• Title/Summary/Keyword: 패킷교환

Search Result 269, Processing Time 0.024 seconds

The Dynamic Flow Admission Control for Providing DiffServ Efficiently in MPLS Networks (MPLS 네트워크에서 DiffServ를 효율적으로 적용하기 위한 동적 흐름 수락 제어)

  • Im, Ji-Yeong;Chae, Gi-Jun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.45-54
    • /
    • 2002
  • MPLS(Multiprotocol Label Switching) is regarded as a core technology for migrating to the next generation Internet. In this paper, we propose an dynamic flow admission control supporting DiffServ(Differentiated Services) to provide QoS in MPLS networks. Our proposed model dynamically adjusts the amount of admissible traffic based on transmittable capacity over one outgoing port. It then transmits the Packets while avoiding congested area resulting traffic loss. Ingress LSRs find out the congested area by collecting network state information at QoS state update for QoS routing table. Our Proposed model manages the resource efficiently by protecting the waste of resources that is a critical Problem of DiffServ and makes much more flows enter the network to be served.

Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6 (MIPv6의 안전한 바인딩 갱신을 위한 프로토콜 비교 분석)

  • Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.755-762
    • /
    • 2003
  • For the route optimization in the MIPv6, MN(Mobile Node) sends CN(Correspondent Node) a binding update message to notify the binding of is HoA(Home Address) with its new CoA(Care-of Address). However, unautenticated binding updates expose the involved MN and CM to various sucurity attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols, and the performance of packet exchanges and cryptographic operations. Then, we analyze the four typical binding update protocols based on the presented criterions. In addition, we propose some improvement tips for secure binding updates.

Design and Implementation of a Bluetooth Encryption Module (블루투스 암호화 모듈의 설계 및 구현)

  • Hwang, Sun-Won;Cho, Sung;An, Jin-Woo;Lee, Sang-Hoon;Shin, We-Jae
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.276-279
    • /
    • 2003
  • 본 논문에서는 블루투스 장비 간 암호화를 위해 사용되는 암호화 모듈의 설계 및 구현에 관한 내용을 다룬다. 암호화 모듈은 기저 대역내에 암호화 키 생성 모듈과 암호화 엔진 모듈로 구성된다. 암호화 키 생성 모듈은 Cylink사에서 제안한 공개 도메인인 SAFER+(Secure And Fast Encryption Routine) 알고리즘을 사용하여 128bit 키를 생성한다. 그 구성은 키 치환을 위한 치환 함수(key-controlled substitution)와 선형 변환을 위한 PHT(Pseudo-Hadamard Transform)와 Armenian Shuffle 변환기로 구성된다. 암호화 엔진 모듈은 전송 패킷내의 페이로드 데이터와 생성된 사이퍼 키 스트림 데이터와 XOR연산을 통하려 암호화를 행하며 그 구성은 LFSR (Linear Feedback Shift Register)와 합 결합기로 구성된다. 이 중 암호화 키 생성 모듈은 LM(Link Manager)의 PDU(Protocol Data Unit) 패킷을 통해 상호 정보가 교환되므로 암호화키를 생성하는데 있어 시간적 제약이 덜 하다. 따라서 본 논문에서는 변형된 SAFER+ 알고리즘 구현하는데 있어 치환 함수의 덧셈과 XOR, 로그, 지수연산을 바이트 단위의 순차 계산을 수행함으로써 소요되는 하드웨어 용량을 줄이도록 설계하였다. 본 논문에서 제시한 모듈은 블루투스 표준안 버전 1.1에 근거하여 구현하였으며 시뮬레이션 및 테스트는 Xilinx FPGA를 이용하여 검증하였다.

  • PDF

Virtual Cluster-based Routing Protocol for Mobile Ad-Hoc Networks (이동 Ad-hoc 네트워크를 위한 가상 클러스터 방식의 경로 설정 프로토콜)

  • 안창욱;강충구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.544-561
    • /
    • 2002
  • In this paper, we propose a new hybrid type of the routing protocol (Virtual Cluster-based Routing Protocol: VCRP) for mobile ad-hoc networks, based on a virtual cluster, which is defined as a narrow-sense network to exchange the basic information related to the routing among the adjacent nodes. This particular approach combines advantage of proactive routing protocol (PRP), which immediately provides the route collecting the network-wide topological and metric information, with that of reactive routing protocol, which relies on the route query packet to collect the route information on its way to the destination without exchanging any information between nodes. Furthermore, it also provides the back-up route as a byproduct, along with the optimal route, which leads to the VCBRP (Virtual Cluster-based Routing Protocol with Backup Route) establishing the alternative route immediately after a network topology is changed due to degradation of link quality and terminal mobility, Our simulation studies have shown that the proposed routing protocols are robust against dynamics of network topology while improving the performances of packet transfer delay, link failure ratio, and throughput over those of the existing routing protocols without much compromising the control overhead efficiency.

