• Title/Summary/Keyword: packet recovery

Search Result 151, Processing Time 0.021 seconds

Disjointed Multipath using Energy Efficient Face Routing in Wireless Sensor Networks (무선 센서 망에서 에너지 효율적인 페이스 라우팅을 활용한 분리된 다중 경로 방안)

  • Cho, Hyunchong;Kim, Cheonyong;Kim, Sangdae;Oh, Seungmin;Kim, Sang-Ha
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.116-121
    • /
    • 2017
  • In wireless sensor networks, the multipath prefers energy efficient routing method due to the characteristic of low-power sensor which uses geographic method to transmit data packet through information of the neighbor nodes. However, when multipath meets the routing fail area called hole area, path overlap problem can occur, resulting in failed maintenance of disjoint multipath. To solve this problem, multipath research studies have been performed to exploit the modeling and detouring method in routing fail area by keeping the disjoint multipath. However, in an energy point of view, additional method like modeling can lead to a lot of energy consumption of sensor node. Moreover, lots of energy consumption of sensor node can shorten the life span of sensor network. In this study, we proposed an energy efficient geographic routing by keeping the disjoint multipath in routing fail area. The proposed scheme exploited the face routing using the geographic recovery method without additional method like modeling.

A Design Study of Standard Indicators for Evaluating the Technical Performance of an NCS Core Vocational Competence System (직업기초능력 평가시스템의 기술성능 평가를 위한 표준지표 설계 연구)

  • Kim, Seung-Hee;Chang, Young-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.111-117
    • /
    • 2017
  • The National Competency Standards (NCS) was designed to implement a competence-based society and solve the problem of inconsistency between the industrial field and education, training, and certification system. This study designed and developed the Korean NCS core vocational competence system, in accordance with the NCS, as an infrastructure to solve fundamental problems such as re-education and the social costs that are incurred in the workplace. Further, this study designed and developed standard indicators to evaluate the technical performance of the system for the global advancement of the Korean NCS core vocational competence system. The NCS core vocational competence system has been developed as an appropriate response type for multiple devices such as computers, tablet PCs, and cellular phones. For the global advancement of the Korean NCS core vocational competence system, this study designed and developed 10 performance evaluation indicators in accordance with 10 global standards, such as linkage-target operating system, interface protocol, packet format, encryption, class component, simultaneous access number, supervisor-to-testtaker response speed, server-to-admin response speed, auto-recovery speed for test answers, and real-time answer transmission speed.

Recovering Corrupted Motion Vectors using Discontinuity Features of an Image (영상의 불연속 특성을 이용한 손상된 움직임 벡터 복원 기법)

  • 손남례;이귀상
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.298-304
    • /
    • 2004
  • In transmitting a compressed video bit-stream over Internet, a packet loss causes an error propagation in both spatial and temporal domain, which in turn leads to a severe degradation in image quality. In this paper, a new error concealment algorithm is proposed to repair damaged portions of the video frames in the receiver. Conventional BMA(Boundary Matching Algorithm) assumes that the pixels on the boundary of the missing block and its neighboring blocks are very similar, but has no consideration of edges t)r discontinuity across the boundary. In our approach, the edges are detected across the boundary of the lost or erroneous block. Once the edges are detected and the orientation of each edge is found, only the pixel difference along the expected edges across the boundary is measured instead of calculating differences between all adjacent pixels on the boundary. Therefore, the proposed approach needs very few computations and the experiment shows an improvement of the performance over the conventional BMA in terms of both subjective and objective quality of video sequences.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

Adaptive Redundancy Scheme Using Channel State Estimation in Wireless LANs (무선 랜에서 채널 상태를 고려한 적응적 전송 방법)

  • 김선명;조영종
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.7
    • /
    • pp.9-19
    • /
    • 2004
  • WLAN (Wireless Local Area Networks) needs error recovery and flow control schemes to support reliable multicast protocol. Limited wireless bandwidth, as well as queuing losses caused by the asymmetric wired/wireless interactions, demands more effective approaches for reducing packet losses. Moreover, since the wireless channel is a shared broadcast medium, if sender receives feedback information simultaneously from several receivers, the feedback delays data frame transmission of forward direction by introducing channel congestion and burden at the sender. Therefore, it is important to minimize the amount of feedback information from receivers. In this paper, we propose an ARS(Adaptive Redundancy Scheme) that combines FEC(Forward Error Correction) using channel state estimation and ARQ(Automatic Repeat Request) both to reduce the amount of feedback information and the number of retransmissions and to guarantee high data reliability in a WLAN multicast environment. Performance of the proposed scheme is evaluated by means of analysis and simulations in AWGN and Rayleigh fading channels. The results show that the proposed scheme reduces the amount of feedback information and the number of retransmissions and guarantees high data reliability, while keeping throughput efficiency similarly with the conventional FEC and ARQ scheme.

