• Title/Summary/Keyword: 액세스 노드

Search Result 120, Processing Time 0.022 seconds

Protocol supporting Variable-length Message using Pre-reservation Slots in WDM Local Network (WDM Local Network에서 선예약슬롯을 이용한 가변길이 메시지 지원 프로토콜)

  • Hwang, In-hwan;Shuin, Eui-jung;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.119-124
    • /
    • 2001
  • A new WDM-based protocol for scheduling a variable-length message is proposed in this paper. Two control slots, Pre-reservation slot and Reservation Slot, are used to coordinate transmission and diminish the collisions of packet to minimize the access delay. When there is an idle reservation slot, a control packet is transmitted on that slot and message is transferred. And the node continues to transmit its control packet through the corresponding slot every cycle, until the message is completely transmitted. If an idle reservation slot is not available, the node schedules the transmission time of message in earliest available time using Pre-reservation slots. The proposed scheduling protocol has several advantages; any new node can join the network anytime without network re-initialization. Moreover, with the pre-reservation slots, we can avoid the packet collisions and destination conflicts, and we can improve the access delay time for message transmissions.

  • PDF

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.

Connection Control Protocol and Parallel Interworking Model for the VB5.2 Interface (VB5.2 인터페이스를 위한 연결 제어 프로토콜과 병렬형 연동 모델)

  • 차영욱;김춘희;한기준
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.2
    • /
    • pp.22-31
    • /
    • 2000
  • The VB5.2 interface of B-lSDN, that is located between an access network and a service node, allows dynamic allocation and release of ATM resources. In this paper, we propose the B-ANCC protocol of the VB5.2 interface to minimize the overall connection setup delay by introducing the access network. The B-ANCC protocol enhances the B-BCC protocol and adopts a parallel interworking function with signaling protocols in the service node. To confirm the correctness of the proposed B-ANCC protocol, we validate it using the automated validation tool, SPIN. We analyze and simulate the sequential interworking model based on the B-BCC protocol and the parallel interworking model based on the B-ANCC protocol, in terms of a connection setup delay and a completion ratio. It is shown that our proposed parallel interworking model with B-ANCC reduces a setup delay and improves a completion ratio compared to the sequential interworking model with B-BCC.

  • PDF

Protocol supporting Variable-length Message using Reservation Slots in WDM Local Network (WDM Local Network에서 예약슬롯을 이용한 가변길이 메시지 지원 프로토콜)

  • 진교홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.257-262
    • /
    • 2001
  • A new WDM-based protocol for scheduling a variable-length message is proposed in this paper Two control channels, reservation slot and control slot, are used to coordinate transmission and diminish the collisions of packet to minimize the across delay. When an idle control slot is available, control packet is transmitted on that slot and message is transferred. And the node continues to transmit its control packet through the corresponding slot every cycle, until the message is completely transmitted. If any control slot is not available, the node schedules the transmission time of message in earliest available time using reservation slots. The proposed scheduling algorithm shows better performance and lower access delay.

  • PDF

Shared-medium Access Control Protocol for the ATM Access Network - Part I : DMR-II Protocol Architecture - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - I부 : DMR-II 프로토콜 구조 -)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.379-388
    • /
    • 1998
  • In this paper we propose a DMR-II shared-medium access control protocol which was developed for the ATM access network users to support isochronous and non-isochronous traffics simultaneously under the bandwidth sharing environment, and describe its architecture and operation principles. The DMR-II protocol uses the slotted-ring topology, and gives the higher transmission priority to the isochronous traffic than the non-isochronous traffic. To support the isochronous traffic it uses the slot reservation mechanism, and maintains the delay variation of the isochronous traffic beyond the threshold value by using the blocking mechanism whenever the total user traffic overflows the network's bandwidth limitation. for the non-isochronous traffic the DMR-II protocol lets all the nodes to have fair transmission chances by using the reset mechanism based on the window counter scheme.

  • PDF

Performance Evaluation of a New Helper Node Selection Scheme for Cooperative Communications (협력통신용 신규 도움노드 선정기법 설계 및 성능평가)

  • Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1811-1819
    • /
    • 2013
  • In this paper, we carried out a study on how to find an appropriate helper node for cooperative communications, the role of which is very import to enhance system throughput of wireless communication system. The busy tone cooperative MAC (BT-COMAC) protocol proposed in this paper is a new cooperative MAC protocol with a reactive helper node scheme and maximizes the benefits of existing schemes while making up for their shortcomings. We conducted performance evaluation of this new protocol using computer simulation experiment. System throughput in bps and channel access delay are utilized as performance measures. We used a random way point mobility model where every communication node moves independently one another, and slow fading channel where every communication node decided its transmission rate with received power basis. Numerical results show that the new MAC protocol enhances system throughput as much as 15% of the existing scheme.

VRML Database Access for 3D Real-time Data Visualization in MiWiTM Thermal Wireless Sensor Network (마이와이 표준의 열 센서망의 3차원 실시간 자료 시각화를 위한 가상 현실 모델링 언어 데이터베이스 액세스)

  • Wan, Xue-Fen;Yang, Yi;Cui, Jian;Zheng, Tao;Ma, Li
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.164-170
    • /
    • 2012
  • A Virtual Reality Modeling Language (VRML) database access in remote virtual reality control platform for dyeing enterprise $MiWi^{TM}$ thermal sensor network is presented in this paper. The VRML-ASP framework is introduced for 3D real-time data plotting in this application. The activities of thermal sensor nodes and sensor area are analyzed. The database access framework is optimized for $MiWi^{TM}$ wireless sensor networks. The experimental results show that VRML-ASP database access framework could be a reliable and competitive data-manage candidate for targeted virtual reality remote industrial visualization application.

A Fault-tolerant Network-based Mobility Management Scheme for Supporting Multi-media Services (방통융합 멀티미디어 서비스를 제공하기 위한 안정된 네트워크 기반의 이동성 관리 기술)

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Hong, Kang-Woon;Um, Tai-Won;Lee, Hyun-Woo;Ryu, Won;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.526-535
    • /
    • 2010
  • In this paper, we propose the fault-tolerant network-based mobility management scheme for supporting multimedia services of broadcasting & communications convergence in fixed mobile convergence (FMC) networks. The proposed scheme is based on AIMS (Access Independent Mobility Service) which is developed for the mobility support among heterogeneous access networks. To support stable location management and handover control for a MN, the proposed scheme supports stable management of binding information by sensing network attachment and detachment of a mobile node (MN). In addition, the proposed fault-tolerant (FT) AIMS supports a function of message retransmission for the support of handover control message and a function of heartbeat message transmission for the support of stable access network environments to a mobile node. We evaluate and analyze the performance of the proposed scheme through the implementation of AIMS system test-bed.

SNMP-based Management for Mobile Network Devices (SNMP 기반의 이동형 네트워크 장비 관리 기법)

  • Kwak, Deuk-Whee;Lee, Hyun-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.557-566
    • /
    • 2008
  • Some types of network nodes such as mobile network node, mobile access point, and ad-hoc network node can be relocated frequently and, by the nature of its usage, are deployed over broad area. In this environment, the network topology is changed constantly since even the manager node as well as the managed nodes can leave or join the management network frequently. The many of existing network management technologies are mostly for small sized and homogeneous networks with static topologies and not proper for the mobile network devices. In this paper, employing peer-to-peer (P2P), the secure group communication techniques, and simple network management protocol (SNMP), we propose a highly secure and available management technique that can be used to manage the mobile network nodes through insecure management network such as the Internet. The proposed technique is implemented to show that it is practically usable.

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.