• 제목/요약/키워드: Data packet

검색결과 1,636건 처리시간 0.032초

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권3호
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

AP-SDN: Action Program enabled Software-Defined Networking Architecture

  • Zheng Zhao;Xiaoya Fan;Xin Xie;Qian Mao;Qi Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1894-1915
    • /
    • 2023
  • Software-Defined Networking (SDN) offers several advantages in dynamic routing, flexible programmable control and custom application-driven network management. However, the programmability of the data plane in traditional SDN is limited. A network operator cannot change the ability of the data plane and perform complex packet processing on the data plane, which limits the flexibility and extendibility of SDN. In the paper, AP-SDN (Action Program enabled Software-Defined Networking) architecture is proposed, which extends the action set of SDN data plane. In the proposed architecture, a modified Open vSwitch is utilized in the data plane allowing the execution of action programs at runtime, thus enabling complex packet processing. An example action program is also implemented which transparently encrypts traffic for terminals. At last, a prototype system of AP-SDN is developed and experiments show its effectiveness and performance.

A Wireless Downlink Packet Scheduling Algorithm for Multimedia Traffic (멀티미디어 트래픽에 대한 무선 환경에서의 순방향 패킷 스케줄링 알고리즘)

  • 김동회;류병한
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제39권12호
    • /
    • pp.539-546
    • /
    • 2002
  • In this paper, we consider a wireless multimedia environment to service both real-time video traffic and non-real-time WWW-application traffic In our suggested new packet scheduling algorithm, we consider both the accumulation counter and SIR to reduce delay in real-time traffic. In addition, our packet scheduling algorithm gives priority first to real-time video traffic service and then to non-real-time internet Packet service when real-time traffic service is absent. From the simulation results, we find that the AC (Accumulation Counter) scheme has much smaller delay than the conversional M-LWDF scheme for real-time video data users, which has a special quality sensitive to its own delay. We also consider the transmission structure of using both the frame period in the time-axis and the OVSF codes in the code-axis at the same time, which is similar to the structure of HSDPA system.

Passive Overall Packet Loss Estimation at the Border of an ISP

  • Lan, Haoliang;Ding, Wei;Zhang, YuMei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3150-3171
    • /
    • 2018
  • In this paper, a heuristic method that leverages packet traces captured at the entire boarder of an ISP to distinguish and estimate the overall packet loss within an ISP's management domain (Intra_Path_Loss) and that in the outside Internet (Inter_Path_Loss) is proposed. Our method is inspired by that packet losses happened at different locations will cause different TCP sequence number patterns at the border of an ISP. Thereby, we leverage these TCP sequence number patterns to build a series of heuristic rules to estimate Intra_Path_Loss and Inter_Path_Loss, respectively. We do this work with an eye towards showing that the overall packet losses defined and estimated in this paper can provide the operators with some valuable information to help them precisely grasp the overall performance of network paths and narrow down the range of network anomalies. The proposed method is rigorously validated with simulations, and finally the results from a regional academic network JSERNET verify its effectiveness and practicability.

Strengthening Packet Loss Measurement from the Network Intermediate Point

  • Lan, Haoliang;Ding, Wei;Zhang, YuMei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.5948-5971
    • /
    • 2019
  • Estimating loss rates with the packet traces captured from some point in the middle of the network has received much attention within the research community. Meanwhile, existing intermediate-point methods like [1] require the capturing system to capture all the TCP traffic that crosses the border of an access network (typically Gigabit network) destined to or coming from the Internet. However, limited to the performance of current hardware and software, capturing network traffic in a Gigabit environment is still a challenging task. The uncaptured packets will affect the total number of captured packets and the estimated number of packet losses, which eventually affects the accuracy of the estimated loss rate. Therefore, to obtain more accurate loss rate, a method of strengthening packet loss measurement from the network intermediate point is proposed in this paper. Through constructing a series of heuristic rules and leveraging the binomial distribution principle, the proposed method realizes the compensation for the estimated loss rate. Also, experiment results show that although there is no increase in the proportion of accurate estimates, the compensation makes the majority of estimates closer to the accurate ones.