On Alternative Path Setup for Directional Antenna Based Mobile Ad Hoc Networks (방향성 안테나에 기반을 둔 이동 애드 혹 네트워크에서의 대체 경로 설정)

  • Tscha, Yeong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1165-1174
    • /
    • 2007
  • Mobile ad hoc networks suffer from the re-construction of the routing path as a node on the path moves away and/or fails. In this paper we propose a multipath routing scheme, designed for the network based on the directional antennas, in which a new path is quickly recovered by do-touring to an alternative neighbor called braid. Simulations are conducted in random networks with 50 nodes uniformly deployed in a $1,000m{\times}1,000M$ area where, all nodes have a transmission range of 250m and the average node moving speed varies from 0 to 10m/s. The proposed approach under the ideal antenna with K(>1) directional sectors achieves better results compared with the case of K=1, the omnidirectional antenna model, in terms of the metrics: packet delivery ratio and average number of hops for the routing paths. As further study, a scheme to alleviate the heavy amount of latency accompanied by the rout setup is urgently required.

  • PDF

A Performance Analysis of Routing Protocols Avoiding Route breakages in Ad hoc Networks (애드 흑 네트워크에서 경로 손실 회피 라우팅 프로토콜의 성능평가)

  • Wu Mary;Jung Sang Joon;Jung Youngseok;Kim Chonggun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.49-58
    • /
    • 2006
  • When the movement of a node breaks the route in ad-hoc network, on-demand routing protocol performs the local route recovery or a new route search for the route maintenance. And when it performs the new route search or the local search, the packet which is transmitted can be delayed. There are ARMP and RPAODV as the methods reducing the delay resulted from the route-breakage. They predict the route-breakage and construct an alterative local route before the occurrence of the route-breakage. When the link state is unstable, the success rate of the alternative local route that can avoid the route-breakage can give a direct effect on the route-breakage and the transmission delay, To estimate the performance of routing protocols avoiding route-breakage, we suggest the numerical formulas of AODV, the representative on-demand routing protocol, and ARMP, RPAODV. To verify the efficiency and accuracy of the proposed numerical formulas, we analysis and compare with the results of the computer simulation and that of the numerical formulas.

Mitigating TCP Incast Issue in Cloud Data Centres using Software-Defined Networking (SDN): A Survey

  • Shah, Zawar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5179-5202
    • /
    • 2018
  • Transmission Control Protocol (TCP) is the most widely used protocol in the cloud data centers today. However, cloud data centers using TCP experience many issues as TCP was designed based on the assumption that it would primarily be used in Wide Area Networks (WANs). One of the major issues with TCP in the cloud data centers is the Incast issue. This issue arises because of the many-to-one communication pattern that commonly exists in the modern cloud data centers. In many-to-one communication pattern, multiple senders simultaneously send data to a single receiver. This causes packet loss at the switch buffer which results in TCP throughput collapse that leads to high Flow Completion Time (FCT). Recently, Software-Defined Networking (SDN) has been used by many researchers to mitigate the Incast issue. In this paper, a detailed survey of various SDN based solutions to the Incast issue is carried out. In this survey, various SDN based solutions are classified into four categories i.e. TCP Receive Window based solutions, Tuning TCP Parameters based solutions, Quick Recovery based solutions and Application Layer based solutions. All the solutions are critically evaluated in terms of their principles, advantages, and shortcomings. Another important feature of this survey is to compare various SDN based solutions with respect to different performance metrics e.g. maximum number of concurrent senders supported, calculation of delay at the controller etc. These performance metrics are important for deployment of any SDN based solution in modern cloud data centers. In addition, future research directions are also discussed in this survey that can be explored to design and develop better SDN based solutions to the Incast issue.

Performance Improvement Scheme based on Proactive Transmission for Reliable Multicast in Wireless LANs (무선 랜에서 신뢰성 있는 멀티캐스트를 위한 능동적 전송 기반의 성능 향상 방법)

  • Kim, Sun-Myeng;Kim, Si-Gwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.5
    • /
    • pp.16-24
    • /
    • 2011
  • The IEEE 802.11 wireless LAN (Local Area Network) is widely used for wireless access due to its easy deployment and low cost. Multicast in wireless LANs is very useful for transmitting data to multiple receivers compared to unicast to each receiver. In the IEEE 802.11 wireless LAN, multicast transmissions are unreliable since multicast data packets are transmitted without any feedback from receivers. Recently, various protocols have been proposed to enhance the reliability of multicast transmissions. They still have serious problems in reliability and efficiency due to the excessive control overhead by the use of a large number of control packets in the error recovery process, and due to a large number of retransmissions to satisfy all receivers. In this paper, we propose an effective scheme called PTRM(Proactive Transmission based Reliable Multicast). The proposed scheme uses a block erasure code to generate parity packets and to reduce the impact of independent packet error among receivers. After generating parity packets, the PTRM transmits data packets as many as receivers need to recover error, and then requests feedback from them. The simulation results show that the proposed scheme provides reliable multicast while minimizing the feedback overhead.