• Title/Summary/Keyword: Message layer

Search Result 177, Processing Time 0.032 seconds

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

An Approach for Improving Mobile WiMAX Security - ROSMEX Architecture (안전한 모바일 와이맥스 네트워크를 위한 보안 구조 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Choi, Hyo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.25-34
    • /
    • 2010
  • The IEEE 802.16-2004 standard has a security sub-layer in the MAC layer called, Privacy Key Management (PKM). However, several researches have been published to address the security vulnerabilities of IEEE 802.16-2004. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handoffs and roaming capabilities. PKMv2 in Mobile WiMAX includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, Mobile WiMAX still has a problem of security architecture such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication because Mobile WiMAX security has mainly concentrated on between SS and BS communication. Based on the investigation results, we propose a novel mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.

Performance Analysis of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless CDMA Network (무선 CDMA 망에서 WTP SAR 알고리즘과 RLP를 고려한 WAP 패킷의 성능 분석)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.69-76
    • /
    • 2002
  • With the growth of data communication service by mobile devices, WAP is proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. But, because a transmission speed of WAP is limited, it takes many times to transmit and to receive the data. This paper has studied the WAP packet transmission time using WTP-SAR algorithm. As a method that is to improve transfer capability of WAP, using SAR function in WTP, total message down from upper layer has been fragmented and packet is transmitted through RLP frame time slot. Then, we have analyzed the transmission time of WAP packet with variable RLP layer size on the wireless CDMA network for next generation systems. From the results, we could obtain the WAP packet transmission time and optimal WTP packet size.

  • PDF

Performance Enhancement of CSMA/CA MAC DCF Protocol for IEEE 802.11a Wireless LANs (IEEE 802.11a 무선 LAN에서 CSMA/CA MAC DCF 프로토콜의 성능 향상)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2004
  • A basic access method using for IEEE 802.11a wireless LANs is the DCF method that is based on the CSMA/CA. But, Since IEEE 802.11 MAC layer uses original backoff algorithm (Exponential backoff method), when collision occurs, the size of contention windows increases the double size. Hence, packet transmission delay time increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs using a proposed enhanced backoff algorithm. From the results, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between TCP packet size and total message transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

Development of a CAN-based Real-time Simulator for Car Body Control

  • Kang, Ki-Ho;Seong, Sang-Man
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.444-448
    • /
    • 2005
  • This paper presents a developing procedure of the CAN-based real-time simulator for car body control, aiming at replacing the actual W/H (Wiring Harness) and J/B(Junction Box) couple eventually. The CAN protocol, as one kind of field-bus communication, defines the lowest 2 layers of the ISO/OSI standard, namely, the physical layer(PL) and the data link layer(DLL), for which the CSMA/NBA protocol is generally adopted. For CPU, two PIC18Fxx8x's are used because of their built-in integration of CAN controller, large internal FLASH memory (48K or 64K), and their costs. To control J/B's and actuators, 2 controller boards are separately implemented, between which CAN lines communicate through CAN transceivers MCP255. A power motor for washing windshield, 1 door lock motor, and 6 blink lamps are chosen for actuators of the simulator for the first stage. For the software architecture, a polling method is used for the fast global response time despite its slow individual response time. To improve the individual response time and to escape from some eventual trapped-function loops, High/Low ports of the CPU are simply used, which increases the stability of the actuator modules. The experimental test shows generally satisfactory results in normal transmitting / receiving function and message trace function. This simulator based on CAN shows a promising usefulness of lighter, more reliable and intelligent distributed body control approach than the conventional W/H and J/B couple. Another advantage of this approach lies in the distributed control itself, which gives better performance in hard real-time computing than centralized one, and in the ability of integrating different modules through CAN.

