconds

A Study on Connection Control using GRE Tunneling Technique in High-speed IP Infrastructure (초고속 IP 기반에서 GRE 터널링 기법을 이용한 접속 제어 연구)

  • Lee Jae-Wan;Kim Hyoung-Jin;Ko Nam-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1038-1044
    • /
    • 2006
  • Tunneling technique does a role to network authentication or the preservation support of date at high-speed network In order to this, IPsec, SOCKS V5 or GRE tunneling protocol have been using. This paper embodies the offer base of communication service by changing routing route to special IP band for connection interception of harmful service md according to user's needs, by changing routing route to special service at high-speed network. So we measure and analysis action principle of GRE with GRE protocol, the result apply to a service of connection control and authentication base.

A study on the outbound traffic controller for prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.759-761
    • /
    • 2016
  • ICMP(Internet Control Message Protocol) supports the processing of error in the communication network based TCP/IP. If a problem is occurred in a data transmission process, router or receiving host sends ICMP message containing the error cause to sending host. However, in this process an attacker sends a fake ICMP message to the host so that the communication between the hosts can be abnormally terminated. In this paper, we performed a study to prevent several attacks related to ICMP. To this, we have designed outbound traffic controller so that attack packet is not transmitted to network in operating system of host.

  • PDF

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

Implementation and Performance Evaluation of Ethernet-PON System using OPNET (OPNET을 이용한 Ethernet-PON 시스템 구현 및 성능 평가)

  • 안계현;한경은;박혁규;노선식;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.466-474
    • /
    • 2003
  • In this paper, we develope the simulation model for Ethernet passive optical networks (Ethernet-PON) by using OPNET. Ethernet-PON is an emerging access network technology that provides a low-cost method of deploying optical access lines. The simulator uses a Request/Grant TDMA MAC protocol based on IEEE 802.3ah EFM. It also executes registration, ranging and dynamic bandwidth allocation algorithm by exchanging control packets between OLT and ONUs. We have evaluated for success ratio of initial registration process and delay of late registration process. We also have simulated for dynamic TDMA protocol and static TDMA protocol in terms of channel utilization and queueing delay. We expect that this simulator can help to determine various parameters which are considered for designing Ethernet-PON system.

Design of a MAC protocol for Urgent Events in Wireless Sensor Networks (긴급 메시지의 우선 처리를 위한 무선센서네트워크 MAC 프로토콜 설계)

  • Lee, Ju-Hyeon;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.803-808
    • /
    • 2010
  • Wireless Sensor Networks are widely applied for organizing real-time monitoring systems. Unlike general kinds of sensor networks, it is important to preferential send emergency data to the control server when urgent events are occurred. But IEEE 802.15.4 MAC protocol which is generally deployed for wireless sensor network does not support algorithm for urgency data handling. Therefore, we proposed a MAC protocol which consider the priority for the urgency data handling.

Adaptive MAC Protocol for Low Latency in WMSN (WMSN 에서 낮은 지연을 위한 적응적 MAC 프로토콜)

  • Kim, Seong-Hun;Lee, Sung-Keun;Jung, Chang-Ryul;Koh, Jin-Gwang
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.161-169
    • /
    • 2009
  • The development of Wireless Multimedia Sensor Networks(WMSNs) is getting realized in accordance with the increased demands to provide multimedia data transmission service such as CCTV movie, image chapter information, audio information based on wireless sensor network. It is very important to provide the differentiated quality assurance of service. In this paper, we propose a sensor medium access control protocol based on DSMAC, which provides differentiated Quality of Service(QoS) for delay. A proposed protocol is able to reduce the delay without increasing the energy consumption by adaptively changing the duty cycle according to the buffer occupancy. Simulation results show that the new MAC protocol performs better in terms of latency than S-MAC and DSMAC.

  • PDF

Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks (수중 모바일 애드 혹 네트워크를 위한 MAC 프로토콜 설계 및 구현)

  • Lee, Jin-Young;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.76-89
    • /
    • 2014
  • In this paper, we propose a MAC(Media Access Control) protocol based on flexible RWT(RTS Waiting Time) for underwater mobile ad-hoc networks with a three-way handshaking mechanism. This protocol can solve a problem of collision between RTS(Request-To-Send) and CTS(Clear-To-Send) packets in existing MACA(Multiple Access with Collision Avoidance) protocol. This proposed MAC protocol is also an effective protocol which can apply to underwater mobile ad-hoc networks in a real field by using implementable technologies. We set flexible RTS Waiting Time called RWT, considering various characteristics of underwater environment. It is possible to support variable network size according to node mobility. Finally, we conduct a performance evaluation between proposed MAC protocol and existing MACA based MAC protocol through practical implementation and experiment. As a result, we verify the superiority of our proposed MAC protocol in terms of throughput, packet drop rate, average transmission time, energy consumption and channel utilization.

Survey on Applications of control Theories to Wired and Wireless Communication (유무선 통신에서의 제어 이론 적용에 대한 연구 개관)

  • Kwon, Wook-Hyun;Kim, Hyung-Seok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.8
    • /
    • pp.652-658
    • /
    • 2000
  • Wired and wireless communication technique is growing rapidly. As the number of communication users is larger problems such as network congestion and signal interference between users are getting most important, There have been researches that try to solve them by control theoretic approaches. They apply various control theories to the control issues of communication. this paper surveys these researches and classifies them into ATM TCP/IP and wireless communication according to the target. The feedback control model of each communication protocol is shown and related researches are summarized and analyzed.

  • PDF

Lower layer implementation of a fieldbus network interface (Fieldbus 네트워크 접속기의 하위계층 구현)

  • 김현기;이전우;황선호;이혁희;채영도
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.337-341
    • /
    • 1991
  • Fieldbus is a low level serial digital network which will be used for factory automation. This paper describes lower layer implementation of a Fieldbus network interface. Physical layer provides hardware interface between IBM-PC and Fieldbus. Also, physical layer uses manchester coding, shielded twisted pair lines and RS-485 electrical standard. Data link layer includes Intel's iDCX96 real time executive for 8797 one chip microcontroller and Fieldbus data link protocol software.

  • PDF

A security study for Control Network: Security Threat Using Control Protocol (제어 네트워크의 프로토콜을 이용한 보안 위협 연구)

  • Choi, DongJun;Lee, JaeWoo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.