• Title/Summary/Keyword: Link mechanism

Search Result 611, Processing Time 0.023 seconds

Cross-Layer Service Discovery Scheme for Hybrid Ad-hoc Networks (하이브리드 애드-혹 네트워크를 위한 크로스-레이어 서비스 검색 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.223-228
    • /
    • 2009
  • Efficient service discovery mechanism is a crucial feature for a hybrid ad-hoc network supporting extension of a wireless ad-hoc network to the Internet. We propose an efficient cross-layer service discovery mechanism using non-disjoint multi-path source routing protocol for hybrid ad-hoc networks. Our scheme has advantages of multi-path routing protocol and cross-layer service discovery. Intuitively, it is not difficult to imagine that the cross-layer service discovery mechanism could result in a decreased number of messages compared to the traditional approach for handling routing independently from service discovery. By simulation, we show that faster route recovery is possible by maintaining multiple routing paths in each node, and the route maintenance overhead can be reduced by limiting the number of multiple routing paths and by maintaining link/node non-disjoint multi-path.

A ENA algorithm for Performance Enhancement of Satellite Link using TCP (TCP를 사용하는 위성링크에서의 성능 향상을 위한 ENA 알고리즘)

  • 이정규;김상희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1177-1185
    • /
    • 2000
  • In this paper, We report on the performance issues faced by TCP based applications on satellite link having long propagation delay and high probability of bit erros and propose ENA(Error Notification Ack) algorithm for TCP Performance Enhancement. TCP Protocol cannot distinguish errored segments(in noisy medium) from losses of genuine network congestion and react as if there is network congestion. Therefore, Slow Start and Congestion avoidance mechanism are initiated. It happen this case in satellite link. Therefore it reduce the transmission rate and drop the performance. So, in this paper We propose ENA algorithm which is distinguished errored segments from losses of network congestion. And We propose the method of algorithm's implementation. And We evaluate the Performance of Tahoe, Reno, Sack TCP with ENA. As results, TCP Performance is better.

  • PDF

TCP-GT: A New Approach to Congestion Control Based on Goodput and Throughput

  • Jung, Hyung-Soo;Kim, Shin-Gyu;Yeom, Heon-Young;Kang, Soo-Yong
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.499-509
    • /
    • 2010
  • A plethora of transmission control protocol (TCP) congestion control algorithms have been devoted to achieving the ultimate goal of high link utilization and fair bandwidth sharing in high bandwidth-delay product (HBDP) networks. We present a new insight into the TCP congestion control problem; in particular an end-to-end delay-based approach for an HBDP network. Our main focus is to design an end-to-end mechanism that can achieve the goal without the assistance of any network feedback. Without a router's aid in notifying the network load factor of a bottleneck link, we utilize goodput and throughput values in order to estimate the load factor. The obtained load factor affects the congestion window adjustment. The new protocol, which is called TCP-goodput and throughput (GT), adopts the carefully designed inversely-proportional increase multiplicative decrease window control policy. Our protocol is stable and efficient regardless of the link capacity, the number of flows, and the round-trip delay. Simulation results show that TCP-GT achieves high utilization, good fairness, small standing queue size, and no packet loss in an HBDP environment.

Structural Shear Wall Systems with Metal Energy Dissipation Mechanism

  • Li, Guoqiang;Sun, Feifei;Pang, Mengde;Liu, Wenyang;Wang, Haijiang
    • International Journal of High-Rise Buildings
    • /
    • v.5 no.3
    • /
    • pp.195-203
    • /
    • 2016
  • Shear wall structures have been widely used in high-rise buildings during the past decades, mainly due to their good overall performance, large lateral stiffness, and high load-carrying capacity. However, traditional reinforced concrete wall structures are prone to brittle failure under seismic actions. In order to improve the seismic behavior of traditional shear walls, this paper presents three different metal energy-dissipation shear wall systems, including coupled shear wall with energy-dissipating steel link beams, frame with buckling-restrained steel plate shear wall structure, and coupled shear wall with buckling-restrained steel plate shear wall. Constructional details, experimental studies, and calculation analyses are also introduced in this paper.

TCP Performance Enhancement by Implicit Priority Forwarding (IPF) Packet Buffering Scheme for Mobile IP Based Networks

