• Title/Summary/Keyword: 패킷교환

Search Result 269, Processing Time 0.029 seconds

Study on the Conformance Testing of Data Exchange between Transport Information Center and Terminal Equipment (교통정보센터와 단말기간 데이터교환 기술기준 적합성 시험에 관한 연구)

  • Lee, Sang-Hyun;Kim, Gyeong-Seok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.5
    • /
    • pp.147-158
    • /
    • 2008
  • Recently, Intelligent Transportation System (ITS) has been actively developed and built since the Transportation System Efficiency Promotion Act was enacted. However, since mutual connection among transportation information systems was not considered, the integration of transportation information services did not occur. Accordingly, the Ministry of Land Transport and Maritime Affairs established and announced the technical standard on ITS. In this study, the conformance testing of the transportation information and communication system interface standard on data exchange between the Transportation Information Center and terminals was researched The test items were categorized as data request tests and data providing tests by analyzing the communication procedures specified in the standard. A detail testing scenario was created for each item. The test assessment was established based on the conformance of data exchange procedures and the accuracy of data packet messages. Under the established technical standard, the number of times that tests should be performed was thought set to 30 and the success rate was set to 95%. The purpose of this study is to help the ITS of Korea perform the integrated management of transportation information by researching methods for conformance testing on the technical standard on ITS.

  • PDF

A Study on the Efficient Label Management Methods in High-Speed IP Switching Networks (고속 IP 교환망에서 효율적인 레이블 관리 방식에 관한 연구)

  • Shim, Jae-Hun;Chang, Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.527-538
    • /
    • 2004
  • In this paper, we present the flow aggregation method and the FLTC(flow lasting time control) algorithm to reduce the number of flows and solve the scalability problem in high speed IP switching networks. The flow aggregation based on the destination address could reduce the total number of flows, improve the label efficiency, and increase the total amount of the switched packets. The FLTC algorithm also eliminates the waste of label by deleting the flow binding efficiently. With the traces of real Internet traffics, we evaluate the performance of these schemes by simulation. The label efficiency, the average number of label used, and the percentage of packets switched and the number of packets switched are used as performance measures for this simulation.

Traffic Management of Integrated Services using ATM Networks (ATM 망을 이용한 통합서비스의 트래픽 관리)

  • Kim, Hoon;Park, Jong-Dae;Nam, Sang-Shic;Park, Kwang-Chae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1477-1480
    • /
    • 2001
  • 기존 통신사업자가 급변하는 통신시장에 대응하기 위한 구체적 접근방법에 초점을 맞추어 통신기술의 변화와 이에 따른 기존망을 어떻게 개선하여야만 수익성에 차질을 빚지 않을 수 있느냐가 전재 조건이 된다. 먼저 통신기술의 변화에 따른 망의 진화방향을 음성의 패킷화 실현, 망 구조의 단순화 및 통합화를 통한 운용비용의 절감, 향후 신규서비스의 수용에 용이한 방향이 있어야 한다. 본 논문에서는 ATM을 중심으로 한 차세대 교환망에서 음성과 데이터가 동일 패킷망을 사용하므로서 망 대역폭을 효율적으로 활용하는 방법과 유효 대역 사용률을 향상하는 유연한 대역관리 방법에 대해 개괄적으로 논하였으며, 이를 바탕으로 대역폭 할당 프로토콜을 분석한 수 있는 모델을 제안하고, 주어진 음성 및 데이터 트래픽의 요구와 제약을 조건으로 시스템 파라미터를 최적화하기 위해 update interval 시간과 음성과 데이터 트래픽에 예약된 슬롯의 수를 사용하였다. 분석적인 모델은 성능에 관한 트래픽 유형들의 영향뿐만 아니라 혼합 트래픽 시스템의 동적 할당 방법과 대역관리 방법을 제공한다.

  • PDF

An Action Pattern Analysis System of the Embedded Type about Network Users (네트워크 사용자에 대한 임베디드형 행동패턴 분석시스템)

  • Jeong, Se-Young;Lee, Byung-Kwon
    • The KIPS Transactions:PartA
    • /
    • v.17A no.4
    • /
    • pp.181-188
    • /
    • 2010
  • In this study, we suggest the system to analyze network users' action patterns by using Data-Mining Technique. We installed Network Tap to implement the analysis system of network action and copied the network packet. The copied packet is stored at the database through MainMemoryDB(MMDB) of the high-speed. The stored data analyze the users' action patterns by using Data-Mining Technique and then report the results to the network manager on real-time. Also, we applied the standard XML document exchange method to share the data between different systems. We propose this action pattern analysis system operated embedded type of SetToBox to install easily and support low price.

TPC-BS: Transmission Power Control based on Binary Search in the Wireless Sensor Networks (TPC-BS: 센서 네트워크에서 이진검색 방법을 이용한 빠른 전송전력 결정 방법)

  • Oh, Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1420-1430
    • /
    • 2011
  • This paper proposes a new method to optimize energy consumption in a wireless modem by setting up a transmission power value according to the distance between nodes and circumstance in the MAC layer of IEEE 802.15.4. The proposed method can dynamically find an optimal transmission power range using the binary search scheme and minimize overhead caused by multiple message transmissions when determining the optimal transmission power. The determined transmission power is used for transmitting data packets and can be modified dynamically depending on the changes in a network environment when exchanging data packets and acknowledgement signals. The results of the simulations show 30% reduction in energy consumption while 2.5 times increase in data transmission rate per unit of energy comparing with IEEE 802.15.4 standard.