Performance Issues with General Packet Radio Service

  • Chakravorty, Rajiv;Pratt, Ian
    • Journal of Communications and Networks
    • /
    • 제4권4호
    • /
    • pp.266-281
    • /
    • 2002
  • The General Packet Radio Service (GPRS) is being deployed by GSM network operators world-wide, and promises to provide users with “always-on” data access at bandwidths comparable to that of conventional fixed-wire telephone modems. However, many users have found the reality to be rather different, experiencing very disappointing performance when, for example, browsing the web over GPRS. In this paper, we examine the causes, and show how unfortunate interactions between the GPRS link characteristics and TCP/IP protocols lead to poor performance. A performance characterization of the GPRS link-layer is presented, determined through extensive measurements taken over production networks. We present measurements of packet loss rates, bandwidth availability, link stability, and round-trip time. The effect these characteristics have on TCP behavior are examined, demonstrating how they can result in poor link utilization, excessive packet queueing, and slow recovery from packet losses. Further, we show that the HTTP protocol can compound these issues, leading to dire WWW performance. We go on to show how the use of a transparent proxy interposed near the wired-wireless border can be used to alleviate many of these performance issues without requiring changes to either client or server end systems.

A Study of WAP Packet using Turbo Code Scheme in Bluetooth piconet Environment (블루투스 피코넷 환경에서 터보코드 기법을 이용한 WAP 패킷의 연구)

  • Moon, Il-Young;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.553-556
    • /
    • 2005
  • It is analyzed that WAP packet transmission time to improve performance of WAP using SAR algorithm in Bluetooth channel. The order for SAR algorithm to improve the transfer capability, it is fragmented in WTP total messages that are coming down from upper layer and then the packets are sent one at time in baseband. And it is studied that transmission time for WAP over bluetooth according to DM1, DM3 or DM5 packet type using SAR algorithm in Bluetooth piconet environment. This SAR algorithm decreases WAP packet transmission time of L2CAP baseband packets by sending packet which are spanning multiple slots.

  • PDF

A Study on the Application method of Server Router for Reliable Multicast (신뢰성 있는 멀티캐스트를 위한 서버라우터의 활용 방안에 관한 연구)

  • Choi, Won-Hyuck;Lee, Kwang-Jae;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2002년도 춘계학술발표논문집 (하)
    • /
    • pp.1483-1486
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The purpose of this dissertation is to find a method to utilize sewer routers to form multicasts that can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM method has been used. Three packets per TCP transmission control window size are used for transport and an ACK is used for flow control. A CBR and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

Fault Tolerant Data Aggregation for Reliable Data Gathering in Wireless Sensor Networks (무선센서네트워크에서 신뢰성있는 데이터수집을 위한 고장감내형 데이터 병합 기법)

  • Baek, Jang-Woon;Nam, Young-Jin;Jung, Seung-Wan;Seo, Dae-Wha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제35권9B호
    • /
    • pp.1295-1304
    • /
    • 2010
  • This paper proposes a fault-tolerant data aggregation which provides energy efficient and reliable data collection in wireless sensor networks. The traditional aggregation scheme does not provide the countermeasure to packet loss or the countermeasure scheme requires a large amount of energy. The proposed scheme applies caching and re-transmission based on the track topology to the adaptive timeout scheduling. The proposed scheme uses a single-path routing based on the traditional tree topology at normal, which reduces the dissipated energy in sensor nodes without any countermeasure against packet loss. The proposed scheme, however, retransmits the lost packet using track topology under event occurrences in order to fulfill more accurate data aggregation. Extensive simulation work under various workloads has revealed that the proposed scheme decrease by 8% in terms of the dissipated energy and enhances data accuracy 41% when the potential of event occurrence exists as compared with TAG data aggregation. And the proposed scheme decrease by 53% in terms of the dissipated energy and shows a similar performance in data accuracy when the potential of event occurrence exists as compared with PERLA data aggregation.