• 제목/요약/키워드: Packet Capture

검색결과 61건 처리시간 0.026초

신호점유 현상과 보호시간을 고려한 슬롯형 알로아 통신 시스템의 성능분석 (Throughput Performance of Slotted ALOHA Communication System with Guard Time and Capture Effect)

  • 이현구;곽경섭
    • 한국통신학회논문지
    • /
    • 제18권7호
    • /
    • pp.989-998
    • /
    • 1993
  • 랜덤다원접속 방식인 알로아는 간헐적인 패켓 전송 환경에서 기존의 고정할당 기법보다는 높은 효율을 얻을 수 있다. 그러나 슬롯형 알로아에서는 패켓이 채널에 슬롯별로 할당되기 때된에 슬롯과의 동기화가 중요한 문제가 된다. 위성 통신에서 동기화가 이루어지지 못한 패켓은 인접슬롯의 패켓과 충돌하므로 이러한 문제점을 해결하기위해 슬롯 사이에 보호시간이 포함된다. 기존의 알로아 채널에서는 두개 또는 =1이상의 패켓이 한 슬롯에 동시에 도착될 때 충돌이 발생되고 충돌된 패켓은 모두 재전송 알고리듬에 따라 다시 전송된다. 그러나 무선 환경에서 사용자들은 각각 다른 거리에서 채널을 공유하기 때문에 신호 전력은 달라진다. 실제적으로 신호점유 현상이 존재해서 동시에 수신된 패켓들 중에서 전력이 가장 큰 패켓이 선택되어 모든 패켓이 재전송 될 필요가 없다. 한편 대역확산 다원접속 방식에서는 가장 빨리 도착한 패켓이 선택된다. 본 논문에서는 보호시간과 신호점유 현상을 동시에 고려하여 백로그 상태변화를 추적하는 마르코프 모델로부터 수식적으로 정확한 슬롯형 알로아의 전송효율을 유도한다.

  • PDF

라이시안 페이딩 채널에서 AFH알고리즘을 사용하는 블루투스 피코넷의 패킷 간섭과 통합 처리량 분석 (Packet Interference and Aggregated Throughput of Bluetooth Piconets Using an Adaptive Frequency Hopping in Rician Fading Channels)

  • 김승연;양성현;이형우;조충호
    • 한국통신학회논문지
    • /
    • 제33권7B호
    • /
    • pp.469-476
    • /
    • 2008
  • 본 논문에서는 AFH (Adaptive Frequency Hopping) 알고리즘을 사용하는 블루투스 (Bluetooth) 로 이루어진 피코넷 (Piconet) 이 WLAN (Wireless Local Area Network) 과 공존할 때 피코넷 패킷간의 충돌과 통합 처리량을 수학적으로 분석하였다. AFH 알고리즘에 의해 줄어든 블루투스의 흡수가 피코넷 간의 패킷 충돌을 증가 시킬 수 있고 통합 처리량에도 영향을 줄 수 있음을 알 수 있다. 또한 다중 경로 페이딩 채널을 고려하여 다수의 피코넷이 패킷을 전송할 때 동일 주파수를 사용하더라도 주변의 피코넷의 신호 세기에 따라 패킷의 충돌 확률에도 영향을 줄 수 있음을 알 수 있다. 본 연구는 블루투스와 WLAN 사용에 있어서 시스템의 파라미터 설정에 참고할 만한 가이드라인이 될 수 있을 것이다.

Software Design of Packet Analyzer based on Byte-Filtered Packet Inspection Mechanism for UW-ASN

  • Muminov, Sardorbek;Yun, Nam-Yeol;Park, Soo-Hyun
    • 한국멀티미디어학회논문지
    • /
    • 제14권12호
    • /
    • pp.1572-1582
    • /
    • 2011
  • The rapid growth of UnderWater Acoustic Sensor Networks (UW-ASNs) has led researchers to enhance underwater MAC protocols against limitations existing in underwater environment. We propose the customized robust real-time packet inspection mechanism with addressing the problem of the search for the data packet loss and network performance quality analysis in UW-ASNs, and describe our experiences using this approach. The goal of this work is to provide a framework to assess the network real-time performance quality. We propose a customized and adaptive mechanism to detect, monitor and analyze the data packets according to the MAC protocol standards in UW-ASNs. The packet analyzing method and software we propose is easy to implement, maintain, update and enhance. We take input stream as real data packets from sniffer node in capture mode and perform fully analysis. We were interested in developing software and hardware designed tool with the same capabilities which almost all terrestrial network packet sniffers have. Experimental results confirm that the best way to achieve maximum performance requires the most adaptive algorithm. In this paper, we present and offer the proposed packet analyzer, which can be effectively used for implementing underwater MAC protocols.

임베디드 리눅스를 이용한 트래픽 미터링 시스템 설계 (Design of Traffic Metering System using Embedded Linux)

  • 이흥재;전희진;최진규;이규호
    • 전기전자학회논문지
    • /
    • 제9권2호
    • /
    • pp.79-86
    • /
    • 2005
  • 네트워크 트래픽의 증가와 다양한 멀티미디어 응용 서비스가 등장함에 따라 네트워크의 자원을 효과적으로 관리, 운용 및 서비스 품질의 향상을 위해 네트워크 트래픽을 실시간으로 감시하고 분석하는 것이 요구되고 있다. 기존의 소프트웨어 기반의 트래픽 측정 방식으로는 광대역 트래픽의 정확한 측정이 어려움으로 캡처, 헤더 매칭 등의 기능을 효율적으로 수행하는 미터 구조에 대한 연구가 필요하게 되었다. 따라서, 본 논문에서는 좀 더 효율적인 패킷 캡처를 위하여 임베디드 리눅스 기반의 하드웨어 미터링 시스템을 설계 및 구현하였다. 또한 10 기가비트 네트워크의 패킷 캡처에 대해 AweSim을 이용하여 시뮬레이션 모델을 작성하고 시뮬레이션을 통해 요구되는 시스템 버스와 메모리 대역폭을 분석하였다.

