• Title/Summary/Keyword: IP Packet

Search Result 779, Processing Time 0.028 seconds

Implementation and Analysis of the FMIPv6 (Fast Handover for Mobile IPv6) Using Layer 2 Triggers (제2계층 트리거를 이용한 FMIPv6 구현 및 분석)

  • Oh, Seung-Hun;Lee, Sung-Sik;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.551-558
    • /
    • 2005
  • In this paper, we implement the fast handovers for mobile IPv6 (FMIPv6) on Linux system. Due to its dependency on operations in layer-2 (L2), we have added some functions into the network driver to generate triggers as the mobile node moves. We design and implement the FMIPv6 functions divided into two parts as an access router and a mobile node. We compare the packet loss and delay of the FMIPv6 implementation during the handover period with those of the MIPv6 and investigate the performance improvement.

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring (트래픽 모니터링을 통한 P2P 및 웹 하드 다운로드 응용의 파일이름 식별 방법)

  • Son, Hyeon-Gu;Kim, Ki-Su;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.477-482
    • /
    • 2010
  • Recently, advanced Internet applications such as Internet telephone, multimedia streaming, and file sharing have appeared. Especially, P2P or web-based file sharing applications have been notorious for their illegal usage of contents and massive traffic consumption by a few users. This paper presents a novel method to identify the P2P or web-based file names with traffic monitoring. For this purpose, we have utilized the Korean decoding method on the IP packet payload. From experiments, we have shown that the file names requested by BitTorrent, Clubbox, and Tple applications could be correctly identified.

Design and Implementation of ECTP for Reliable Group Communications (신뢰적 그룹통신을 위한 ECTP 설계 및 구현)

  • 박주영;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.916-919
    • /
    • 2003
  • Reliable multicast data transmission in a 1:N environment needs more sophisticated error control mechanism than that of in 1:1 environment due to ACK implosion and duplicated retransmission. Although there have been many related research on error control in reliable multicast, real implemented protocols are rare. As one of the reliable multicast transport protocols, ECTP is selected as an international standard reliable multicast protocol by ITU-T and ISO and implemented on RedHat 7.2 machine by us. In this paper, we evaluate the performance of the error control mechanism in the respect of throughput and generated control packet numbers with a real implementation code. From the results, it is concluded that the suitable values of error control parameters can be obtained from the local group size and network environments.

  • PDF

Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network

  • Chen, Ruey-Shin;Chao, Louis R.;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Video transmission effectiveness in the Ad Hoc network is becoming important recently, if different routing protocols are applied. Some researchers conclude that the reactive protocols are better for file transfer protocol (FTP) and constant bit rate (CBR) or hypertext transfer protocol (HTTP) transmission in an Ad Hoc wireless network but the performance report of video transmission is not much. This study adopts Qualnet (Network Simulator) as a simulation tool for environmental designing and performance testing, and employs an experimental design with eight groups. Our experiment shows that: (1) The performance of AODV (reactive) protocol is better than DSDV, ZRP and DSR when the transmission load has only one video stream; (2) Proactive (DSDV) and Hybrid protocols (ZRP) are better for a smaller Ad Hoc network when it transmits a video stream with some applications (VoIP, FTP and CBR). We conclude that packet loss rate is sensitive to the quality of video transmission and it has negative relationship with Peak Signal-to-Noise Ratio (PSNR) value. In addition, our experiment also shows that PSNR is a simple Metric for the performance evaluation of video transmission.

Development of Network Event Audit Module Using Data Mining (데이터 마이닝을 통한 네트워크 이벤트 감사 모듈 개발)

  • Han, Seak-Jae;Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2005
  • Network event analysis gives useful information on the network status that helps protect attacks. It involves finding sets of frequently used packet information such as IP addresses and requires real-time processing by its nature. Apriori algorithm used for data mining can be applied to find frequent item sets, but is not suitable for analyzing network events on real-time due to the high usage of CPU and memory and thus low processing speed. This paper develops a network event audit module by applying association rules to network events using a new algorithm instead of Apriori algorithm. Test results show that the application of the new algorithm gives drastically low usage of both CPU and memory for network event analysis compared with existing Apriori algorithm.

