• Title/Summary/Keyword: 패킷 서비스 시간

Search Result 368, Processing Time 0.023 seconds

Fast Handover Scheme for MIPv6 Based on IEEE 802.16e (IEEE 802.16e 기반 MIPv6망에서의 고속 핸드오버 기법)

  • Lim, Chi-Hun;Oh, Ryong;Dong, Jeong-Sik;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8A
    • /
    • pp.802-812
    • /
    • 2007
  • A Fast handover protocols for Mobile IPv6 networks can support seamless service by reducing handover latency to mobile nodes. To gain advantage derived from the fast handover in IEEE 802.16e networks, we propose a new fast handover protocol using a multiple simultaneous binding mechanism and a handover protocol based on trigger event for IEEE 802.21 in order to integrate IEEE 802.16e handover protocol and FMIPv6 handover protocol using link layer trigger. Through the numerical analysis, we compare performance of the proposed protocol and FMIPv6 protocol.

A Mechanism for Controling Realtime Streaming Utilizing RTCP in SDN Environment (SDN에서 RTCP를 활용한 효과적인 실시간 스트리밍 제어 메커니즘)

  • Kim, Tae Jin;Kim, Kangseok;Hong, Manpyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.160-163
    • /
    • 2014
  • IP 네트워크를 통해 전송되는 실시간 스트라밍은 네트워크 상태에 따라 데이터 손실 및 전송 지연의 문제가 발생 할 수 있다. 이에 멀티미디어 네트워킹 애플리케이션은 RTP(Realtime Transport Protocol)와 RTCP(RTP Control Protocol)를 지원하는 RTSP(Realtime Streaming Protocol)를 사용한다. RTSP를 사용하는 송신단은 패킷 손실과 전송지연이 발생할 경우 끊김 없는 멀티미디어 스티리밍을 제공하기 위해 네트워크 상태에 따라 전송률을 변경한다. 하지만 전송률이 낮아지면 멀티미디어 품질이 떨어지게 된다. 만약 짧은 시간 동안 전송률이 빈번하게 변경된다면 일관성 있는 품질의 서비스를 제공하기 어렵다. 본 논문에서는 SDN 환경에서 실시간 스트리밍을 효과적으로 제어하기 위해 중앙 컨트롤러가 RTCP를 수신하고 송신단의 전송률과 현재 링크의 가용 전송율을 추정한다. 추정된 가용 전송율이 송신단의 전송률보다 낮다며 각 스위치의 활성화된 플로우 엔트리가 낮은 스위치로 라우팅 경로를 선택하는 메커니즘을 제안한다.

Network Classification of P2P Traffic with Various Classification Methods (다양한 분류기법을 이용한 네트워크상의 P2P 데이터 분류실험)

  • Han, Seokwan;Hwang, Jinsoo
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Security has become an issue due to the rapid increases in internet traffic data network. Especially P2P traffic data poses a great challenge to network systems administrators. Preemptive measures are necessary for network quality of service(QoS) and efficient resource management like blocking suspicious traffic data. Deep packet inspection(DPI) is the most exact way to detect an intrusion but it may pose a private security problem that requires time. We used several machine learning methods to compare the performance in classifying network traffic data accurately over time. The Random Forest method shows an excellent performance in both accuracy and time.

Reliable Hybrid Multicast using Multi-layer Transmission Path (다계층 전송경로를 이용한 신뢰성 있는 하이브리드 멀티캐스트)

  • Gu, Myeong-Mo;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.35-40
    • /
    • 2019
  • It is important to constantly provide service in real-time multimedia applications using multicast. Transmission path reconstruction occurs in hybrid multicast using Internet Protocol (IP) multicast and ALM in order to adapt the network status to things like congestion. So, there is a problem in which real-time QoS is reduced, caused by an increase in end-to-end delay. In this paper, we want to solve this problem through multi-layer transmission path construction. In the proposed method, we deploy the control server and application layer overlay host (ALOH) in each multicast domain (MD) for hybrid multicast construction. After the control server receives the control information from an ALOH that joins the MD, it makes a group based on the hop count and sends it to the ALOH in each MD. The ALOH in the MD performs the role of sending the packet to another ALOH and constructs the multi-layered transmission path in order of priority by using control information that is received from the control server and based on the delay between neighboring ALOHs. When congestion occurs in, or is absent from, the ALOH in the upper MD, the ALOH selects the path with the highest priority in order to reduce end-to-end delay. Simulation results show that the proposed method could reduce the end-to-end delay to less than 289 ms, on average, under congestion status.

Combination of Token Bucket and AMP Schemes to Solve Buffer Underflow and Overflow of Video Streaming in Wireless Communication (무선통신 환경에서 비디오 스트리밍의 버퍼 언더플로우와 오버플로우를 해결하기 위한 토큰버킷과 AMP 기법의 결합)

  • Lee, Hyun-no;Kim, Dong-hoi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1330-1338
    • /
    • 2015
  • In wireless communication network, the amount of packet data for the video streaming in the playout buffer of the receiver is changed with time according to network condition. If the amount of packet data is less than a specific buffer amount, the buffer underflow problem is generated. On the contrary, if the amount of packet data is more than a given buffer amount, the buffer overflow problem is occurred. When the playout of the video streaming is processed, these buffer underflow and overflow problems cause stop and skip phenomenons and then provide the discontinuity of playout. Therefore, to solve the buffer underflow and overflow problems of the video streaming in wireless communication network, This paper analyzes the combined effect of Token Bucket scheme, which controls the bursty traffic, and AMP(Adaptive Media Playout) scheme, which adaptively changes the playout speed of receiver. Through simulation, we found that the combination of Token Bucket and AMP schemes provides the superiority in terms of the occurrence number of buffer underflow and overflow, the stop duration time and the number of removed frames generated by underflow and overflow, and PSNR.