  • PDF

A Simple Model for TCP Loss Recovery Performance over Wireless Networks

  • Kim, Beomjoon;Lee, Jaiyong
    • Journal of Communications and Networks
    • /
    • 제6권3호
    • /
    • pp.235-244
    • /
    • 2004
  • There have been a lot of approaches to evaluate and predict transmission control protocol (TCP) performance in a numerical way. Especially, under the recent advance in wireless transmission technology, the issue of TCP performance over wireless links has come to surface. It is because TCP responds to all packet losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. By several previous works, although it has been already proved that overall TCP performance is largely dependent on its loss recovery performance, there have been few works to try to analyze TCP loss recovery performance with thoroughness. In this paper, therefore, we focus on analyzing TCP's loss recovery performance and have developed a simple model that facilitates to capture the TCP sender's behaviors during loss recovery period. Based on the developed model, we can derive the conditions that packet losses may be recovered without retransmission timeout (RTO). Especially, we have found that TCP Reno can retransmit three packet losses by fast retransmits in a specific situation. In addition, we have proved that successive three packet losses and more than four packet losses in a window always invoke RTO easily, which is not considered or approximated in the previous works. Through probabilistic works with the conditions derived, the loss recovery performance of TCP Reno can be quantified in terms of the number of packet losses in a window.

우선순위 기반의 예약 코드 다중 접속 (P-RCMA) 프로토콜 (Priority-based Reservation Code Multiple Access (P-RCMA) Protocol)

  • 정의훈
    • 한국통신학회논문지
    • /
    • 제29권2A호
    • /
    • pp.187-194
    • /
    • 2004
  • 본 논문에서는 우선 순위 기반의 예약 코드 다중 접속 (P-RCMA) 프로토콜을 제안한다. P-PCMA는 기존의 RCMA 프로토콜의 음성 트래픽 성능을 개선한다. P-RCMA는 두 개의 전력 수준을 유지하고 패킷 전송을 위해 공유된 코드를 경쟁하는 시점에 트래픽의 전송 특성을 고려한다. P-RCMA는 기지국 수신 단에서 전력 세기에 따른 캡쳐 효과를 이용하여 데이터 패킷보다는 음성 예약 패킷에 우선순위를 부여한다. 성능 분석은 EPA(equilibrium point analysis) 방법과 시뮬레이션을 이용하고 성능 척도로 음성 패킷 손실 확률 (voice packet dropping probability) 과 평균 데이터 패킷 전송 지연 (average data packet transmission delay)을 사용한다.

Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks

  • Li, Shiji;Hu, Guyu;Ding, Youwei;Zhou, Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1377-1399
    • /
    • 2020
  • In search and rescue mission, micro aerial vehicles (MAVs) are typically used to capture image and video from an aerial perspective and transfer the data to the ground station. Because of the power limitation, a cluster of MAVs are required for a large search area, hence an ad-hoc wireless network must be maintained to transfer data more conveniently and fast. However, the unstable link and the intermittent connectivity between the MAVs caused by MAVs' movement may challenge the packet forwarding. This paper proposes a delay tolerant packet forwarding algorithm based on location estimation for MAV networks, called DTNest algorithm. In the algorithm, ferrying MAVs are used to transmit data between MAVs and the ground station, and the locations of both searching MAVs and ferrying MAVs are estimated to compute the distances between the MAVs and destination. The MAV that is closest to the destination is selected greedy to forward packet. If a MAV cannot find the next hop MAV using the greedy strategy, the packets will be stored and re-forwarded once again in the next time slot. The experiment results show that the proposed DTNest algorithm outperforms the typical DTNgeo algorithm in terms of packet delivery ratio and average routing hops.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Evaluation of Packet Loss Rate in Optical Burst Switching equipped with Optic Delay Lines Buffer

  • ;;황원주
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2012년도 춘계학술발표대회논문집
    • /
    • pp.166-167
    • /
    • 2012
  • High packet loss rate and impatience of messages passing through optical switches are essential characteristics in Optical Burst Switching system equipped with Optic Delay Lines buffer, which have not been solved efficiently yet by current existing models. In order to capture both effects, this paper introduces an analytical model from the viewpoint of classical queuing theory with impatient customers. We then apply it to evaluate and compare two wavelength-sharing cases, (1) all delay lines share a common wavelength resource and (2) each wavelength is associated with a number of delay lines. Our numerical results suggest to implement the first case because of lower packet loss rate for a fairly broad range of traffic load.

  • PDF

A Study on Traffic Distribution Processing using the Round Robin Monitoring System

  • Kim Seok-Soo
    • Journal of information and communication convergence engineering
    • /
    • 제3권2호
    • /
    • pp.90-92
    • /
    • 2005
  • As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network Structure (data generator, virtual server, Server 1, 2, 3), and finds out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume.