• 제목/요약/키워드: Digital Network

검색결과 3,840건 처리시간 0.029초

유무선 혼합망에서 TCP와 Snoop 프로토콜 비교에 관한 연구 (Comparison about TCP and Snoop protocol on wired and wireless integrated network)

  • 김창희
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.141-156
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. The Snoop Protocol was designed for the wired network by putting the Snoop agent module on the BS(Base Station) that connect the wire network to the wireless network to complement the TCP problem. The Snoop agent cash the packets being transferred to the wireless terminal and recover the loss by resending locally for the error occurred in the wireless link. The Snoop agent blocks the unnecessary congestion control by preventing the dupack (duplicate acknowledgement)for the retransmitted packet from sending to the sender and hiding the loss in the wireless link from the sender. We evaluated the performance in the wired/wireless network and in various TCP versions using the TCP designed for the wired network and the Snoop designed for the wireless network and evaluated the performance of the wired/wireless hybrid network in the wireless link environment that the continuous packet loss occur.

인터넷 서비스 가입자망을 통합 관리하는 망 관리 시스템의 설계 및 구현 (Design and Implementation of Integrated Network Management System for Internet Service Subscribers Network)

  • 윤병수;김채영
    • 한국멀티미디어학회논문지
    • /
    • 제7권2호
    • /
    • pp.283-291
    • /
    • 2004
  • 인터넷 서비스 가입자망은 다양한 멀티미디어 서비스를 제공하는 새로운 대안으로 제시되고 있는 망이지만 접속 방식에 따라서 여러 가지 형태와 특성을 가지고 있다. 접속 방식 별로 여러 가지의 이기종(異機種) 장비들이 배치되고 있으며, 전국적으로 분산된 가입자 망 장비 및 자원에 대한 효율적이며 집중적인 통합 관리를 위해서는 관리되는 장비의 종류에 무관한 일반적인 정보 모델인 단일화된 개념적/추상적 관리객체 모델이 요구된다. 본 논문은 인터넷 서비스 가입자망을 통합 관리하기 위한 추상적이며 논리적인 관리객체 모델을 제시하였다. 그리고 이를 기반으로 UML을 이용한 객체지향 방법론을 적용하여 가입자망인 DOCSIS 기반의 케이블데이터 서비스를 위한 가입자망과 VDSL서비스를 위한 가입자망에 대해 동일한 모델을 적용하여 하나의 통합된 가입자망을 관리할 수 있는 시스템을 설계하고 구현하였다.

  • PDF

초고속 인터넷서비스를 위한 케이블 데이터 가입자 망관리 시스템 설계 및 구현 (Design and Implementation of Cable Data Subscriber Network Management System for High Speed Internet Service)

  • 윤병수;하은주
    • 인터넷정보학회논문지
    • /
    • 제5권3호
    • /
    • pp.87-98
    • /
    • 2004
  • 일반 가입자들에게 초고속 인터넷 서비스를 제공하기 위해서 구성되는 가입자 망은ADSL, VDSL, DOCSIS 등 다양한 종류의 접속방식과 그에 따른 이기종(이기종)의 장비들로 이루어져 있다. 이러한 가입자 망은 전국적으로 분산되어 있으며, 분산된 가입자 망은 효과적이며 집중화된 형태로 관리하기 위해서는 다양한 형태의 접속방식을 지원하는 이기종 장비 및 단말들의 상위 개념으로서 추상적이며 논리적인 객체 관리모델이 필요하다. 본 논문은 통합된 계층적 망관리를 가능하게 하는 인터넷 가입자 망에 대한 모델링 구조론 RM-ODP흘 이용하여 제시하였다. 그리고 가입자 망의 예로서 UML을 이용한 객체지향 방법론을 채택하여 DOCSIS의 HFC 가입자망에 대한 관리 시스템을 설계하고 구현하였다.

  • PDF

Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구 (A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

무선 센서네트워크에서 네트워크수명 극대화 방안 (A New Scheme for Maximizing Network Lifetime in Wireless Sensor Networks)

  • 김정삼
    • 디지털산업정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.47-59
    • /
    • 2014
  • In this paper, I propose a new energy efficient clustering scheme to prolong the network lifetime by reducing energy consumption at the sensor node. It is possible that a node determines whether to participate in clustering with certain probability based on local density. This scheme is useful under the environment that sensor nodes are deployed unevenly within the sensing area. By adjusting the probability of participating in clustering dynamically with local density of nodes, the energy consumption of the network is reduced. So, the lifetime of the network is extended. In the region where nodes are densely deployed, it is possible to reduce the energy consumption of the network by limiting the number of node which is participated in clustering with probability which can be adjusted dynamically based on local density of the node. Through computer simulation, it is verified that the proposed scheme is more energy efficient than LEACH protocol under the environment where node are densely located in a specific area.

Home Network Control Protocol for Networked Home Appliances and Its Application

  • Lee Jae-Min;Myoung Kwan-Joo;Kim Dong-Sung;Kwon Wook-Hyun;Ko Beom-Seog;Kim Young-Man;Kim Yo-Hee
    • 정보통신설비학회논문지
    • /
    • 제1권1호
    • /
    • pp.26-39
    • /
    • 2002
  • This paper describes design and implementation of home network control protocol for networked home appliances. The proposed network protocol has four-layered protocol structure and device-modem interface structure for the flexibility of modems based on power line communication. The standard message set is specified to guarantee the interoperability between various home appliances The proposed protocol can be easily implemented because it has minimum network overhead.

  • PDF

극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘 (An Efficient Routing Algorithm for extreme networking environments)

  • 왕종수;서두옥
    • 디지털산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.

파워 빔 구조에서 GTS 기반 센서 데이터 수집 방안 (A GTS-based Sensor Data Gathering under a Powerful Beam Structure)

  • 이길흥
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.39-45
    • /
    • 2014
  • This paper proposes an architecture of a sensor network for gathering data under a powerful beam cluster tree architecture. This architecture is used when there is a need to gather data from sensor node where there is no sink node connected to an existing network, or it is required to get a series of data specific to an event or time. The transmit distance of the beam signal is longer than that of the usual sensor node. The nodes of the network make a tree network when receiving a beam message transmitting from the powerful root node. All sensor nodes in a sink tree network synchronize to the superframe and know exactly the sequence value of the current superframe. When there is data to send to the sink node, the sensor node sends data at the corresponding allocated channel. Data sending schemes under the guaranteed time slot are tested and the delay and jitter performance is explained.

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구 (A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구 (A Study for Detection Accuracy Improvement of Malicious Nodes on MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.