• Title/Summary/Keyword: 트래픽 부하

Search Result 598, Processing Time 0.021 seconds

A New Multicast Routing Protocol for Multicast Delivery Agent-based Mobile-IPv6 in 3GPP2 IMT-2000 System (3GPP2 IMT-2000 시스템에서 멀티캐스트 전달 대리자 기반의 새로운 Mobile-IPv6 멀티캐스트 라우팅 프로토콜)

  • Park, Byeong-Seob;Kim, Sung-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2002
  • We present a new MDA-based Mobile-IPv6 multicast routing algorithm for wirelese service operators to offer Mobile-IP over IMT-2000 service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 multimedia application services. The extended IMT-2000 system architectures use an PDSNs (i.e. IWFs), and the home network (i.e. Internet) backbone and intermediate network are composed of ATM entities. A key feature of the new protocol is the use of MDA(Multicast Delivery Agent) to reduce delivery path length of the multicast datagram. We show that proposed protocol is efficient in terms of various performance measures such as multicast traffic load, multicast related handoff, and average routing length when we implement it using the Mobile-IPv6. Particularly, the number of tunneling and average routing length of datagram are reduced relatively, the multicast traffic load is also decreased.

Performance Analysis of Collaborative Wideband Sensing Scheme based on Energy Detection with User Selection for Cognitive Radio (에너지검출 기반 협력 광대역 센싱에서 사용자 선택에 따른 센싱 성능 분석)

  • Lee, Mi-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.72-77
    • /
    • 2011
  • Spectrum sensing is a critical functionality of CR network; it allow secondary user to detect spectral holes and to opportunistically use under-utilized frequency bands without causing harmful interference to primary use. Recently, wideband service has been increase for processing abundance of data traffic. So CR network needs a realizable implementation design of spectrum sensing for wideband. To get high resolution performance of wideband sensing must precede algorithm processing for reliability signal detection. By the way, the performance of spectrum sensing can be degraded due to fading and shadowing. In order to overcome this problem, we propose system model of wideband sensing scheme on energy detected collaborative technique. we divide wideband into narrowbands and use narrowbands to detect signal excepting some narrowbands including bad channel through the CSI. And we simulate and analyze in terms of detection probability with various SNR.

A New Deadlock Detection Mechanism in Wormhole Networks (웜홀 네트웍을 위한 새로운 교착상태 발견 기법)

  • Lee, Su-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.280-289
    • /
    • 2003
  • Deadlock recovery-based routing algorithms in wormhole networks have gained attraction due to low hardware complexity and high routing adaptability Progressive deadlock recovery techniques require a few dedicated resources to transmit deadlocked packets rather than killing them. Selection of deadlocked packets is primarily based on time-out value which should be carefully determined considering various traffic patterns or packet length. By its nature, current techniques using time-out accompany unignorable number of false deadlock detections especially in a heavy-loaded network or with long packet size. Moreover, when a deadlock occurs, more than one packet may be marked as deadlocked, which saturate the resources allocated for recovery. This paper proposes more accurate deadlock detection scheme which does not make use of time-out to declare deadlock. The proposed scheme reduces the probability to detect false deadlocks considerably. Furthermore, a single message is selected as deadlocked for each cycle of blocked messages, thereby eliminating recovery overheads.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.

Power Consumption Analysis of Asynchronous RIT mode MAC in Wi-SUN (Wi-SUN에서 비동기 RIT 모드 MAC의 전력소모 분석)

  • Dongwon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.23-28
    • /
    • 2023
  • In a wireless smart utility network communication system, an asynchronous low power MAC is standardized and used according to IEEE 802.15.4e. An asynchronous MAC called RIT (Receiver Initiated Transmission) has a characteristic in which delay time and power consumption are greatly affected by a check-in interval (RIT period). By waking up from sleep every check-in interval and checking whether there is data to be received, power consumption in the receiving end can be drastically reduced, but power consumption in the transmitting end occurs due to an excessive wakeup sequence. If an excessive wake-up sequence is reduced by shortening the check interval, power consumption of the receiving end increases due to too frequent wake-up. In the RIT asynchronous MAC technique, power consumption performance according to traffic load and operation of check-in interval is analyzed and applied to Wi-SUN construction.

Delay time Analysis of Asynchronous RIT Mode MAC in Wi-SUN (Wi-SUN에서 비동기 RIT모드 MAC의 지연시간 분석)

  • Dongwon Kim;Mi-Hee Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.65-70
    • /
    • 2024
  • In recent years, research on smart factory wireless mobile communication technology that wirelessly remotely controls utilities is being actively conducted. The Wi-SUN (Wireless Smart Utility Network) Alliance proposed a Wi-SUN protocol structure suitable for building a platform such as a smart factory as a new wireless communication standardization standard based on EEE802.15.4g/e. It analyzes the performance of the IEEE802.15.4e Receiver Initiated Transmission(RIT) Mode Media Access Control (MAC) in terms of throughput and latency, and looks at considerations for efficient operation. RIT mode shows that as the check interval becomes longer, delay time and throughput decrease. It was shown that as the traffic load increases, if the RIT check interval is shortened, the delay time can be shortened and throughput can be increased. RIT mode has the advantage of low power consumption and has neutral characteristics between IEEE802.15.4 and CSL mode in terms of delay time and throughput.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

Advanced n based Packet Marking Mechanism for IP Traceback (TTL 기반 패킷 마킹 방식을 적용한 IP 패킷 역추적 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.13-25
    • /
    • 2005
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Existing PPM based tracing scheme(such as router node appending, sampling and edge sampling) insert traceback information in IP packet header for IP Traceback. But, these schemes did not provide enhanced performance in DDoS attack. In this paper, we propose a 'TTL based advanced Packet Marking' mechanism for IP Traceback. Proposed mechanism can detect and control DDoS traffic on router and can generate marked packet for reconstructing origin DDoS attack source, by which we can diminish network overload and enhance traceback performance.

  • PDF

A Study on the Realtime Cert-Validation of Certification based on DARC (DARC 기반에서의 실시간 인증서 유효성 검증에 관한 연구)

  • Jang, Heung-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.517-524
    • /
    • 2001
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity based on PKI. So, a user have to confirm the public key whether valid or invalid in the certification. There are many method such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these method many problems which are overload traffic on network and the CRL server because of processing for cert-validation of certification. In this paper we proposed the realtime cert-validation of certification method which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server based on DARC.

  • PDF

The Study on the Estimate of Video Quality in the IPTV (IPTV 영상품질 평가에 관한 연구)

  • Lee, Jae-Hee;Lee, Sang-Ha;Kim, Chin-Chal
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.232-241
    • /
    • 2008
  • In this paper, for analysing the major factors giving the effect to the quality of video on the multicasting service of IPTV, we construct the lab test network environment similar to the real IPTV service network environment. We measure the quality of video on the multicasting of IPTV generating and increasing the broadcasting traffic on the situation that apply the QoS technique to the test lab network and not apply the QoS technique and then find out the threshold value of factors giving the effect to the quality of video on the multicasting service of IPTV. This paper can be used in basic date for guaranteeing the constant video quality on the multicasting service of IPTV.