• Title/Summary/Keyword: error control protocol

Search Result 150, Processing Time 0.031 seconds

Scheduling of Real-time and Nonreal-time Traffics in IEEE 802.11 Wireless LAN (무선랜에서의 실시간 및 비실시간 트래픽 스케줄링)

  • Lee, Ju-Hee;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.75-89
    • /
    • 2003
  • Media Access Control (MAC) Protocol in IEEE 802.11 Wireless LAN standard supports two types of services, synchronous and asynchronous. Synchronous real-time traffic is served by Point Coordination Function (PCF) that implements polling access method. Asynchronous nonreal-time traffic is provided by Distributed Coordination Function (DCF) based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Since real-time traffic is sensitive to delay, and nonreal-time traffic to error and throughput, proper traffic scheduling algorithm needs to be designed. But it is known that the standard IEEE 802.11 scheme is insufficient to serve real-time traffic. In this paper, real-time traffic scheduling and admission control algorithm is proposed. To satisfy the deadline violation probability of the real time traffic the downlink traffic is scheduled before the uplink by Earliest Due Date (EDD) rule. Admission of real-time connection is controlled to satisfy the minimum throughput of nonreal-time traffic which is estimated by exponential smoothing. Simulation is performed to have proper system capacity that satisfies the Quality of Service (QoS) requirement. Tradeoff between real-time and nonreal-time stations is demonstrated. The admission control and the EDD with downlink-first scheduling are illustrated to be effective for the real-time traffic in the wireless LAN.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

TCP Congestion Control Using EWLN in Wireless Networks (무선환경에서 EWLN을 이용한 TCP 혼잡제어)

  • Joh, Hang-Ki;Choi, Seung-Jun;Kim, Seok-Hoon;Ryoo, In-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.241-247
    • /
    • 2011
  • Most of network congestions are caused by TCP packet losses in the wired network ecosystems. On the contrary, high BER (Bit Error Rate), which is characteristic of the wireless networks, is a main factor in wireless network environments. Many wireless networks carry out the congestion control mechanisms frequently because they estimate that packet losses are not due to the wireless signal qualities but the congestion controls in their networks. To solve this problem, we propose the improved EWLN (Explicit Wireless Loss Notification) algorithm that more efficiently utilize the congestion window size to increase the wireless network throughput than legacy EWLN algorithm.

A Real-time Adaptive Scheduling Protocol for MPEG-4 Video Stream Transmission in Mobile Environment (모바일 환경에서 MPEG-4 비디오 스트림 전송을 위한 실시간 적응형 스케쥴링 프로토콜)

  • Kim, Jin-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.3
    • /
    • pp.349-358
    • /
    • 2010
  • Adaptability is an important issue in video streaming over mobile environments, since the clients may request videos with great differences in their workload. In this paper, we propose the issues in limited bandwidth scheduling for efficient MPEG-4 video stream transmission over a mobile or wireless network. In the phase of admission control, the amount of bandwidth allocated to serve a video request is the mean bandwidth requirement of its requested video. The dynamic allocation of bandwidth in the phase of scheduling depends on the playback buffer levels of the clients with an objective to make it more adaptive to the playback situation of individual clients. In the proposed RTA scheduling protocol, more bandwidth may be allocated temporarily to the client whose buffer level is low. By employing the buffer level based scheduling policy, this protocol attempts to maximize the real-time performance of individual playback while minimizing the impact of transient overloading. Extensive simulation experiments have been performed to investigate the performance characteristics of the RTA protocol as comparing with BSBA protocol. This RTA protocol shows the better performance by transferring more frames than BSBA protocol.Computer simulations reveals that the standard deviation of the bit rate error of the proposed scheme is 50% less than that of the conventional method.

Remote Mobile robot control system using multimedia data (멀티미디어 기반의 원격 이동 로봇 제어 시스템)

  • 변재영;문호석;정재한;고성제
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.235-238
    • /
    • 2002
  • This paper presents a remote mobile robot system that transmits streaming video and audio over the lossy packet networks such as (Wireless) LAN. The error resilient video and audio packets are transmitted on the RTP/UDPfP Protocol stack. The mobile robot can be accessed by a certified user from the remoted area. Thus, the movement of mobile robot can be controlled by the operator observing the working surroundings.

