• Title/Summary/Keyword: Active packet

Search Result 139, Processing Time 0.029 seconds

Performance Analysis of TCP Variants using AQM and ECN (AQM과 ECN을 사용한 TCP 변종의 성능 분석)

  • Matten, Ahmad;Anwar, Adnan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.129-137
    • /
    • 2016
  • Transmission Control Protocol as a transport layer protocol provides steady data transfer service. There are some serious concerns about the performance of TCP over diverse networks. The vital concern in TCP network environment is congestion which may occur due to quick transmission rates or because of large number of new connections entering the network at the same time. Size of queues in routers grows thus resulting in packet drops. Retransmission of the dropped packets, and reduced throughput can prove costly. Explicit Congestion Notification (ECN) in conjunction with Active Queue Management mechanisms (AQM) such as Random early detection (RED) is used for packet marking rather than dropping. In IP packet header ECN bits can be added as a sign of congestion thus avoiding needless packet drops. The proposed ECN and AQM mechanism can be implemented with help of ns2 simulator and the performance can be tested on different TCP variants.

Interference-Free Multipath Routing Protocol for M2M Wireless Network to Enhance Packet Delay Performance (M2M 무선 네트워크에서 패킷 지연 성능 향상을 위한 간섭 회피 다중 경로 라우팅 기법)

  • Heo, Hyeong-Min;Hwang, Jun-Ho;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1259-1266
    • /
    • 2010
  • M2M communication is considered as a key enabling technology to monitor the status of objects, vehicles, humans through auto-configuring wireless networks. In M2M network, there are active research activities to enhance the reliability on data while being collected from wireless sensor network. The reliability issue becomes more important as wireless sensor networks carry multimedia data, which is delay sensitive. The interference caused by the adjacent neighbor sensor nodes is a major factor in network performance degradation, which becomes more severe in multi-hop routing environment. In this paper, we propose inerfernce-free multipath routing protocol for M2M wireless network for enhancement of packet delay performance. The simulation results show that the proposed routing algorithm outperforms the existing routing protocols in terms of packet delay and throughput.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network (Ad Hoc 네트워크를 위한 안전한 경로발견 프로토콜 제안)

  • Park Young-Ho;Kim Jin-Gyu;Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.3
    • /
    • pp.30-37
    • /
    • 2005
  • Ad hoc network is a collection of mobile nodes without using any infrastructure, it , is using in the various fields. Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose two secure route-discovery protocols. One is a protocol using hash function. This protocol is weak in active attack but has some merits such as small data of transmission packet and small computation at each hop. The other is a protocol using hash function and public key cryptography. This protocol is strong in active attack.

  • PDF

Improved Sensor MAC Protocol for Wireless Sensor Network (무선 센서 네트워크를 위한 향상된 센서 MAC 프로토콜)

  • Lee, Ju-a;Kim, Jae-Hyun;Min, Seung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1138-1146
    • /
    • 2006
  • It is very important for the sensor network to save battery capacity. Switching active mode to sleep mode is used for S-MAC protocol and expiring timer before end of the active part is used for T-MAC in order to extend battery life span. We proposed IS-MAC (Improved Sensor MAC) which gives more energy efficiency than S-MAC and T-MAC To improve energy efficiency in sensor network, we used the threshold value in buffer to transmit data packet and proposed the method to reduce the number of control packets which cause extra battery consumption. Based on the analytical results, we found that the proposed IS-MAC protocol shows better performance than conventional MAC protocols.

SLA Parameter Measurement Of Policy Routing Network (Policy Routing Network에서의 SLA 파라메터 측정)

  • Shim, Hoi-Jung;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1597-1600
    • /
    • 2001
  • In-Service-Monitoring을 통하여 네트웍 계층에서 성능저하와 전달되어지는 QOS의 영향을 감시하여 Pro-Active 매니지먼트가 가능하다. 그 결과로서 SLA 보증을 위반하기 전에 성능저하를 조기 발견하여 행동을 취한 수 있게 한다. 본 논문에서는 사용자의 요구조건을 만족하기 위한 네트웍의 구성과 SLA 측정의 제약조건들을 고려하고 Policy Based Routing이 적용되는 네트웍에서 Technology-Specific Parameter인 IP Packet Loss Ratio, IP 패킷전송지연, 패킷지터, 가용도등의 SLA Parameter를 측정하였다.

  • PDF

Design Active Packet Model For Security (보안 강화를 위한 액티브 패킷 모델 설계)

  • 이남석;양일권;박영수;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.826-828
    • /
    • 2001
  • 기존의 네트워크에서는 새로운 프로토콜을 개발하고 전개한다는 것은 많은 표준화 절차를 요구하고, 관련 응용에서 모든 요구를 네트워크가 수용할 수 없기 때문에 제한적이다. 액티브 네트워크는 네트워크에 프로그래밍이 가능하다는 것으로 새로운 네트워크의 패러다임으로 등장하였다. 액티브 네트워크는 복잡한 구조를 갖고 있고, 보안상으로 도 많은 문제점을 갖고 있다. 이 논문에서는 액티브 네트워크의 보안 모텔을 소개하고, 보안과 관련된 새로운 옵션을 추가한 패킷모델, 액티브 네트워크의 구조인 실행환경과 노드 운영체제에서의 패킷 처리 과정을 알아본다.

  • PDF

PAQM: an Adaptive and Proactive Queue Management for end-to-end TCP Congestion Control

  • Ryu Seung Wan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.417-424
    • /
    • 2003
  • In this paper, we introduce and analyze a feedback control model of TCP/AQM dynamics. Then, we propose the Pro-active Queue Management (PAQM) mechanism, which can provide proactive congestion avoidance and control using an adaptive congestion indicator and a control function for wide range of traffic environments. The PAQM stabilizes the queue length around a desired level while giving smooth and low packet loss rates independent of the traffic load level under a wide range of traffic environment. The PAQM outperforms other AQM algorithms such as Random Early Detection (RED) [1] and PI-controller [2]

  • PDF

An Online Buffer Management Algorithm for QoS-Sensitive Multimedia Networks

  • Kim, Sung-Wook;Kim, Sung-Chun
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.685-687
    • /
    • 2007
  • In this letter, we propose a new online buffer management algorithm to simultaneously provide diverse multimedia traffic services and enhance network performance. Our online approach exhibits dynamic adaptability and responsiveness to the current traffic conditions in multimedia networks. This approach can provide high buffer utilization and thereby improve packet loss performance at the time of congestion.

  • PDF

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.