  • PDF

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

Steganalysis Using Joint Moment of Wavelet Subbands (웨이블렛 부밴드의 조인트 모멘트를 이용한 스테그분석)

  • Park, Tae-Hee;Hyun, Seung-Hwa;Kim, Jae-Ho;Eom, Il-Kyu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.71-78
    • /
    • 2011
  • This paper propose image steganalysis scheme based on independence between parent and child subband on the multi-layer wavelet domain. The proposed method decompose cover and stego images into 12 subbands by applying 3-level Haar UWT(Undecimated Wavelet Transform), analyze statistical independency between parent and child subband. Because this independency is appeared more difference in stego image than in cover image, we can use it as feature to differenciate between cover and stego image. Therefore we extract 72D features by calculation first 3 order statistical moments from joint characteristic function between parent and child subband. Multi-layer perceptron(MLP) is applied as classifier to discriminate between cover and stego image. We test the performance of proposed scheme over various embedding rates by the LSB, SS, BSS embedding method. The proposed scheme outperforms the previous schemes in detection rate to existence of hidden message as well as exactness of discrimination.

A Study of Routing and Signaling Extensions of GMPLS for QoS Provision in NGN (NGN에서 QoS 제공을 위한 GMPLS의 라우팅 및 시그널링 화장 연구)

  • 장석기;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.925-933
    • /
    • 2003
  • Network is expected to be developed into optical Internet network collected IP layer and optical layer, but GMPLS is risen at the transitional evolution stage because of the present technology level. GMPLS that MPLS is extended and generalized is able to support not only the packet switching device but also the devices which perform switching in time, wavelength, and space domain. To implement the common control plane to these various switching types, GMPLS extends the existing MPLS signaling and routing protocol. In this paper, we describe the overview of GMPLS technology, and then we will refer to the OSPF(Open Shortest Path First), which was used to exchange the status information of link, as the plan of routing extension to exchange the information of various link type, bandwidth, link protection type etc. And also, we describe the definition of new protocol, so called, LMP that is a signaling protocol for solving complex problem which manages hundreds and thousands of links between two nodes. And we will examine and analyze the plan of signaling protocol extension to apply signaling protocol RSVP-TE(Resource Reservation Protocol) for traffic engineering in MPLS to network, and the message objects and formats associated with modified RSVP.

An Improved Handoff and Resource Reservation Scheme Using Triggers in Wireless Network (이동망에서 트리거를 이용한 향상된 핸드오프 메커니즘 및 자원예약 방안)

  • Lee, Don-Su;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.630-637
    • /
    • 2007
  • In this paper, we propose an effective handoff mechanism using events at the layer 2 and a tunnel-based mechanism that is performed by sharing information of a mobile node and anticipated-based handoff. Also, we propose a novel anticipated-reservation mechanism using the events triggered at layer 2 to make easy a resource reservation procedure. Comparing with the existing mobile IPv6 handoff mechanism, our proposed handoff mechanism can reduce an amount of handoff latency and traffic volume between access routers where handoff is performed. In the anticipated-reservation mechanism, the amount of signaling traffics between an mobile node and the correspondent nodes can be reduced and then the allocation of resource can be accomplished. We present the performance of our proposed handoff mechanism in the wireless network environment by ns-2 simulation. Although the anticipated-reservation mechanism including a proxy agent is explained without performance evaluation, we can validate the operation of our proposed model only by the procedure of message flow.

A Study on Congestion Control for LAN Interworking in ATM Network (ATM 망에서 LAN 연동을 위한 폭주 제어에 관한 연구)

  • Park, Chun-Kwan
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.122-133
    • /
    • 1998
  • The CL network fer CBDS(Connectionless Broadband Data Service) defined by ITU-(International Telecommunication Union-Telecommunication) consists of CL(ConnectionLess) servers which route frames and links which connect between CL user and CL server or between CL servers[1][2]. In this configuration, two kinds of congestion, CL link congestion and CL server congestion may occur. Therefore this paper has proposed the scheme that can deal with the above congestion state of LAN traffic efficiently in interworking LANs in ATM network. Proposed schemes ale link-by-link scheme and hybrid scheme. Link-by-link scheme uses the ABR feedback loops of AIM layer between CL user and CL server or between CL servers, and the header translation table carrying out the routing function of frame. And hybrid scheme is the scheme that adds end-to-end loop to link-by-link scheme and then uses RM message using CLNAP-PDU(ConnectionLess Network Access Protocol - Protocol Data Units) of CL layer. These schemes can be implemented easily because of using the ABR loop of ATM layer, end-to-end loop of CL layer, and the routing function of CL server. In this paper the characteristic and effects of two schemes in CL server bas been compared and analyzed.

  • PDF