• Title/Summary/Keyword: Integrated Wired-Wireless Network

Search Result 70, Processing Time 0.028 seconds

Performance Test and Evaluation of Voice Traffic in Wired and Wireless Integrated Network (유무선 통합망에서의 음성 서비스의 성능 테스트 및 평가)

  • Jo, Jun-Mo;Choi, Dae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.280-286
    • /
    • 2009
  • The NGN(Next-Generation Network) structure has been considered from various points of view as all If wireless-wired integration network and its performance is one of the main issue in these days. In this paper, various wired and wireless integrated networks with voice service are designed and simulated to obtain problems and factors affects the network performance using OPnet simulator. The characteristics only showed in the wired and wireless integrated networks are measured and analyzed compared with the single networks such as a wired or wireless networks. Especially, in the wired and wireless integrated networks showed degrading performance even if there are few transmissions in the network and furthermore, the various networks of increasing numbers of the nodes and transmission are simulated and evaluated.

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

Comparison about TCP and Snoop protocol on wired and wireless integrated network (유무선 혼합망에서 TCP와 Snoop 프로토콜 비교에 관한 연구)

  • Kim, Chang Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.141-156
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. The Snoop Protocol was designed for the wired network by putting the Snoop agent module on the BS(Base Station) that connect the wire network to the wireless network to complement the TCP problem. The Snoop agent cash the packets being transferred to the wireless terminal and recover the loss by resending locally for the error occurred in the wireless link. The Snoop agent blocks the unnecessary congestion control by preventing the dupack (duplicate acknowledgement)for the retransmitted packet from sending to the sender and hiding the loss in the wireless link from the sender. We evaluated the performance in the wired/wireless network and in various TCP versions using the TCP designed for the wired network and the Snoop designed for the wireless network and evaluated the performance of the wired/wireless hybrid network in the wireless link environment that the continuous packet loss occur.

An Integrated Management Scheme for Wired and Wireless Networks Using Mobile Agents (이동 에이전트를 이용한 유무선 네트워크의 통합관리 기법)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.117-124
    • /
    • 2010
  • Appling centralized network management architecture SNMP(Simple Network Management Protocol) to wireless networks causes the network overhead, NAT(Network Address Translation) problem on AP, and performance degradation of mobile nodes. In this paper, we propose an integrated management scheme for wired and wireless networks using mobile agents in order to solve above problems. In our proposed scheme, SNMP is applied to manage wired networks and MAs of SNMP are implemented in APs or wireless nodes to manage wireless networks. In addition, we propose a method to reduce the redundant OID information within SNMP response messages. Through the analysis, we show that our proposal resolves the given problems and reduces the processing delay of the wireless nodes.

TCP Performance Improvement using 802.11 MAC MIB for Wireless Network (무선 환경에서 802.11 MAC의 MIB 정보를 이용한 TCP 성능 개선)

  • Kim, Ki-Won;Shin, Kwang-Sik;Yoon, Wan-Oh;Choi, Sang-Bang
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.59-60
    • /
    • 2006
  • TCP applied to the wireless-wired integrated network is the one that was applied to the existing wired network. In the wireless-wired integrated network, both wireless and congestion loss can occur. When wireless packet losses occur, the congestion control of TCP causes performance degradation by reducing its transmission rate. In this paper, we propose the algorithm to distinguish the wireless packet loss from congestion packet loss using MIB of the 802.11 MAC which has been generally used recently in wireless links.

  • PDF

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.

Provisioning of QoS Adaptability in Wired-Wireless Integrated Networks

  • Guo, Mian;Jiang, Shengming;Guan, Quansheng;Mao, Huachao
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.61-70
    • /
    • 2013
  • The increasing number of mobile users and the popularity of real-time applications make wired-wireless integrated network extremely attractive. In this case, quality of service (QoS) adaptability is particularly important since some important features of the integrated network call for QoS adaptability, such as mobility, bursty applications and so on. Traditional QoS schemes include integrated service (IntServ) and differentiated service (DiffSev) as well as their variants. However, they are not able to balance well between scalability and QoS granularity. For example, IntServ faces the scalability problem, while DiffServ can only provide coarse granular QoS. In addition, they are also unable to efficiently support QoS adaptability. Therefore, a per-packet differentiated queueing service (DQS) was proposed. DQS was originally proposed to balance between scalability and QoS granularity in wired networks and then extended to wireless networks. This paper mainly discusses how to use DQS to support QoS adaptability in wired-wireless integrated networks. To this end, we propose a scheme to determine dynamic delay bounds, which is the key step to implement DQS to support QoS adaptability. Simulation studies along with some discussions are further conducted to investigate the QoS adaptability of the proposed scheme, especially in terms of its support of QoS adaptability to mobility and to bursty real-time applications.

An Integrated QoS Support Architecture for Wireless Home Network Based on IEEE 802.11 Wireless LAN

  • Hong, Sung-Hwa;Kim, Byoung-Kug;Eom, Doo-Seop
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.227-234
    • /
    • 2007
  • In this paper, to support a QoS level appropriate to the user in Wireless Home Network based Wireless LAN, we propose a QoS support architecture which includes Wired Network and Wireless Network. Actually, an important problem to support QoS in Wireless Home Network is approached not only on a MAC level in Wireless LAN but also on a integrated method to combine Network layer with Datalink layer. By applying the integrated QoS support method, it is possible to provide QoS support architecture using a Wireless LAN terminal with a minimum changing, and the proposed scheme has advantage of QoS support method, which is more superior than a existing scheme to support QoS in MAC level of Wireless LAN. Simulations results show that overall performance of the proposed scheme can be improved.

  • PDF

Performance Improvement Method of TCP Protocol using Splitting Acknowledgement Packet in Integrated Wired-Wireless Network (유무선 복합망에서 Acknowledgement 패킷의 분할을 통한 프로토콜의 성능향상 기법)

  • Jin, Gyo-Hong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.39-44
    • /
    • 2002
  • In this paper, in order to improve the performance of TCP short traffic application services in wireless Internet environments, the Split-ACKs (SPACK) scheme is proposed. In wireless networks, unlike wired networks, packet losses will occur more often due to high bit error rates. Therefore, each packet loss over wireless lints results in congestion control procedure of TCP being invoked at the source. This causes severe end-to-end Performance degradation of TCP. In this paper, to alleviate the TCP Performance, the SPACK method, split acknowledgement Packets in the base station, is proposed. Using computer simulation, the performance of TCP using SPACK is analysed and shows better performance than traditional TCP Protocol.

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.