• Title/Summary/Keyword: MAC address learning

Search Result 6, Processing Time 0.018 seconds

An Ethernet Ring Protection Method to Minimize Transient Traffic by Selective FDB Advertisement

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong;Min, Seung-Wook
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.631-633
    • /
    • 2009
  • We introduce an improved Ethernet ring protection method, selective filtering database (FDB) advertisement, to minimize traffic overshoot in the event of a failure or recovery. On the protection switching event, the proposed method makes all ring nodes perform an FDB flush except the FDB entries associated with their client subnets. Then, ring nodes rapidly exchange their client MAC address lists so that their FDBs are immediately updated by indirect MAC address learning. The proposed scheme guarantees fast and reliable protection switching over the standard scheme.

Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement

  • Rhee, June-Koo Kevin;Im, Jin-Sung;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.874-876
    • /
    • 2008
  • Ethernet ring protection is a new technology introduced in ITU-T Recommendation G.8032, which utilizes the generic Ethernet MAC functions. We introduce an alternative enhanced protection switching scheme to suppress penalty in the switching transient, in which the Ethernet MAC filtering database (FDB) is actively and directly modified by information disseminated from the nodes adjacent to failure. The modified FDB at all nodes are guaranteed to be consistent to form a complete new ring network topology immediately. This scheme can reduce the capacity requirement of the G.8032 by several times. This proposed scheme can be also applied in IP protection rings.

  • PDF

Implementation of an Ethernet Adapter for the G-PON TC Layer (G-PON TC 계층을 위한 이더넷 정합기의 구현)

  • Chung, Hae;Ahn, Eu-Kwang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.429-436
    • /
    • 2011
  • The G-PON is an efficient solution to implement the FTTH and have GEM frame to accomodate various protocols like Ethernet frames, IP packets, and TDM signals. Above all, the Ethernet is one of the most widely used 2nd layer protocol in the campus, the subscriber access, and the carrier service. So G-PON system has to provide an Ethernet interface with top priority. In this paper, we implement a gigabit Ethernet adapter based on Ethernet over GEM in the ITU-T G.984.3 to accommodate Ethernet protocol in the G-PON TC chip. The adapter maps each Ethernet frame to a single or multiple GEM frames and has several functions including generation of the GEM header, encapsulation of frames and the SAR. In particular, the adapter have converter (LUT) MAC address to port-ID which is a key to identify logical connections though it is not defined in specification but important. We implement the adapter with a FPGA and verify the functions of segmentation and reassembling, MAC address learning, and throughput with the logic analyzer and the Ethernet analyzer.

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

Design and Implementation of Indoor Location Recognition System based on Fingerprint and Random Forest (핑거프린트와 랜덤포레스트 기반 실내 위치 인식 시스템 설계와 구현)

  • Lee, Sunmin;Moon, Nammee
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.154-161
    • /
    • 2018
  • As the number of smartphone users increases, research on indoor location recognition service is necessary. Access to indoor locations is predominantly WiFi, Bluetooth, etc., but in most quarters, WiFi is equipped with WiFi functionality, which uses WiFi features to provide WiFi functionality. The study uses the random forest algorithm, which employs the fingerprint index of the acquired WiFi and the use of the multI-value classification method, which employs the receiver signal strength of the acquired WiFi. As the data of the fingerprint, a total of 4 radio maps using the Mac address together with the received signal strength were used. The experiment was conducted in a limited indoor space and compared to an indoor location recognition system using an existing random forest, similar to the method proposed in this study for experimental analysis. Experiments have shown that the system's positioning accuracy as suggested by this study is approximately 5.8 % higher than that of a conventional indoor location recognition system using a random forest, and that its location recognition speed is consistent and faster than that of a study.

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.184-194
    • /
    • 2010
  • Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation G.8032, has been developed to provide carrier grade recovery for Ethernet ring networks. However, the filtering database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. This traffic overshooting is especially critical when a ring provides services to a large number of clients. According to our experimental results, the traditional FDB flush requires a link capacity about sixteen times greater than the steady state traffic bandwidth. This paper introduces four flush optimization schemes to resolve this issue and investigates how the proposed schemes deal with the transient traffic overshoot on a multi-ring network under failure conditions. With a network simulator, we evaluate the performance of the proposed schemes and compare them to the conventional FDB flush scheme. Among the proposed methods, the extended FDB advertisement method shows the fastest and most stable protection switching performance.