• Title/Summary/Keyword: Network packet

Search Result 2,663, Processing Time 0.022 seconds

Enhanced Packet Transmission in Ad-hoc Networks using Unicast with Temporary Routing (애드혹 네트워크에서 임시 경로 설정 유니캐스트를 기반으로 한 향상된 멀티 홉 전송 기법)

  • Ko, Sung-Hyun;Yoo, Sung-Jae;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • Smart packet agent is an application that is proposed to provide routing protocol and service module in ubiquitous network environment. However, it uses multi-hop broadcast, thus it causes increasing network traffic, low-speed data transmission, and the unnecessary joining nodes. In this paper, a transmit technique that uses unicast-based multi-hop to have lower network traffic and faster transmission time than the multi-hop broadcast technique. In our scheme, u-Zone Master establishes temporary routing paths by calculating moving nodes' hop-counter. Therefore, it reduces smart packet agent's network traffic and retransmission rate. Besides, this paper proposed an UDP transmission that bases on sliding window. Hence, the Stop & Wait transmission speed is improved. The results, which are taken by analyzing performance prove that the proposed scheme has better performance.

A Packet Dropping Algorithm based on Queue Management for Congestion Avoidance (폭주회피를 위한 큐 관리 기반의 패킷 탈락 알고리즘)

  • 이팔진;양진영
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.43-51
    • /
    • 2002
  • In this paper, we study the new packet dropping scheme using an active queue management algorithm. Active queue management mechanisms differ from the traditional drop tail mechanism in that in a drop tail queue packets are dropped when the buffer overflows, while in active queue management mechanisms, packets may be dropped early before congestion occurs, However, it still incurs high packet loss ratio when the buffer size is not large enough, By detecting congestion and notifying only a randomly selected fraction of connection, RED causes to the global synchronization and fairness problem. And also, it is the biggest problem that the network traffic characteristics need to be known in order to find the optimum average queue length, We propose a new efficient packet dropping method based on the active queue management for congestion control. The proposed scheme uses the per-flow rate and fair share rate estimates. To this end, we present the estimation algorithm to compute the flow arrival rate and the link fair rate, We shows the proposed method improves the network performance because the traffic generated can not cause rapid fluctuations in queue lengths which result in packet loss

  • PDF

Design and Implementation of a Network Packet Scanner based on Multi-Platform (멀티 플랫폼 기반의 네트워크 패킷 스캐너 설계 및 구현)

  • Lee, Woo-In;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.101-112
    • /
    • 2010
  • The recent trend of the hacking deals with all the IT infrastructure related to the profit of the companies. Presently, they attack the service itself, the source of the profit, while they tried to access to the service infrastructure through the non-service port in the past. Although they affect the service directly, it is difficult to block them with the old security solution or the old system and they threaten more and more companies with the demand of money menacing the protection of customers and the sustainable management. This paper aims to design and implement multi-platform network packet scanner targeting the exception handling network intrusion detection system which determines normal, abnormal by traffic. Linux and unix have the various network intrusion detection and packet management tools like ngrep, snort, TCPdump, but most of them are based on CUI (Character based User Interface) giving users discomfort who are not used to it. The proposed system is implemented based on GUI(Graphical User Interface) to support the intuitive and easy-to-use interface to users, and using Qt(c++) language that supports multi-platform to run on any operating system.

TCP Performance Control Method for the Wireless Link by using Extended ECN Mechanism (확장된 ECN 메커니즘을 사용한 무선 링크에서의 TCP성능 제어 기법)

  • Yun, You-Hun;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.336-343
    • /
    • 2002
  • Nowadays, after appearance of wireless network the existent internet environment is changing into the united wire/wireless network. But the present TCP regards all of the packet losses on transmission as the packet tosses due to the congestion. When it is applied on the wireless path, it deteriorates the end-to-end TCP throughput because it regards the packet loss by handoff or bit error as the packet loss by the congestion and it reduces the congestion window. In this paper, for solving these problems we propose the method that controls the performance of TCP on the wireless link by extending ECN which is used as a congestion control mechanism on the existent wire link. This is the method that distinguished the packet loss due to the congestion from due to bit error or handoff on the wireless network, so it calls the congestion control mechanism only when there occurs the congestion in the united wire/wireless network.

Diffusion Patterns of Telecommunications Services with Network Evolution (네트워크 진화에 따른 통신서비스 확산 패턴의 변화)

  • Kim Moon-Soo;Kim Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.93-102
    • /
    • 2006
  • Traditionally, diffusion of telecommunications services has been considerably affected by presence of critical mass and network externalities, and thus shown the so-called late take-off phenomenon. However, as telecommunications network evolves from circuit switching to packet switching, enabling diverse new services such as Internet access, Internet banking and web hosting, it seems this traditional diffusion patterns are changing. By comparing diffusion of the packet-based services with those of circuit-based services and durable goods, we have found the late take-off phenomenon is not involved in diffusion of newly introduced the packet-based services. Moreover, we concluded diffusion of the packet-based services is much faster than that of durable goods, thus showing early take-off phenomenon. Based on this empirical result, we suggest Telcos and ISPs should pay as much attention to the growth state as the introduction stage in order for their packet-based services to be successful in the markets.

