• Title/Summary/Keyword: Network packet

Search Result 2,663, Processing Time 0.025 seconds

Estimation of Channel Capacity for Data Traffic Transmission (데이터 트래픽 특성을 고려한 적정 채널 용량 산정)

  • Park, Hyun Min
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.589-595
    • /
    • 2017
  • We present an estimation model for optimal channel capacity required to data traffic transmission. The optimal channel capacity should be calculated in order to satisfy the permitted transmission delay of each wireless data services. Considering the discrete-time operation of digital communication systems and batch arrival of packet-switched traffic for various wireless services, $Geo^x$/G/1 non-preemptive priority queueing model is analyzed. Based on the heuristic interpretation of the mean waiting time, the mean waiting times of various data packets which have the service priority. Using the mean waiting times of service classes, we propose the procedure of determining the optimal channel capacity to satisfy the quality of service requirement of the mean delay of wireless services. We look forward to applying our results to improvement in wireless data services and economic operation of the network facilities.

Transmission status monitoring method for improving the performance of MPTCP in Bufferbloat environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 전송 상태 모니터링 방법)

  • Jung, Il Hyung;Lee, Jae Yong;Kim, Byung Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.259-269
    • /
    • 2018
  • Multipath TCP (MPTCP) can be expected to provide improved network performance because it transmits data through multiple paths. However, Bufferbloat, which unexpectedly occurs in the transmission path, degrades not only the performance of the corresponding path but also the performance of other paths, so that the performance is worse than that of a single TCP. In this paper, we propose the transmission status monitoring method at the sender's MPTCP level and also HoL packets retransmission algorithm in order to solve the Bufferbloat problem. The proposed algorithm enables Bufferbloat detection by the sender side independently, and it can resolve the HoL blocking problem by identifying the HoL packet in the proposed transmission status monitoring buffer and retransmitting it to the normal path. Simulation results based on NS-3 show that the proposed algorithm achieves the improved throughput performance up to 22.8% compared to the existing MPTCP, and the average number of queued packets in the sender and receiver's buffers is decreased to 44.3% and 9.2%, respectively.

Handover in LTE networks with proactive multiple preparation approach and adaptive parameters using fuzzy logic control

  • Hussein, Yaseein Soubhi;Ali, Borhanuddin M;Rasid, Mohd Fadlee A.;Sali, Aduwati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2389-2413
    • /
    • 2015
  • High data rates in long-term evolution (LTE) networks can affect the mobility of networks and their performance. The speed and motion of user equipment (UE) can compromise seamless connectivity. However, a proper handover (HO) decision can maintain quality of service (QoS) and increase system throughput. While this may lead to an increase in complexity and operational costs, self-optimization can enhance network performance by improving resource utilization and user experience and by reducing operational and capital expenditure. In this study, we propose the self-optimization of HO parameters based on fuzzy logic control (FLC) and multiple preparation (MP), which we name FuzAMP. Fuzzy logic control can be used to control self-optimized HO parameters, such as the HO margin and time-to-trigger (TTT) based on multiple criteria, viz HO ping pong (HOPP), HO failure (HOF) and UE speeds. A MP approach is adopted to overcome the hard HO (HHO) drawbacks, such as the large delay and unreliable procedures caused by the break-before-make process. The results of this study show that the proposed method significantly reduces HOF, HOPP, and packet loss ratio (PLR) at various UE speeds compared to the HHO and the enhanced weighted performance HO parameter optimization (EWPHPO) algorithms.

Jitter-based Rate Control Scheme for Seamless HTTP Adaptive Streaming in Wireless Networks (무선 환경에서 끊김 없는 HTTP 적응적 스트리밍을 위한 지터 기반 전송률 조절 기법)

  • Kim, Yunho;Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.628-636
    • /
    • 2017
  • HTTP adaptive streaming is a technique that improves the quality of experience by storing various quality videos on the server and requesting files of the appropriate quality based on network bandwidth. However, it is difficult to measure the actual bandwidth in wireless networks with frequent bandwidth changes and high loss rate. Frequent quality changes and playback interruptions due to bandwidth measurement errors degrade the quality of experience. We propose a technique to estimate the available bandwidth by measuring the jitter, which is the derivation of delay, on a packet basis and assigning a weight according to jitter. The proposed scheme reduces the number of quality changes and mitigates the buffer underflow by reflecting less bandwidth change when high jitter occurs due to rapid bandwidth change. The experimental results show that the proposed scheme improves the quality of experience by mitigating buffer underflow and reducing the number of quality changes in wireless networks.

