• Title/Summary/Keyword: Network packet

Search Result 2,657, Processing Time 0.037 seconds

An Adaptive Packet Loss Recovery Scheme for Realtime Data in Mobile Computing Environment (이동 컴퓨팅 환경에서 실시간 데이터의 적응적 손실 복구 방법)

  • Oh, Yeun-Joo;Baek, Nak-Hoon;Park, Kwang-Roh;Jung, Hae-Won;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.389-405
    • /
    • 2001
  • In these days, we have increasing demands on the real-time services, especially for the multimedia data transmission in both of wired and wireless environments and thus efficient and stable ways of transmitting realtime data are needs. Although RTP is widely used for internet-based realtime applications, it cannot avoid packet losses, due to the use of UDP stack and its underlying layers. In the case of mobile computing applications, the packet losses are more frequent and consecutive because of the limited bandwidth. In this paper, we first statistically analyze the characteristics of packet losses in the wired and wireless communications, based on Gilbert model, and a new packet recovery scheme for realtime data transmission is presented. To reflect the transmission characteristics of the present network environment, our scheme makes the sender to dynamically adjust the amount of redundant information, using the current packet loss characteristic parameters reported by the receiver. Additionally, we use relatively large and discontinuous offset values, which enables us to recover from both of the random and consecutive packet losses. Due to these characteristics, our scheme is suitable for the mobile computing environment where packet loss rates are relatively high and varies rapidly in a wide range. Since our scheme is based on the analytic model form statistics, it can also be used for other network environments. We have implemented the scheme with Mobile IP and RTP/RTCP protocols to experimentally verify its efficiency.

  • PDF

Performance Evaluation and Enhancement of Transmission Technique in Wireless Sensor Networks (무선센서네트워크에서 성능측정을 통한 전송방식의 문제점 분석 및 개선)

  • Lim, Dong-Sun;Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1311-1321
    • /
    • 2010
  • Sensor network is used to obtain sensing data in various area. The interval to sense the events depends on the type of target application and the amounts of data generated by sensor nodes are not constant. Many applications exploit long sensing interval to enhance the life time of network but there are specific applications that requires very short interval to obtain fine-grained, high-precision sensing data. If the number of nodes in the network is increased and the interval to sense data is shortened, the amounts of generated data are greatly increased and this leads to increased amount of packets to transfer to the network. To transfer large amount of packets fast, it is necessary that the delay between successive packet transmissions should be minimized as possible. In this paper, we propose SET(SendDoneEventbasedTransmission Technique)which reduces the delay between successive packet transmissions by using SendDone Event which informs that a packet transmission has been completed. In SET, the delay between successive packet transmissions is shortened very much since the transmission of next packet starts at the time when the transmission of previous packet has completed, irrespective of the transmission time. Therefore SET could provide high packet transmission rate given large amount of packets.

Application of Percolation Model for Network Analysis

  • Kiuchi, Yasuhiko;Tanaka, Masaru;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1101-1104
    • /
    • 2002
  • In order to send the information certainly via the network against the packet lost caused by hardware troubles or limitation of packet transferring, we must construct reliable network infrastructure. However, it is difficult to construct comfortable network early if we construct rely on the prediction or the experience through a lot of troubles. In this paper, we propose the method to construct reliable network infrastructure based on the computer network simulation. This simulation is based on the percolation model. Percolation model is known as the model that represents connections. We gave some simulations for the various network topologies: the square lattice network, the cubic lattice network, and the full connection type network.

  • PDF

Energy-Efficient Scheduling with Individual Packet Delay Constraints and Non-Ideal Circuit Power

  • Yinghao, Jin;Jie, Xu;Ling, Qiu
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.36-44
    • /
    • 2014
  • Exploiting the energy-delay tradeoff for energy saving is critical for developing green wireless communication systems. In this paper, we investigate the delay-constrained energy-efficient packet transmission. We aim to minimize the energy consumption of multiple randomly arrived packets in an additive white Gaussian noise channel subject to individual packet delay constraints, by taking into account the practical on-off circuit power consumption at the transmitter. First, we consider the offline case, by assuming that the full packet arrival information is known a priori at the transmitter, and formulate the energy minimization problem as a non-convex optimization problem. By exploiting the specific problem structure, we propose an efficient scheduling algorithm to obtain the globally optimal solution. It is shown that the optimal solution consists of two types of scheduling intervals, namely "selected-off" and "always-on" intervals, which correspond to bits-per-joule energy efficiency maximization and "lazy scheduling" rate allocation, respectively. Next, we consider the practical online case where only causal packet arrival information is available. Inspired by the optimal offline solution, we propose a new online scheme. It is shown by simulations that the proposed online scheme has a comparable performance with the optimal offline one and outperforms the design without considering on-off circuit power as well as the other heuristically designed online schemes.

