• Title/Summary/Keyword: Network packet

Search Result 2,657, Processing Time 0.033 seconds

Alternate path transfer mechanism on ATM switch (ATM 스위치에서의 여분 경로 전송 메커니즘)

  • 이주영;임인칠
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.8
    • /
    • pp.45-55
    • /
    • 1997
  • To design a ATM Switch which ahs advantages in high sped packet switching, it is essential to set multiple paths between input ports and output ports and to design a new packet transfer technique on that paths for decreasing Packet Loss by conflicts in internal Switch Plane. We propose new packet transfer method, Alternate Path Transfer Mechanism by Dynamic Bypass Transfer Method which can solve conflict problem in Banyan network easily. Proposed ATM Switch consists of Banyan networks, Input/Ouput Port, Bypass Link, and Bypass Link Controller. Packets caused conflicts in SEs have another chances of packet transfer over alternate switching planes by using this mechanism.

  • PDF

Effects of Forwarders on TCP Performance in Network Coding for Wireless Mesh Networks (무선 메쉬 네트워크의 네트워크 코딩에서 패킷 전달자들이 TCP 성능에 미치는 영향)

  • Lim, Chan-Sook;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.39-45
    • /
    • 2010
  • Most traffic in the real internet is TCP traffic. Therefore newly proposed network coding schemes must consider their effects on TCP performance. However, in most studies on network coding, performance evaluation has been conducted using other types of traffic than TCP traffic because network coding has effects on the pattern of packet transmission, which again can impact TCP performance. In most packet transmission schemes based on network coding for wireless mesh networks, it is determined which node, among the ones that received a broadcasted packet, should encode and forward it. In this paper, we examine how the forwarder nodes impact TCP performance.

Route Optimization in Nested Mobile Network using Sequential Tunneling (순차적 터널링을 이용한 중첩된 이동 네트워크에서의 경로 최적화)

  • Song Jungwook;Han Sunyoung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.29-33
    • /
    • 2005
  • It is not future story that host mobility in wireless network. We already have many devices which can access network among moving our locations. Internet protocol is extended to support not only host mobility but also network mobility. But nesting mobile networks and mobile hosts, there is a problem that routing path of packet becomes complex. By sequential tunneling on outgoing packet at mobile router and toward mobile network at correspondent node, it can be setting up direct path in nested mobile network environment. In this paper, we propose a method for delivering packet through optimized path by sequential tunneling. And evaluate this method by equations and simulations.

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

ndnSIM based NDN Network Implementation and Performance Evaluation (ndnSIM 기반 NDN 네트워크 구현 및 성능 평가)

  • Park, Sanghyeon;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.725-730
    • /
    • 2022
  • Named Data Networking (NDN) is a representative technology of ICN that realizes the future Internet architecture. NDN searches for data by its content and not by its host IP address. The consumer generates an interest packet and sends it to the NDN network. The NDN network uses three tables such as CS, FIB, and PIT and forwards the received interest packet to the next hop. The producer transmits the data packet to the consumer through a name-based forwarding scheme. In this paper, we design and implement an ndnSIM-based NDN network and perform performance evaluation. We analyze the ndnSIM structure and develop a 6-node congested NDN network and a 9-node grid NDN network using ndnSIM. In the simulation, the performance of latency and throughput of the interest packet rate are measured. We analyze the effect of congestion on the latency and throughput of the NDN network. This approach will help researchers in the future.

Efficient Data Distribution Method in a Wireless P2P Network (무선 P2P 네트워크에서 Peer 사이의 효율적 자료 분배 방법에 대한 연구)

  • Kang, Seung-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.97-105
    • /
    • 2006
  • Popular content stored within the Internet may be convenient to download via modern 3G connections, but costly due to a fee charged by telecommunication providers on the basis of the amount of data transferred. This paper presents a network in which several mobile devices, called the peers, cooperate to download their assigned portion of the content using a 3G connection in order to reduce the overall cost. Then, the peers exchange their assigned portion of the content with other peers via a wireless ad hoc network and the peers reconstruct the whole content using the exchanged portion. This paper focuses on the per-peer based distribution method, and presents the performance comparison with a similar method, called the per-packet distribution method. Both methods are designed to reduce packet collisions while content is exchanged. The simulation result indicates that the per-peer based method outperforms the per-packet based method, and approximately 90% of the telecommunication cost is saved with as few as 10 peers.

  • PDF

On the Practical Physical-Layer Network Coding with Partially Overlapped Packets (부분 패킷 중첩 환경에서 물리계층 네트워크 코딩에 관한 연구)

  • Lim, Hyeonwoo;Jung, Bang Chul;Ban, Tae-Won;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2813-2819
    • /
    • 2015
  • In this paper, we investigate the physical layer network coding (PNC) technique in a two-way relay channel (TWRC) where two source nodes send and receive data with each other via a relay node. In particular, we consider the communication scenario where packet length from the two sources is different from each other. We analyze the bit error rate (BER) of the received packet at the relay node according to degree of overlapping between two packets. The BER of the short packet remains unchanged regardless of the degree of overlapping since the entire packet is overlapped with the longer packet, while the BER of the longer packet becomes improved as the degree of overlapping decreases. Thus, we need a novel transmission scheme to enhance BER performance of the PNC technique in TWRC environments since the overall BER performance of the PNC technique at the relay node depends on the worse BER between two ovelapping packets' BERs.

Development of Fragmentation Management Simulator for 6LoWPAN (6LoWPAN 단편화 관리 기법 시뮬레이터 개발)

  • Seo, Hyun-Gon;Han, Jae-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.191-198
    • /
    • 2008
  • 6LoWPAN (IPv6 Low-power Wireless Personal Area Network) is IPv6 packets transmission technology at Sensor network over the IEEE 802.15.4 Standard MAC and Physical layer. Adaptation layer between IP layer and MAC layer performs fragmentation and reassembly of packet for transmit IPv6 packets. RFC4944, IETF 6LoWPAN WG standard document define packet fragmentation and reassembly. In this paper, we propose the 6PASim (6LoWPAN Packet Simulator) to perform IPv6 packet fragmentation and reassembly for performance evaluation. The 6PASim consist of two parts. One is Packet_Transmit_module that makes IEEE 802.15.4 frames the IPv6 packet from upper layer, and transmit its. and the another is Packet_Receive_module that reassembles transferred frames and completes original IPv6 packets. we can evaluate frame transmit rate and amount of control message through 6PASim. The result of simulation shows the SRM (Selective Retransmission Method) scheme provider better performance than IRM (Immediate Retransmission Method) scheme.

  • PDF

Performance of ACL/SCO Packet Data in Bluetooth Wireless Ad/hoc Network (블루투스 무선 Ad-hoc망에서 ACL/SCO 패킷 데이터의 성능)

  • 김도균;노재성;조성언;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.29-32
    • /
    • 2001
  • This paper has simulated the PER(Packet Error Rate), ratio of received packet and payload BER of Bluetooth system with packet types of ACL(Asynchronous Connection Less) and SCO(Synchronous Connection Oriented) link over wireless Ad-hoc environment. AWGN(Additive White Gaussian Noise) and Rayleigh fading are considered as channel model, and the analysis is based on the baseband model of Bluetooth system. In terms of PER and ratio of received packet, performance of DM1 packet is almost same as those of HV1, HV2 and HV3 packets, the performances of the other packets depend on the packet types. In terms of payload BER performance, there is no difference among HV2 packet of SCO link and DM1, DM3, DM5 packets of ACL link. Moreover, there is no difference among HV3 packet of SCO link and DM1, DM3, DM5 packets of ACL link, too.

  • PDF