• Title/Summary/Keyword: Packet Analyze System

Search Result 143, Processing Time 0.027 seconds

A Packet Collision Avoidance Technique in IEEE1609.4 Based Time Synchronization Multi-channel Environment (IEEE1609.4 기반 시간 동기 멀티채널 환경에서의 패킷 충돌 회피 기법)

  • Jin, Seong-Keun;Lim, Ki-Taeg;Shin, Dae-Kyo;Yoon, Sang-Hun;Jung, Han-Gyun
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.385-391
    • /
    • 2015
  • In this paper, we analyze the communication performance in a time synchronous multi-channel environment and deal with a packet collision avoidance technique to improve it based on IEEE1609.4 for increasing the efficiency of the control channel IEEE802.11p WAVE communication system. In previous works, they tried to solve this problem by message scheduling method on application layer software or changing the value of the random back-off optionally Contention Window. In this paper, we propose a method for adjusting the Channel Guard Interval for packet collision avoidance. The performance was evaluated by the actual vehicle test. The result was confirmed performance over 90% PDR(Packet Delivery Ratio).

Control Packet Transmission Decision Method for Wearable Sensor Systems (웨어러블 센서 시스템에서의 제어 패킷 전송 결정 기법)

  • Yu, Daeun;Kim, Namgi
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.11-17
    • /
    • 2015
  • In the general transmission power control model that is used for wearable sensor systems, if RSSI value gets out of the Target RSSI Margin, then the sink node finds new transmission power by using TPC(Transmission Power Control) Algorithm. At this time, the sink node sends the control packet to the sensor node for delivering the newly calculated transmission power. However, when the wireless network channel condition is poor, even it is consuming a lot of control packets, the sink node could not find an appropriate transmission power so it only waste of energy. Therefore, we proposed a new control packet transmission decision method that the sink node changes the transmission power when the wireless network channel condition is stabilized. It makes waste of energy decline. In this paper, we apply control packet transmission decision method to Binary TPC algorithms and analyze the results to evaluate the proposed method. We propose three methods that judge the state of wireless network channel. We experiment that methods and analysis the results.

A Study on Packet Scheduling Algorithm Based on Pricing in HSDPA System (HSDPA 시스템에서 요금 기반의 패킷 스케줄링 알고리즘에 관한 연구)

  • Son Ju-Hee;Piao Shi-Quan;Park Yong-Wan;Lee Kyong-Lak;Chang Jae-Sung;Moon Soon-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.219-227
    • /
    • 2006
  • In this paper, we propose a packet scheduling algorithm to maximize the required total price of the systems that is applied with a different traffic pricing criterion by the mobile service operator according to different kinds of the services. The proposed algorithm adopts a particular estimation method in scheduling using the value of pricing function, which is based on the required services and the value of SIR(signal to interference ratio) that indicate the channel condition of each user. We compare Max C/I, proportional fairness and round robin algorithm with the proposed algorithm on HSDPA in order to analyze the performance. The result shows that the proposed algorithm satisfies higher throughput and provides maximum the mobile service provider's revenue.

Optimal Stochastic Policies in a network coding capable Ad Hoc Networks

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4389-4410
    • /
    • 2014
  • Network coding is a promising technology that increases system throughput by reducing the number of packet transmissions from the source node to the destination node in a saturated traffic scenario. Nevertheless, some packets can suffer from end-to-end delay, because of a queuing delay in an intermediate node waiting for other packets to be encoded with exclusive or (XOR). In this paper, we analyze the delay according to packet arrival rate and propose two network coding schemes, iXOR (Intelligent XOR) and oXOR (Optimal XOR) with Markov Decision Process (MDP). They reduce the average delay, even under an unsaturated traffic load, through the Holding-${\chi}$ strategy. In particular, we are interested in the unsaturated network scenario. The unsaturated network is more practical because, in a real wireless network, nodes do not always have packets waiting to be sent. Through analysis and extensive simulations, we show that iXOR and oXOR are better than the Distributed Coordination Function (DCF) without XOR (the general forwarding scheme) and XOR with DCF with respect to average delay as well as delivery ratio.

PUM: Processing Unit Module Design of Intrusion Detector for Large Scale Network (대규모 네트워크를 위한 침입 탐지결정모듈 설계)

  • 최인수;차홍준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.53-58
    • /
    • 2002
  • the popularity of uses for internet has been needed to information security. thereforce, intrusion, information leakage and modification, change or intentional efflux to computer system aspects of information security have been resulted in requirement of intrusion detection from outer at user authentication. this problem Presents design of PUM(Processing Unit Module) which analyze both the host log generated by sever host systems that various case for intellectualized intrusion method and network_packet on networks in large scale network.

  • PDF

Network Coding delay analysis under Dynamic Traffic in DCF without XOR and DCF with XOR (DCF와 DCF with XOR에서 동적인 트래픽 상태에 따른 네트워크 코딩 지연시간 분석)

  • Oh, Ha-Young;Lee, Junjie;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.251-255
    • /
    • 2009
  • Network coding is a promising technology that increases the system throughput via reducing the number of transmission for a packet delivered from the source node to the destination node. Nevertheless, it suffers from the metrics of end-to-end delay. Network Coding scheme takes more processing delay which occurs as coding node encodes (XOR) a certain number of packets that relayed by the coding node, and more queuing delay which occurs as a packet waits for other packets to be encoded with. Therefore, in this paper, we analyze the dependency of the queuing delay to the arrival rate of each packet. In addition, we analyze and compare the delay in DCF without XOR and DCF with XOR under dynamic traffic.

Design of Traffic Metering System using Embedded Linux (임베디드 리눅스를 이용한 트래픽 미터링 시스템 설계)

  • Lee, Heung-Jae;Jeon, Hee-Jin;Choe, Jin-Kyu;Lee, Kyou-Ho
    • Journal of IKEEE
    • /
    • v.9 no.2 s.17
    • /
    • pp.79-86
    • /
    • 2005
  • Increasing network traffic and multimedia application services need realtime analysis of network traffic for improvement of QoS and effective management of network resource. Because difficulty of measurement based on software method, study of meter architecture for efficient capture function is necessary. Therefore we design and implement hardware metering system for efficient packet capture using embedded linux. And we analyze required bandwidth of system bus and memory for 10Gbps traffic through simulation.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Design and Performance Analysis of an Asynchronous Shared-Bus Type Switch with Priority and Fairness Schemes

  • Goo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.812-822
    • /
    • 1997
  • In this paper, we propose an architecture of the asynchronous shared-bus type switch with priority and fairness schemes. The switch architecture is an input and output queueing system, and the priority scheme is implemented in both input and output queues. We analyze packet delay of both input and output queues. In the analysis, we consider to stations with asymmetric arrival rates. Although we make some approximations in the analysis, the numerical results show good agreements with the simulation results.

  • PDF

End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite (OPNET Modeler Wireless Suite를 이용한 종단간 패킷 통계 분석)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.265-278
    • /
    • 2011
  • The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.