Implementation of Class-Based Low Latency Fair Queueing (CBLLFQ) Packet Scheduling Algorithm for HSDPA Core Network

  • Ahmed, Sohail;Asim, Malik Muhammad;Mehmood, Nadeem Qaisar;Ali, Mubashir;Shahzaad, Babar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.473-494
    • /
    • 2020
  • To provide a guaranteed Quality of Service (QoS) to real-time traffic in High-Speed Downlink Packet Access (HSDPA) core network, we proposed an enhanced mechanism. For an enhanced QoS, a Class-Based Low Latency Fair Queueing (CBLLFQ) packet scheduling algorithm is introduced in this work. Packet classification, metering, queuing, and scheduling using differentiated services (DiffServ) environment was the points in focus. To classify different types of real-time voice and multimedia traffic, the QoS provisioning mechanisms use different DiffServ code points (DSCP).The proposed algorithm is based on traffic classes which efficiently require the guarantee of services and specified level of fairness. In CBLLFQ, a mapping criterion and an efficient queuing mechanism for voice, video and other traffic in separate queues are used. It is proved, that the algorithm enhances the throughput and fairness along with a reduction in the delay and packet loss factors for smooth and worst traffic conditions. The results calculated through simulation show that the proposed calculations meet the QoS prerequisites efficiently.

The System of DHCPv6 for Secure Packet Transition in IPv6 Environment (IPv6 환경에서의 Secure Packet 전송을 위한 DHCPv6 시스템 개발)

  • Yoon, Yoon Sang;Chung, Jin Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.1-6
    • /
    • 2003
  • The IPv6 was suggested as an ultimate solution of problems that IPv4 protocol maintains limitations to apply to new technology of data service and the lack of IPv4 address space. So it is expected to transfer IPv4 to IPv6 gradually. In the Ipv6 environment, it is easier to apply security policies and transmits a secure packet applied the security policies, with the content in the Header itself. By this reason, this paper describes about the implementation of DHCPv6 server to perform a connection of IPv6 network and IPv4 network, and the application of secure packet with the security policies for clients. Further, it performs the process of the massages inside the DHCPv6 server to be used in the IPv6 environment in the future.

  • PDF

A Study on a Packet Forwarding Scheme based on Interworking Architecture (연동 구조 기반의 패킷 포워딩 기법에 대한 연구)

  • Kim, Seok-Hoon;Ryoo, In-Tae
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.97-106
    • /
    • 2005
  • Generally, network QoS is determined by timeliness, bandwidth, and reliability, As IT technologies are growing day by day, the bandwidth and reliability factors are expected to be able to satisfy user's requirements. The timeliness factor, however, has not fully met user's requirements yet. In this paper, we propose a packet forwarding scheme named POSIA (Packet forwarding Scheme based on Interworking Architecture) that can provide quite a good QoS (quality of service) by minimizing processing time which is the major part of the timeliness factor. Based on path and resource reservation mechanism, the proposed POSIA makes routers on the packet forwarding path synchronize with each other and then forward packets, The POSIA has been verified to outperform the existing MPLS packet forwarding scheme through computer simulations using OPNET.

  • PDF

An Intrusion Detection System using Time Delay Neural Networks (시간지연 신경망을 이용한 침입탐지 시스템)

  • 강흥식;강병두;정성윤;김상균
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.778-787
    • /
    • 2003
  • Intrusion detection systems based on rules are not efficient for mutated attacks, because they need additional rules for the variations. In this paper, we propose an intrusion detection system using the time delay neural network. Packets on the network can be considered as gray images of which pixels represent bytes of them. Using this continuous packet images, we construct a neural network classifier that discriminates between normal and abnormal packet flows. The system deals well with various mutated attacks, as well as well known attacks.

  • PDF

Anomaly Detection Method Using Entropy of Network Traffic Distributions (네트워크 트래픽 분포 엔트로피를 이용한 비정상행위 탐지 방법)

  • Kang Koo-Hong;Oh Jin-Tae;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.283-294
    • /
    • 2006
  • Hostile network traffic is often different from normal traffic in ways that can be distinguished without knowing the exact nature of the attack. In this paper, we propose a new anomaly detection method using inbound network traffic distributions. For this purpose, we first characterize the traffic of a real campus network by the distributions of IP protocols, packet length, destination IP/port addresses, TTL value, TCP SYN packet, and fragment packet. And then we introduce the concept of entropy to transform the obtained baseline traffic distributions into manageable values. Finally, we can detect the anomalies by the difference of entropies between the current and baseline distributions. In particular, we apply the well-known denial-of-service attacks to a real campus network and show the experimental results.

A Study for Improving WSNs(Wireless Sensor Networks) Performance using Clustering and Location Information (Clustering 및 위치정보를 활용한 WSN(Wireless Sensor Network) 성능 향상 방안 연구)

  • Jeon, Jin-han;Hong, Seong-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.260-263
    • /
    • 2019
  • Recently, the need of researches and developments about WSN(Wireless Sensor Network) technologies, which can be applied to services to regions where the access is difficult or services that require continuous monitoring, has gradually increased due to its expansion and efficiency of the application areas. In this paper, we analyze existing researches which focused on reducing packet loss rate and increasing lifetime of sensor nodes. Then, we conduct studies about performance improvement factors where some schemes - clustering and location-based approaches - are applied and compare our study results with existing researches. Based on our studies, we are planning to conduct researches about a new scheme that could contribute to improve WSN's performance in terms of packet loss rate and network lifetime.

  • PDF