An Algorithm for Efficient use of Label Space over MPLS Network with Multiple Disconnent Timers (MPLS 망에서 복수 연결해제 타이머를 이용한 레이블 공간의 효율적 사용방법)

  • Lee, Sun-Woo;Byun, Tae-Young;Han, Ki-Jun;Jeong, Youn-Kwae
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.24-30
    • /
    • 2002
  • Label switching technology is currently emerging as a solution for the rapidly growing of Internet traffic demand. Multiprotocol label switching(MPLS) is one of the standards made by the Internet Engineering Task Force(IETE) intended to enhance speed, scalability, and inter-opearability between label switching technologies. In MPLS, utilization of label space is a very important factor of network performance because labels are basic unit in packet switching. We propose a algorithm to effectively use label space by a multiple disconnect timer at the label switching router. Our algorithm is based on multiple utilization of the connection release timer over the MPLS network with multiple domains. In our algorithm, a relatively linger timeout interval is assigned to the traffic with higher class by the aid of the packet classifier. This reduces delay for making a new connection and also reduces the amount of packets which will be routed to the layer 3. Simulation results shows that reduction of required label number in MPLS network and this indicate our algorithm offers better performance than the existing ones in term of utilization of label space.

Performance Analysis of Mobility Support Protocols for IPv6 over Wireless LAN (IEEE 802.11 무선랜 환경에서의 이동성 지원 IPv6프로토콜의 성능분석)

  • Hwang Seung-Hee;Han Youn-Hee;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.391-403
    • /
    • 2005
  • Several nv6 mobility support protocols for mobile Internet services are proposed in IETP : Mobile Ipv6, Hierarchical Mobile Ipv6, and Fast Handovers over Mobile Ipv6. Recently, IEEE 802.11 network has also been widely deployed in public areas for mobile Internet services. In the near future, IPv6 mobility support over IEEE 802.11 network is expected to be a key function to actualize the All If-based mobile various services. For appropriate application of these protocols, the IPv6 mobility support protocols should be analyzed according to their characteristics in terms of signaling, handover latency, lost packets, and required buffer sire as well as the impact of lower layer such as IEEE 802.11 network. In this paper, we analyze the performance of the protocols over IEEE 802.11 network. We define a packet-level traffic model, a network system model, and a mobility model. From these models, we construct a framework for the performance analysis. We also make cost functions to formalize each protocol's performance. Lastly, we analyze the effect of varying parameters used to show diverse numerical results, and compare with each other. From the analysis results, it is concluded that each Protocol has contrary or contrastive advantages with other Protocols, so there is no protocol that holds a dominant position.

Design and Implementation of Network Adaptive Streaming through Needed Bandwidth Estimation (요구대역 측정을 통한 네트워크 적응형 스트리밍 설계 및 구현)

  • Son, Seung-Chul;Lee, Hyung-Ok;Kwag, Yong-Wan;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.380-389
    • /
    • 2010
  • Since the internet is intend to be the best effort service, the system that stream a large amount of high quality medias need a techniques to overcome the network status for implementation. In this paper, we design and implement a method that estimate quickly whether network permits the needed bandwidth of media and a method that control QoS through that. Presented system uses Relative One-Way Delay(ROWD) trend in the case of the former, and leverages temporal encoding among Scalable Video Coding(SVC) that is apt to apply real time comparatively in the case of the latter. The streaming server classifies the medias by real time to several rates and begins transmission from top-level and is reported ROWD trend periodically from the client. In case of the server reported only 'Increase Trend', the sever decides that the current media exceeds the available bandwidth and downgrades the next media level. The system uses probe packet of difference quantity of the target level and the present level for upgrading the media level. In case of the server reported only 'No Increase Trend' by the ROWD trend response of the probe packet from client, the media level is upgraded. The experiment result in a fiber to the home(FTTH) environment shows progress that proposed system adapts faster in change of available bandwidth and shows that quality of service also improves.

A Seamless Handoff Method Using Multiple Gateway in Hybrid Ad-hoc Networks (하이브리드 Ad-hoc 네트워크에서 다중 게이트웨이를 이용한 끊김없는 핸드오프 기법)

  • Cho Sung-Min;Park Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.39-45
    • /
    • 2006
  • n a hybrid ad-hoc network, wired network and a mobile ad-hoc network are connected by the internet gateway. To provide seamless service for internet users in the hybrid ad-hoc network, an efficient internet gateway selection technique and a fast handover technique are needed. In this paper, we propose a seamless handoff technique for providing mobility of mobile hosts in hybrid ad-hoc networks. The proposed internet gateway re-registration algorithm improves general handoff performance. Moreover, the handoff processing time within certain range of area is reduced by using mobility management agent(MMA). In addition the packet loss is reduced when handoff occurs out of the range of MMA by tunneling technique.

A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network (무선 메쉬 망의 서비스 품질 향상을 위한 확률적 부하 분담 기법)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.375-382
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.