  • PDF

Fuzzy Logic Based Buffer Management Algorithm to Improve Performance of Internet Traffic over ATM Networks (ATM 네트워크에서 인터넷 트래픽 성능 향상을 위한 퍼지기반 버퍼 관리 알고리즘)

  • 김희수;김관웅;박준성;배성환;전병실
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.9
    • /
    • pp.358-365
    • /
    • 2003
  • To support Internet traffic efficiently over ATM networks, Guaranteed Frame Rate(GFR) has been proposed in the ATM Forum. GFR provides minimum rate guarantees to VCs and allows any excess bandwidth in the network to be shared among the contending VCs in a fair manner. In this paper, we proposed a new fuzzy logic based buffer management algorithm that provides MCR guarantee and fair sharing to GFR VCs. A key feature of proposed algorithm is its ability to accept or drop a new incoming packet dynamically based on buffer condition and load ratio of VCs. This is achieved by using fuzzy logic controller for the production of a drop factor. Simulation results show that proposed scheme significantly improves fairness and TCP throughput compared with previous schemes.

Wired/Wireless Combination Network Plan for Realtime Wiress Multimedia Application Service (Realtime Wiress Multimedia Application service를 위한 유/무선 통합 네트워크 설계)

  • Eon, Ki-Boo;Lee, Mung-Hoon;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.109-112
    • /
    • 2005
  • As the degree of use of network is increasing the need for building the basic of the stable network service is being needed a lot. Also the engineers require the traffic control for the best application and management and bandwidth management urgently. To solve these problems, there were no other ways of increasing the bandwidth of lines until now. However, this solution has the limit that the cost is too high and the traffic problem is growing continuously. On this study, it is suggested that through the planning the wired /wireless combination network design offering the service of QoS, Multicast, Mobile, realtime multimedia traffic delay without packet loss will be dealth with.

  • PDF

Hybrid Hierarchical Architecture for Mobility Management in Mobile Content Centric Networking (이동 콘텐트 중심 네트워킹 구조에서의 하이브리드 계층적 이동성 관리 방안)

  • Lee, Ji-hoon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1147-1151
    • /
    • 2018
  • As personal users create and share lots of contents at any time and any places, new networking architecture such as content centric networking (CCN) has emerged. CCN utilizes content name as a packet identifier, not address. However, current CCN has a limitation for content source mobility management. The movement of content sources cause long delivery latency and long service disruption. To solve that, a hierarchical mobility management was was proposed. However, the hierarchical mobility management scheme has still the loss of interest packets and long handoff latency. So, this paper presents the hybrid hierarchical mobility management in mobile CCN environements to reduce both the loss rate of interest packets and the handoff latency. It is shown from the performance evaluations shows that the proposed scheme provides low loss rate of control message.

On the Need for Efficient Load Balancing in Large-scale RPL Networks with Multi-Sink Topologies

  • Abdullah, Maram;Alsukayti, Ibrahim;Alreshoodi, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.212-218
    • /
    • 2021
  • Low-power and Lossy Networks (LLNs) have become the common network infrastructure for a wide scope of Internet of Things (IoT) applications. For efficient routing in LLNs, IETF provides a standard solution, namely the IPv6 Routing Protocol for LLNs (RPL). It enables effective interconnectivity with IP networks and flexibly can meet the different application requirements of IoT deployments. However, it still suffers from different open issues, particularly in large-scale setups. These include the node unreachability problem which leads to increasing routing losses at RPL sink nodes. It is a result of the event of memory overflow at LLNs devices due to their limited hardware capabilities. Although this can be alleviated by the establishment of multi-sink topologies, RPL still lacks the support for effective load balancing among multiple sinks. In this paper, we address the need for an efficient multi-sink load balancing solution to enhance the performance of PRL in large-scale scenarios and alleviate the node unreachability problem. We propose a new RPL objective function, Multi-Sink Load Balancing Objective Function (MSLBOF), and introduce the Memory Utilization metrics. MSLBOF enables each RPL node to perform optimal sink selection in a way that insure better memory utilization and effective load balancing. Evaluation results demonstrate the efficiency of MSLBOF in decreasing packet loss and enhancing network stability, compared to MRHOF in standard RPL.