Packet Data Performance Measurement in D-TRS Wireless Network Environment (D-TRS 무선망 환경에서의 패킷 데이터 성능 측정)

  • Song, Byung-Kwen;Jin, Myung-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.6
    • /
    • pp.902-908
    • /
    • 2009
  • TETRA is the standard of Digital Trunked Radio System developed by the ETSI (European Telecommunications Standards Institute). It is currently adopted as Electric Power IT Wireless Backbone Network in Korea, and a national enterprise is going on for versatile utilization of TETRA. To use TETRA wireless network, TETRA modem is very necessary such that performance measurements are very crucial for each TETRA modem by various manufacturers. In this paper, PED (Protocol Evaluation Data) is suggested for PD performance measurement in D-TRS wireless network environment. The performance measurements for different data lengths and transmission intervals are done using TG (Traffic Generator) on Test Bed. The data size is increased by 10 bytes from 10-byte to 400-byte, and it is measured 1,000 times for each transmission interval of 0.5, 1.0, and 1.5 seconds. Based on the transmission time measured, average transmission speed and MER (Message Error Rate) are derived for TETRA Modem performance measurement. Two TMR880i's of EADS are used for TETRA modem, and SwMI (Switching and Management Infrastructure) of EADS is used for switching system in this paper.

IEEE 802.15.4a based Localization Algorithm for Location Accuracy Enhancement in the NLOS Environment (실내 NLOS환경에서 정밀도 향상을 위한 IEEE 802.15.4a 기반의 위치추정 알고리즘)

  • Cha, Jae-Young;Kong, Young-Bae;Choi, Jeung-Won;Ko, Jong-Hwan;Kwon, Young-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1789-1798
    • /
    • 2012
  • IEEE 802.15.4a standard can provide a variety of location-based services for ZigBee or wireless network applications by adapting the time-of-arrival (TOA) ranging technique. The non-line-of-sight (NLOS) condition is the critical problem in the IEEE 802.15.4a networks, and it can significantly degrade the performance of the TOA-based localization. To enhance the location accuracy due to the NLOS problem, this paper proposes an energy-efficient low complexity localization algorithm. The proposed approach performs the ranging with the multicast method, which can reduce the message overhead due to packet exchanges. By limiting the search region for the location of the node, the proposed approach can enhance the location accuracy. Experimental results show that the proposed algorithm outperforms previous algorithms in terms of the energy consumption and the localization accuracy.

The Device Configuration Protocol with Real-Time Processing for QoS Support over IPv6 (IPv6 상에서 QoS 지원을 위한 실시간 처리용 DCP 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.660-668
    • /
    • 2005
  • Recently, the Internet-based communication method has been adopted as an open networking solution in the field of remote control and data acquisition. In the current Internet, most networking applications are developed according to the client-server approach. In this paper, we propose an innovative Device Configuration Protocol (DCP) that exchanges the traditional role between client and server to provide a uniform device interface over the Internet for various field devices. The proposed protocol is implemented as an application-level protocol running on top of the standard TCP/IP protocols. Also, the DCP protocol is extended with real-time processing to work with the FlowLabel of IPv6 for QoS (Quality of Service) support. The simulation results show that the real-time packets can be processed prior to the given deadline regardless of throughput, as compared to the normal packets.

A Study on Mitigation Methods for Broadcast Storm Problem over Vehicular CCN (VCCN에서 Broadcast Storm 문제를 완화시키는 방법에 대한 연구)

  • Yeon, Seunguk;Chae, Ye-eun;Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.429-434
    • /
    • 2019
  • There are several high technologies applied to the driving cars such as self-driving car and connected car for safe and convenient driving. VANET provides useful information such as route selection and gas price by communicating nearby cars and RSUs. VANET prefers CCN rather than traditional TCP/IP stack because CCN offers inherent multicast communication for sharing traffic information as well as traditional unicast. When all participating node rebroadcasts the Interest packets in a Vehicular CCN, the network may suffer from Broadcast Storm Problem. In order to mitigate the effect of the problem and to improve the Data packet transmission, not all but some selected nodes have to rebroadcast the packet. This paper simulates car movements using SUMO and evaluates data transmission performance using ns-3. According to the simulation results, when some selected nodes rebroadcast the Interest packets, the transmission performance improves 10% to 25% depending on the number of requesting nodes.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

A Scheduler and Scheduling Algorithm for Time Slot Assignment based on Wavelength (파장 단위의 Time Solt 할당을 위한 스케줄러 및 스케줄링 알고리즘)

  • Kim Kyoung-Mok;Oh Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.1-7
    • /
    • 2004
  • Increase of internet users and new type of applied traffic such as game, news, distributed computing, online image conference, and real time audio and video have leaded to demand for more bandwidth for each application. This algorithm represents a complex optical exchanger having typical wavelength switching function and time-slotted transmission function. Performance assessment of the proposed OXC (Optical Cross connect) sttucture defines LFS (Limit Frame Size) and VFS (Variable Frame Size) for classification by packet type and calculates the channel effect and loss probability depending the demanded bandwidth by access node increase. Optical exchanger in this type of structure can guarantee future network expansion as well as decrease of frame collision resulted from node increase.