  • PDF

Design of error control method for Reliable Multicast Transport (신뢰성 있는 멀티캐스트 전송을 위한 에러 제어 방법 설계)

  • 정세환;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.382-384
    • /
    • 2003
  • 인터넷 멀티캐스트 서비스는 네트워크 자원의 효율적 사용이라는 장점과 15년 이상의 연구, 개발에도 불구하고 아직 보편화 되지 못하고 있다. 이는 멀티캐스트 서비스가 망에서 지원이 잘 되지 않고 있고. 멀티캐스트 망 관리의 어려움. Killer Application 부재 등 많은 문제점이 있고, 멀티캐스트 서비스의 신뢰성 보장이 되지 않고 있다는 것도 하나의 문제점 이라고 할 수 있다. 본 논문에서는 인터넷 멀티캐스트 서비스의 신뢰성 보장을 위한 방법으로 기존에 발표된 트리기반의 프로토콜인 RMTP (Reliable Multicast Transport Protocol)[1]. [2]의 단점을 보완하여 신뢰성 있는 멀티캐스트 전송을 위한 방법을 제안하고자 한다.

  • PDF

DCCP based Congestion Control Scheme to support Mobility of Devices on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 단말의 이동성을 지원하기 위한 DCCP 기반의 혼잡 제어 정책)

  • Park Si-Yong;Kim Sung-Min;Lee Tae-Hoon;Chung Ki-Dong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.59-75
    • /
    • 2006
  • In this paper, we propose a congestion control scheme to control the congestion due to the mobility of ubiquitous devices on ubiquitous computing environment. Especially, this congestion control scheme provides a reverse congestion avoidance state which can classify between packet error by features of wireless network and packet dropping by congestion. Also, it provides a slow stop state which can minimize bandwidth waste due to congestion control. The proposed congestion control scheme controls more adaptive than existing congestion control schemes. The proposed congestion control scheme is designed based on DCCP(Datagram Congestion Control Protocol) being proposed by IETF(Internet Engineering Task Force) and implemented on the Linux kernel. In simulation results, the proposed congestion control scheme provides good bandwidth throughput in wireless network as well as in wired network.

Enhancement of SCTP Throughput using Chunk Checksum

  • Lin Cui;Koh Seok J.;Hong Yong-Geun
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.1147-1150
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted SCTP packet will be regarded as a lost packet and then discarded. This may result in degradation of SCTP's throughput performance over wireless networks. This paper proposes a new chunk checksum scheme for SCTP, in which each data chunk contains its own checksum field and SACK chunk carry corresponding Transmission Sequence Number (TSN) with timestamp for every corruption event. The proposed chunk checksum scheme is introduced with the following three purposes: 1) to distinguish the chunk corruptions from the chunk losses; 2) to avoid the unnecessary halving of the congestion window (cwnd) in the case of chunk corruption; 3) to avoid the unwanted timeouts which can be induced in conventional SCTP in the case that the retransmitted data chunks are corrupted again in wireless networks. Simulation results show that the proposed chunk checksum scheme could improve the SCTP throughput in the wireless environments with a high bit error rate.

  • PDF

Performance evaluation of telecommunication protocols using stochastic petri nets reward model (Stochastic Petri Nets Reward Model을 이용한 통신 프로토콜의 성능평가)

  • 로철우;장직현
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.4
    • /
    • pp.1-14
    • /
    • 1995
  • A new stochastic Petri nets model, called Stochastic Petri Nets Reward Model(SPNRM) is used for modeling and evaluating the performance of telecommunication protocols. We have developed a SPNRM of the TDX-10 Internal protocol, which has a packet data exchange facility between DCEs, Especially a timer and retransmission handling model is presented for error control of the data transmission phase. The stochastic Petri nets package(SPNP), a software package for SPNRM used in this paper, has been used to generate numerical results by analytical-numerical method rather than simulation. From the steady state solution of the net, it is possible to calculate automatically the performance measure of the protocol medeled with both end-to-end and link-by-link method, which are the mean response times and the throughputs.

  • PDF

A Simulation for a Message Transmission Protocol between LDTS (LDTS와 EIS간 메시지 전송 프로토콜에 대한 시뮬레이션)

  • Hwang Jong-Gyu;Lee Jae-Ho;Kang Moon-Ho
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.183-189
    • /
    • 2003
  • In this paper a simulation was done to verify performance of a message transmission protocol which interfaces LDTS(Local Data Transmission System) with EIS(Electronic Interlocking System), After a stage of analyzing link specifications between LDTS and EIS, transmission messages and messaging formats, simulation parameters were extracted, applied to the error control schemes such as ARQ, FEC, HARQ, and therefrom throughputs and various performance indices were analyzed Simulation program was constructed with Matlab and Matlab GUI and then converted into a stand-alone c++ program to be used on any non-Matlab environments.

  • PDF