A wireless high-frequency anemometer instrumentation system for field measurements

  • Huang, Guoqing;Peng, Liuliu;Su, Yanwen;Liao, Haili;Li, Mingshui
    • Wind and Structures
    • /
    • v.20 no.6
    • /
    • pp.739-749
    • /
    • 2015
  • Field measurement of wind characteristics is of great significance for the wind engineering community. High-frequency anemometers such as ultrasonic anemometers are widely used to obtain the high-frequency fluctuating wind speed time history. However, conventional instrumentation systems may suffer from low efficiency, non-real time transmission and higher maintenance cost, and thus are not very appropriate in the field measurement of strong winds in remote areas such as mountain valleys. In order to improve the field measurement performance in those remote areas, a wireless high-frequency anemometer instrumentation system for field measurement has been developed. In this paper, the architecture of the proposed instrumentation system, and measured data transmission and treatment will be presented firstly. Then a comparison among existing instrumentation systems and the proposed one is made. It shows that the newly-developed system has considerable advantages. Furthermore, the application of this system to the bridge site located in the mountain valley is discussed. Finally, typical samples of measured data from this area are presented. It can be expected that the proposed system has a great application potential in the wind field measurement for remote areas such as the mountainous or island or coastal area, and hazardous structures such as ultra-voltage transmission tower, due to its real-time transmission, low cost and no manual collection of data and convenience.

Handoff Scheme for 'Wibro.WLAN.3G' Integrated Networks in Common Base Station based on SDR (SDR기반 공용기지국환경의 'Wibro.WLAN.3G' 연동망 핸드오프 기법)

  • Kim, Jeong-Seop;Lee, Seung-Ho;Kim, Chang-Bock;Lee, Soon-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.94-102
    • /
    • 2007
  • Today, packet services for wireless internet is provided by WiBro WLAN 3G, but it is hard to be satisfied seamless connection in each of networks and wide-area service will increase the number of BS(base station) because WiBro and WLAN has been coverage smaller than 3G. that is, communicate which can use continuous and seamless data service is available when user is moving. Therefore, service provider need to integrate network for reducing management expenses. In this paper, we propose advanced handoff algorithm which is considered by 'user demand bandwidth', 'MN(Mobile Node) movement speed' and 'MN service area' and show that simulating result is superior to 'bandwidth allocation', 'QoS(Quality of Service) rate' and 'handoff failure rate'

Disjointed Multipath using Energy Efficient Face Routing in Wireless Sensor Networks (무선 센서 망에서 에너지 효율적인 페이스 라우팅을 활용한 분리된 다중 경로 방안)

  • Cho, Hyunchong;Kim, Cheonyong;Kim, Sangdae;Oh, Seungmin;Kim, Sang-Ha
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.116-121
    • /
    • 2017
  • In wireless sensor networks, the multipath prefers energy efficient routing method due to the characteristic of low-power sensor which uses geographic method to transmit data packet through information of the neighbor nodes. However, when multipath meets the routing fail area called hole area, path overlap problem can occur, resulting in failed maintenance of disjoint multipath. To solve this problem, multipath research studies have been performed to exploit the modeling and detouring method in routing fail area by keeping the disjoint multipath. However, in an energy point of view, additional method like modeling can lead to a lot of energy consumption of sensor node. Moreover, lots of energy consumption of sensor node can shorten the life span of sensor network. In this study, we proposed an energy efficient geographic routing by keeping the disjoint multipath in routing fail area. The proposed scheme exploited the face routing using the geographic recovery method without additional method like modeling.

A Cluster Group Head Selection using Trajectory Clustering Technique (궤적 클러스터링 기법을 이용한 클러스터 그룹 헤드 선정)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5865-5872
    • /
    • 2011
  • Multi-hop communication in clustering system is the technique that forms the cluster to aggregate the sensing data and transmit them to base station through midway cluster head. Cluster head around base station send more packet than that of far from base station. Because of this hot spot problem occurs and cluster head around base station increases energy consumption. In this paper, I propose a cluster group head selection using trajectory clustering technique(CHST). CHST select cluster head and group head using trajectory clustering technique and fitness function and it increases the energy efficiency. Hot spot problem can be solved by selection of cluster group with multi layer and balanced energy consumption using it's fitness function. I also show that proposed CHST is better than previous clustering method at the point of network energy efficiency.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.