  • PDF

Control Packet Transmission Decision Method for Wearable Sensor Systems (웨어러블 센서 시스템에서의 제어 패킷 전송 결정 기법)

  • Yu, Daeun;Kim, Namgi
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.11-17
    • /
    • 2015
  • In the general transmission power control model that is used for wearable sensor systems, if RSSI value gets out of the Target RSSI Margin, then the sink node finds new transmission power by using TPC(Transmission Power Control) Algorithm. At this time, the sink node sends the control packet to the sensor node for delivering the newly calculated transmission power. However, when the wireless network channel condition is poor, even it is consuming a lot of control packets, the sink node could not find an appropriate transmission power so it only waste of energy. Therefore, we proposed a new control packet transmission decision method that the sink node changes the transmission power when the wireless network channel condition is stabilized. It makes waste of energy decline. In this paper, we apply control packet transmission decision method to Binary TPC algorithms and analyze the results to evaluate the proposed method. We propose three methods that judge the state of wireless network channel. We experiment that methods and analysis the results.

The Effect of the Buffer Size in QoS for Multimedia and bursty Traffic: When an Upgrade Becomes a Downgrade

  • Sequeira, Luis;Fernandez-Navajas, Julian;Saldana, Jose
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3159-3176
    • /
    • 2014
  • This work presents an analysis of the buffer features of an access router, especially the size, the impact on delay and the packet loss rate. In particular, we study how these features can affect the Quality of Service (QoS) of multimedia applications when generating traffic bursts in local networks. First, we show how in a typical SME (Small and Medium Enterprise) network in which several multimedia flows (VoIP, videoconferencing and video surveillance) share access, the upgrade of the bandwidth of the internal network may cause the appearance of a significant amount of packet loss caused by buffer overflow. Secondly, the study shows that the bursty nature of the traffic in some applications traffic (video surveillance) may impair their QoS and that of other services (VoIP and videoconferencing), especially when a certain number of bursts overlap. Various tests have been developed with the aim of characterizing the problems that may appear when network capacity is increased in these scenarios. In some cases, especially when applications generating bursty traffic are present, increasing the network speed may lead to a deterioration in the quality. It has been found that the cause of this quality degradation is buffer overflow, which depends on the bandwidth relationship between the access and the internal networks. Besides, it has been necessary to describe the packet loss distribution by means of a histogram since, although most of the communications present good QoS results, a few of them have worse outcomes. Finally, in order to complete the study we present the MOS results for VoIP calculated from the delay and packet loss rate.

Kriging Regressive Deep Belief WSN-Assisted IoT for Stable Routing and Energy Conserved Data Transmission

  • Muthulakshmi, L.;Banumathi, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.91-102
    • /
    • 2022
  • With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.

Multicore Flow Processor with Wire-Speed Flow Admission Control

  • Doo, Kyeong-Hwan;Yoon, Bin-Yeong;Lee, Bhum-Cheol;Lee, Soon-Seok;Han, Man Soo;Kim, Whan-Woo
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.827-837
    • /
    • 2012
  • We propose a flow admission control (FAC) for setting up a wire-speed connection for new flows based on their negotiated bandwidth. It also terminates a flow that does not have a packet transmitted within a certain period determined by the users. The FAC can be used to provide a reliable transmission of user datagram and transmission control protocol applications. If the period of flows can be set to a short time period, we can monitor active flows that carry a packet over networks during the flow period. Such powerful flow management can also be applied to security systems to detect a denial-of-service attack. We implement a network processor called a flow management network processor (FMNP), which is the second generation of the device that supports FAC. It has forty reduced instruction set computer core processors optimized for packet processing. It is fabricated in 65-nm CMOS technology and has a 40-Gbps process performance. We prove that a flow router equipped with an FMNP is better than legacy systems in terms of throughput and packet loss.

Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer (애플리케이션 계층에서 트래픽 분석을 위해 부하 차단기를 적용한 네트워크 트래픽 모니터링 시스템)

  • Son Sei-Il;Kim Heung-Jun;Lee Jin-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.53-60
    • /
    • 2006
  • As it has been continuously increased the volume of traffic over Internet, it is hard for a network traffic monitoring system to analysis every packet in a real-time manner. While it is increased usage of applications which are dynamically allocated port number such as peer-to-peer(P2P), steaming media, messengers, users want to analyze traffic data generated from them. This high level analysis of each packet needs more processing time. This paper proposes to introduce load shedder for limiting the number of packets. After it determines what application generates a selected packet, the packet is analyzed with a defined application protocol.

  • PDF