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

Implementation of ATM Switch Interface Function for Radio Network Controller in IMT-2000 Asynchronous System (IMT-2000 비동기 시스템에서 무선망 제어국의 ATM 스위치 정합 기능 구현)

  • JANG, J.D.;JANG, M.S.
    • Electronics and Telecommunications Trends
    • /
    • v.16 no.6 s.72
    • /
    • pp.1-8
    • /
    • 2001
  • IMT-2000 비동기 시스템은 단말기, 기지국과 무선망 제어국으로 구성되는 무선 접속망 그리고 핵심망 등으로 구성된다. 특히 IMT-2000 비동기 시스템의 무선망 제어국은 기지국과 접속 기능을 가지는 기지국 정합용 무선 접속 서브 시스템, 무선 트래픽 채널의 소프트 핸드오프 처리 기능을 가지는 트래픽 처리용 무선 접속 서브 시스템, 무선망 제어국을 제어하는 무선망 제어국 제어용 서브 시스템, 그리고 회선 및 패킷 교환망을 수용하는 핵심망 및 타 무선망 제어국과의 접속 기능을 수행하는 망 정합용 무선 접속 서브 시스템으로 구성된다. 본 논문에서는 다양한 서비스 품질 파라미터를 갖는 서비스를 지원하기 위한 전달 기능으로서 ATM을 기반으로 하는 ATM 스위치 망을 IMT-2000 비동기 시스템의 무선망 제어국에 적용하여 무선망 제어국의 각 서브 시스템 간 접속시켜 통신 경로 제공 기능을 수행하도록 하였다. 따라서 기지국과 핵심망 사이를 상호 연결하여 음성 및 데이터의 트래픽 정보와 제어 정보를 전달하는 기능을 수한다. 이와 같이 IMT-2000 비동기 시스템에서는 무선망 제어국 내의 서브 시스템과의 접속은 ATM 스위치를 통하여 사용자의 요구에 따라 가변적으로 필요한 대역폭을 제공함으로써 사용자의 요구에 부합되는 통신 수단을 제공할 뿐만 아니라 기존의 IMT-2000 이전 시스템의 서비스 보다는 훨씬 향상된 품질의 패킷 데이터와 멀티미디어 서비스를 포함하는 오디오, 비디오, 그리고 데이터 서비스를 제공할 수 있다.

An Address Autoconfiguration Algorithm of Mobile IPv6 through Internet Gateway in Ad-Hoc Networks (Mobile IPv6기반 Ad-Hoc 네트워크에서의 Internet Gateway를 통한 IP주소 자동 할당 방법)

  • Choi Jung-Woo;Park Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.150-155
    • /
    • 2006
  • A hybrid Ad-hoc network connected to the Internet needs an IP address configuration to communicate with the Internet. Most of proposed address autoconfiguration algorithms are node based. The node based address autoconfiguration algorithms waste bandwidth and consume much battery in mobile ad-hoc networks. In this paper, we propose the address allocation algorithm in hybrid Mobile ad-hoc network (MANET). The proposed algorithm reduces network traffic by transferring address configuration packet to the internet gateway by unicast method. Moreover, our IP address configuration algorithm also reduces battery consumption and address configuration time by decreasing number of configuration packets on internet gateway.

Adaptive Transmission Scheme According to Vehicle Density in IEEE 802.11p MAC Protocol (IEEE 802.11p MAC 프로토콜에서 차량밀도에 따른 적응전송기법)

  • Woo, Ri-Na-Ra;Han, Dong-Seog
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.4
    • /
    • pp.53-58
    • /
    • 2012
  • The roadside unit (RSU) collects vehicle information from vehicles in the intelligent transportation system (ITS). The vehicle density on the road within the communication range of a RSU is a time varying parameter. The higher the vehicle density, the more vehicle information can be collected. Therefore, the probability of packet collision will be raised. In this paper, an adaptive transmission scheme is proposed to improve the probability of packet reception rate by changing the data rate and transmission period according to the vehicle density. The performance of IEEE 802.11p MAC protocol that is a standard for vehicular communications is evaulated in terms of the vehicle density with the ns-2,33 simulator.

MIB-II based Algorithm for hierarchical network analysis and detection of detour routing paths (MIB-II 기반 계층적 네트워크 구조 분석 및 패킷우회 검출 알고리즘)

  • 김진천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1442-1448
    • /
    • 2003
  • Network Management become more and more important issue in the network environment in which many applications such as Mail, teleconferencing, WWW and database software are operated. It can be possible for The Bridge and Router forwarding data to select next hop device which results in routing incorrect path from the viewpoint of network design. In this paper we address the problem of finding the detour routing path due to incorrect setting on routing devices. We propose the new algorithm for finding detour muting path based on hierarchical network structure analysis using information from SNMP MIB. To prove the correctness of the unposed algorithm we have done simulation with predefined data. Simulation results show that the algorithm finds detour path correctly.