  • Roh, Young-Sup;Hur, Kye-Ong;Eom, Doo-Seop;Lee, Yeon-Woo;Tchah, Kyun-Hyon
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.367-376
    • /
    • 2005
  • The smooth handoff supported by the route optimization extension to the mobile IP standard protocol should support a packet buffering mechanism at the base station (BS), in order to reduce the degradation in TCP performance caused by packet losses within mobile network environments. The purpose of packet buffering at the BS is to recover the packets dropped during intersubnetwork handoff by forwarding the packets buffered at the previous BS to the new BS. However, when the mobile host moves to a congested BS within a new foreign subnetwork, the buffered packets forwarded by the previous BS are likely to be dropped. This subsequently causes global synchronization to occur, resulting in the degradation of the wireless link in the congested BS, due to the increased congestion caused by the forwarded burst packets. Thus, in this paper, we propose an implicit priority forwarding (IPF) packet buffering scheme as a solution to this problem within mobile IP based networks. In the proposed IPF method, the previous BS implicitly marks the priority packets being used for inter-subnetwork handoff. Moreover, the proposed modified random early detection (M-RED) buffer at the new congested BS guarantees some degree of reliability to the priority packets. The simulation results show that the proposed IPF packet buffering scheme increases the wireless link utilization and, thus, it enhances the TCP throughput performance in the context of various intersubnetwork handoff cases.

A study on congesting control scheme for LAN interworkding in connectionless data service (비연결형 데이터 서비스에서 LAN연동을 위한 폭주 제어에 관한 연구)

  • 박천관;전병천;김영선
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.29-38
    • /
    • 1998
  • This ppaer suggests a congestion control scheme for CL(ConnectionLess) overlay network using the feedback loops getween CL werver, between CL servers, and the header translation table of CL server. The CL overlay network for CBDS(Connectionless Broadband Data Service) defined by ITU0T(International Telecommunication Union-Telecommunication) consists of CL servers which route frames and links which connect between CL user and CL server or between CL servers. In this CL overlay network, two kinds of congestions, link congestion and CL server congestion, may occur. We suggest a scheme that can solve the congestion using ABR(Available Bit Rate) feedback control loop, the traffic control mechanism. This scheme is the link-by-link method suing the ABR feedback control loops between CL user and CL server or between CL servers, and the header translation table of CL server. As CL servers are always endpoints of ABR connections, the congestion staturs of the CL server can be informed to the traffic sources using RM(Resource Management) cell of the ABR feedback loops. Also CL server knows the trafffic sources making congestion by inspecting the source address field of CLNAP-PDUs(ConnectionLess Network Access Protocol - Protocol Data Units). Therefore this scheme can be implemeted easily using only both ABR feedback control loop of ATM layer and the congestion state table using the header translation table of CL server because it does not require separate feedback links for congestion control of CL servers.

  • PDF

Security and Authentication System for Bluetooth Mobile Phone (블루투스 모바일 폰을 위한 보안인증 시스템)

  • S.P, Balakannan;Lee, Moon-Ho;B, Karthik.
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.261-263
    • /
    • 2007
  • Authentication is a mechanism to establish proof of identities, the authentication process ensure that. Who a particular user is. Nowadays PC and laptop user authentication systems are always done once a hold until s explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA) provides solution to this problem. In ZIA,. a user wears a small authentication token that communicates with a laptop over a short-range, wireless link. ZIA combine authentication with a file encryption. Here we proposed a Laptop-user Authentication Based Mobile phone (LABM). In our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a Bluetooth wireless link, m the concept of transient authentication with our combining It with encryption file system. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

  • PDF

Velocity and Acceleration Error Analysis of Planar Mechanism Due to Tolerances (기계시스템의 공차에 의한 속도 및 가속도 오차의 해석)

  • 이세정
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.2
    • /
    • pp.351-358
    • /
    • 1994
  • A probabilistic model and analysis methods to determine the means and variances of the velocity and acceleration in stochastically-defined planar pin jointed kinematic chains are presented. The presented model considers the effect of tolerances on link length and radial clearance and uncertainty of pin location as a net effect on the link's effective length. The determination of the mean values and variances of the output variables requires the calculation of sensitivities of secondary variables with respect to the random variables. It is shown that this computation is straightforward and can be accomplished by a conventional kinematic analysis package with minor modification. Thus, the concepts of tolerance and clearance have been captured by the model and analysis. The only input data are the nominal linkage model and statistical information. The "effective link length" model is shown to be applicable to both analytical solution and Monte Carlo simulation. The results from both methods are compared. This paper Ksolves the higher-order kinematic problems for the probabilistic design analysis of stochastically-defined mechanisms.echanisms.

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

Implementation and Performance Evaluation of ELM-MAC Protocol for Energy Efficiency in Sensor Networks (센서 네트워크에서 에너지 효율을 위한 ELM-MAC 프로토콜의 구현 및 성능평가)

  • Yun, Phil-Jung;Kim, Chang-Hwa;Kim, Sang-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.81-88
    • /
    • 2008
  • It is important to study the energy efficient MAC protocol in sensor networks. We propose a new protocol named as ELM?MAC (Energy efficient Link Management MAC) to increase energy efficiency in sensor networks. ELM-MAC protocol operates, uses, and manages the optimized transmission power level to increase energy efficiency in MAC layer. It includes mechanism that uses the adaptive method in change of surround environment for guarantee of link quality. In this paper we implement ELM-MAC and evaluate its performance.

  • PDF