• Title/Summary/Keyword: Network Buffer

Search Result 614, Processing Time 0.028 seconds

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

A Detailed Design for DBR Based APS System (DBR 기반의 APS 시스템 상세 설계)

  • Choi, Jeong-Gil;Kim, Su-Jin;Ju, Jeong-Min;Chung, Sun-Wha;Chung, Nam-Kee
    • IE interfaces
    • /
    • v.14 no.4
    • /
    • pp.348-355
    • /
    • 2001
  • This paper suggests a detailed design of APS(Advanced Planning & Scheduling) system using the DBR (Drum-Buffer-Rope) which is a finite capacity scheduling logic of TOC(Theory of Constraints). Our design is composed of four modules; Network, Buffer, Drum and Subordination. The Network module defines the Product Network which is built from BOM and routings. The Buffer module inserts the Buffers into the Product Network. The Drum module describes detail procedures to create Drum Schedule on the CCR(Capacity Constraint Resource). The Subordination module synchronizes all non-constraints to the constraints by determining the length of Rope. This design documented by ARIS.

  • PDF

A Design Problem of a Two-Stage Cyclic Queueing Network (두 단계로 구성된 순환대기네트워크의 설계)

  • Kim Sung-Chul
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper we consider a design problem of a cyclic queueing network with two stages, each with a local buffer of limited capacity. Based on the theory of reversibility and product-form solution, we derive the throughput function of the network as a key performance measure to maximize. Two cases are considered. In case each stage consists of a single server, an optimal allocation policy of a given buffer capacity and work load between stages as well as the optimal number of customers is identified by exploiting the properties of the throughput function. In case each stage consists of multiple servers, the optimal policy developed for the single server case doesn't hold any more and an algorithm is developed to allocate with a small number of computations a given number of servers, buffer capacity as well as total work load and the total number of customers. The differences of the optimal policies between two cases and the implications of the results are also discussed. The results can be applied to support the design of certain manufacturing and computer/communication systems.

TCP Throughput Guarantee using Packet Buffering (패킷 버퍼링을 이용한 TCP 처리율 보장 방법)

  • Choi, Sun-Woong;Kim, Chung-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.2
    • /
    • pp.242-250
    • /
    • 2001
  • This paper deals with the TCP bandwidth guarantee problem in a differentiated serviccs(Diffserv) network. The Diffserv assured s<:rvice differentiates packet drop probabilities to guarantee the promised bandwidth even under network congestion. However a token buffer marker fails to show adequate performance because TCI' generates packets according to the unique Tel' congestion control mechanism. We propose a marker that uses a data buffer as well as a token buffer. The marker with a data buffer works well with the assured service mechanism because it smooths Tel' traffic. We showed that the marker with a data buffer achieves the target throughput better than a marker with a token buffer only. We also showed that the optimal buffer size is proportional to reserved throughput and HTT.

  • PDF

Buffer Overflow Attack and Defense Techniques

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.207-212
    • /
    • 2021
  • A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

Probability-Based Message Forwarding Scheme with Buffer Management for Spray and Wait Routing Protocol (Spray and Wait 라우팅을 위한 확률 기반의 메시지 전달 방안 및 버퍼 관리 방안)

  • Kim, Eung-Hyup;Lee, Myung-Ki;Cho, You-Ze
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.7
    • /
    • pp.153-158
    • /
    • 2016
  • Delay Tolerant Network (DTN) is a network that employed method of store-carry-forward in intermittently connected networks. In DTNs, routing and buffer management scheme are important to improve successful message delivery. This paper proposes an improve spray and wait routing protocol based on delivery probability to a destination. Also, a buffer management scheme is proposed to drop the queued messages according to the number of copies (L value). Simulation results show that the proposed method provides a better delivery ratio and lower communication overhead when compared to existing schemes such as Epidemic, PRoPHET and spray and wait.

A Study on the Loss Probability and Dimensioning of Multi-Stage Fiber Delay Line Buffer (다단 광 지연 버퍼의 손실률과 크기에 관한 연구)

  • 김홍경;이성창
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.95-102
    • /
    • 2003
  • The buffering is a promising solution to resolve the contention problem in optical network. we study the packet loss probability and the dimensioning of optical buffer using a Fiber Delay Line for variable length packet. In this paper, we study the relation between the granularity and the loss of FDL buffer in Single-Stage FDL buffer and propose the Single-Bundle Multi-Stage FDL buffer. The Multi-Stage FDL buffer is too early yet to apply to the current backbone network, considering the current technology in view of costs. but we assume that the above restriction will be resolved in these days. The appropriate number of delay and pass line for a dimensioning is based on a amount of occupied time by packets. Once more another multi-stage FDL buffer is proposed, Split-Bundle multi-stage FDL buffer. The Split-Bundle ms-FDL buffer is more feasible for a FDL buffer structure, considering not only a size of switching matrix but also a bulk of switching element. its feasibility will be demonstrated from a loss probability.

Prevention of Buffer Overflow in the Mobility Support Router for I-TCP (I-TCP를 위한 이동성 지원 라우터에서의 버퍼 오버플로우 방지)

  • 김창호;최학준;장주욱
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.20-26
    • /
    • 2004
  • A congestion control algorithm to prevent buffer overflow in MSR(Mobility Support Router) for I-TCP is proposed. Due to high bit error rate and frequent hand-offs over wireless environment, the current congestion control scheme in TCP Reno over mixed(wired and wireless) network exhibits lower throughput than the throughput achieved over wired only network. I-TCP has been proposed to address this by splitting a TCP connection into two TCP connections over wired section and wireless section, respectively. However, buffer overflow in MSR may occur whenever there are excessive bit errors or frequent hand-offs. This may lead to the loss of packets acked by MSR(resident in buffer) to the sender, but not received by the receiver, breaking TCP end-to-end semantics. In this Paper, a new scheme is proposed to prevent the MSR buffer from overflow by introducing “flow control” between the sender and the MSR. Advertised window for the TCP connection between the sender and the MSR is tied to the remaining MSR buffer space, controlling the flow of packets to the MSR buffer before overflow occurs.

Analytic performance evaluation of the IEEE 802.4 token bus network with finite buffer capacity (제한된 버퍼를 가진 IEEE 802.4 토큰 버스 네트워크의 성능 해석)

  • 문상용;박홍성;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.407-410
    • /
    • 1997
  • This paper analytically derives the variance of service time of a station in the symmetric IEEE 802.4 token bus network with single access class and finite buffer capacity. This performance measure is represented in terms of the total number of stations, the token hold time, the arrival rate of frames, the service rate, and other parameters. Using computer simulations, presented performance measure is validated.

  • PDF

Study on Call Admission Control in ATM Networks Using a Hybrid Neural Network. (하이브리드형 신경망을 이용한 ATM망에서의 호 수락제어에 관한 연구)

  • 김성진;서현승;백종일;김영철
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.94-97
    • /
    • 1999
  • In this paper, a new real-time neural network connection admission controller is proposed. The proposed controller measures traffic flows, cell loss rate and cell delay periodically each classes. The Neural network learns the relation between those measured information and service quality by real-time. Also the proposed controller uses the DWRR multiplexer with buffer dedicated to every traffic source in order to measure the delay that cells experience in buffer. Experimental result shows that the proposed method can control effectively heterogeneous traffic sources with diverse QoS requirement.

  • PDF