• Title/Summary/Keyword: Packet/Protocol Analysis

Search Result 274, Processing Time 0.027 seconds

Analysis of TCP packet by Protocol Analysis module Design (프로토콜 분석모듈 설계에 의한 TCP 패킷 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL

  • Han Dong-Hwan;Park Chul-Geun
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.501-515
    • /
    • 2006
  • The IEEE 802.11 protocol is the most mature technology for WLANs(Wireless Local Area Networks). However, as the number of stations increases, the delay and throughput performance of IEEE 802.11 MAC(Medium Access Control) degrades severely. In this paper, we present the comprehensive performance analysis of IEEE 802.11 MAC protocol by investigating the MAC layer packet service time when arrival packet sizes have a general probability distribution. We obtain the discrete probability distribution of the MAC layer service time. By using this, we analyze the system throughput and the MAC layer packet service time of IEEE 802.11 MAC protocol in wireless LAN environment. We take some numerical examples for the system throughput and the mean packet service time for several special distributions of arrival packet sizes.

Delay Analysis of the ISDN D-channel Access Protocol (ISDN D-채널 Access Protocol의 Delay 분석)

  • 이구연;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.98-111
    • /
    • 1990
  • In this paper a queneing model for the D channel access protocal recommeded by CCITT is developed, and delays of the signalling and packet messages are analyzed using the model, Behaviors of packet and signalling messages in the D-channel access system are also investigated. The analytical results have been verified by simulation.

  • PDF

Performance Analysis of HomePNA 2.0 MAC Protocol (HomePNA 2.0 MAC 프로토콜의 성능 분석)

  • Kim, Jong-Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10A
    • /
    • pp.877-885
    • /
    • 2005
  • The Home Phoneline Networking Alliance (HomePNA) 2.0 technology can establish a home network using existing in-home phone lines, which provides a channel rate of 4-32 Mbps. HomePNA 2.0 Medium Access Control(MAC) protocol adopts an IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method, Quality of Service(QoS) algorithm, and Distributed Fair Priority Queuing(DFPQ) collision resolution algorithm. In this paper, we propose some mathematical models about the important elements of HomePNA 2.0 MAC protocol performance, which are Saturation Throughput, Packet Delay and Packet Jitter. Then, we present an overall performance analysis of HomePNA 2.0 MAC protocol along with simulations.

Priority-based Reservation Code Multiple Access (P-RCMA) Protocol (우선순위 기반의 예약 코드 다중 접속 (P-RCMA) 프로토콜)

  • 정의훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2A
    • /
    • pp.187-194
    • /
    • 2004
  • We propose priority-based reservation code multiple access (P-RCMA) which can enhance voice traffic quality of the previous RCMA. The proposed protocol maintains two power levels and consider traffic characteristics in contending shared available codes to transmit packets. P-RCMA gives priority to the voice request packets rather than data packets by capture effect at the receiver part of base station. We show numerical results from EPA (equilibrium point analysis) analysis and simulation study in terms of voice packet dropping probability and average data packet transmission delay.

A Study on MAC Protocol for Packet Data Service in Slotted CDMA Environment (Slotted CDMA 환경에서 패킷 데이터 서비스를 위한 MAC 프로토콜 연구)

  • 임인택
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.204-210
    • /
    • 2004
  • This paper proposes a transmission probability control scheme and MAC protocol for packet data services in slotted CDMA system. In slotted CDMA system, multiple access interference is the major factor of unsuccessful packet transmissions. Therefore, in order to obtain the optimal system throughput, the number of simultaneously transmitted packets should be kept at a proper level. In the proposed protocol, the base station calculates the packet transmission probability of mobile stations according to the offered load and then broadcasts it. Mobile stations, which have a packet, attempt to transmit packet with the received probability. Numerical analysis and simulation results show that the proposed scheme can offer better system throughput than the conventional one, and guarantee a good fairness among all mobile stations regardless of the offered load.

  • PDF

Performance Analysis of MAC Protocol with Packet Reservation and Status Sensing for Packet CDMA Networks (패킷 CDMA망에서 예약 및 채널 상태 감지 기법을 적용한 MAC 프로토콜의 성능 분석)

  • 임인택
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.126-130
    • /
    • 1999
  • In packet CDMA networks, it is important to design a MAC protocol that meets the QoS requirements , of the different traffic types and allocates the radio channels efficiently. In this paper, a RRS$^2$-CDMA MAC protocol is proposed for integrating voice and data services in the microcellular packet CDMA networks. In PRS$^2$-CDMA, a voice terminal can resolve a spreading code to transmit voice packets during a talkspurt while a data terminal has to contend for a code for each packet transmission. The numerical results show that the proposed protocol can improve the system capacity, while guaranteeing the QoS of voice and data services.

  • PDF

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

Development of Control and Analysis Software for Electronic Warfare Test System Using Reverse Engineering of Network Protocol (프로토콜 역설계를 이용한 전자전시험장비 제어 및 신호분석 소프트웨어 개발)

  • Jung, In-Hwa
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.58-66
    • /
    • 2008
  • In this paper, we have proposed a method and procedure which can find out the unknown network protocol. Although it seems to be difficult to identify the protocol, we can find out the rule in the packet according to the method we have proposed. We have to recognize functions of the system and make the list of events first. Then we capture the network packet whenever the event are occurred. The captured packets are examined by means of the method that is finding repeated parts, changed parts according to the input value, fixed parts and changed parts according to regular rules. Finally we make the test program to verify the protocol. We applied this method and procedure to upgrade Electronic Warfare Test System which is operated by ADD. We have briefly described the redesign of control and analysis software for Electronic Warfare Test System

p-Persistent MAC Protocol for WDM Ring Networks

  • So, Won-Ho;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.589-597
    • /
    • 2007
  • In this paper, a WDM metro ring consisting of access nodes with $FT-FR^n$ (Fixed Transmitter - n Fixed Receivers) is considered. A trade-off exists between node throughput and transmission fairness because the access nodes share wavelength channels. In order to eliminate the transmission unfairness and to increase throughput, the p-persistent medium access control (MAC) protocol is proposed: each node uses an empty optical slot to transmit a packet and make it available with the extraction of a transferred packet at the source access node, called source-stripping. The local empty slot can be used to transfer a head-of-line packet in the local buffer with probability p or it is used for the next downstream nodes with 1-p. The proposed MAC protocol provides better node throughput than the non-persistent protocol and exhibits better fairness index than the 1-persistent protocol in WDM ring networks. In addition, numerical analysis shows that the proposed MAC protocol maximizes the node throughput under uniform traffic conditions. For more detailed results, we use the network simulation under Poisson and self-similar traffic. Furthermore, unpredictable traffic constructed by the combination of the former and the latter is also considered. The reasonable probability of the p-persistent protocol for a given architecture can be determined through simulation.