• Title/Summary/Keyword: Packet Loss

Search Result 975, Processing Time 0.032 seconds

Delayed-constrained scheduling for a game server virtual machine (게임서버 가상머신을 위한 지연 제약 스케줄링)

  • kang, Kiwook;Ko, Cherl-hong;Hong, Jiman;Paik, Doowon
    • Journal of Korea Game Society
    • /
    • v.16 no.4
    • /
    • pp.57-68
    • /
    • 2016
  • As the size of the data used in the game application increase gradually, the physical resources of game server grow. Accordingly, it is necessary to/it is required to introduce I/O virtualization in game server to improve I/O performance of the server. But it is difficult to ensure high responsiveness in game server where I/O delay change from time to time. To maximize the benefit of I/O virtualization, guaranteeing I/O response time is very important and it is necessary to have I/O scheduling techniques to manage the I/O latency in the order of priority of virtual machines. In this paper, we propose an efficient delay-constrained scheduling algorithm in a virtualization environment to ensure maximum I/O latency. In addition, a reduced amount of loss of the packet was found to increase the fairness of scheduling in the experiments with the proposed scheme.

An Efficient Data Authentication Scheme for Content Centric Networking (컨텐츠 중심 네트워크에서 해시 체인 기반의 효율적인 데이터 인증 기법)

  • Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1375-1386
    • /
    • 2016
  • This paper presents an efficient hash chain-based data authentication mechanism which can considerably reduce the overhead of processing and transmission for authenticating segments in CCN. The proposed method makes use of hash chain and MHT(Merkle Hash Tree). At first, it applies hash chain methods for data segments and encodes them to Data part. Then, it constitutes Meta part with the hash values generated at the previous step and properly applies both hash chain method and MHT-based signing for not only achieving efficiency, but also mitigating the drawback(data-loss, out-of-order transmission) of hash chain method. We have implemented our method in the CCNx library and measured the performance. When transmitting 100Mbyte of content, the proposed method generates only 2.596% of processing overhead and 1.803% of transmission overhead.

Performance Analysis of Virtual Conference System in the IPv6 Multicast Network (IPv6 멀티캐스트 네트워크에서 가상 학술회의 시스템의 성능 분석)

  • Eom, Tai-Rang;Do, Jin-Sook;Lee, Kyung-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.45-54
    • /
    • 2003
  • In the Protocol-Independent Multicast Sparse Mode(PIM-SM), we need a careful selection scheme for the Rendezvous Point(RP) which influences much on the QoS due to the delay among multicast group members and packet loss The QoS based RP selection schemes choose RPs which satisfy the restriction conditions such as bandwidth, delay, and other QoS parameters In this paper, we propose a new RP selection scheme which is a variation of the group-based RP selection scheme The new algorithm, MCT(Maximum Cross Tree), is implemented by taking advantages of the topology-based selection scheme and the group-based selection scheme as well In order to verify the proposed algorithm, we first measure the multicast traffic data of the Virtual Conference System implemented on the IPv6 network via KOREN, then expand the results to two types of network models and analyze the performance by computer simulation.

Enhanced Mobility Management Framework for Future Generation Networks (차세대 이동통신 네트워크를 위한 향상된 이동성 관리 프레임워크)

  • Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.710-720
    • /
    • 2009
  • The Future Generation Networks(FGNs) are proposed to integrate various heterogeneous access technologies, and further expected to support both vertical and seamless handovers. In this motivation, the IEEE 802.21 specifies Media Independent Handover(Mlli) services to enhance the mobile user experience by optimizing handovers between heterogeneous access networks. Additionally, Fast handover for MIPv6(FM1Pv6) is introduced to provide transparent host mobility and to improve handover performance by reducing handover delay as well. This paper focuses on the coordination of FMIPv6 and MIH, and introduces an enhanced mobility management framework suited for FGN. This novel framework replaces handover signaling messages used in wireless networks with novel MIH messages and local primitives. Moreover, Serving Access Router(SAR) performs most of handover processes instead of Mobile Node(MN). Therefore, the proposed mobility management framework reduces handover latency, packet loss, and signaling overhead significantly. We further evaluate the performance of the proposed framework by using both numerical analysis and network simulations.

Reliable Routing Protocol for Vehicle to Infrastructure Communications in VANET (차량 네트워크에서 V21 통신을 위한 안정된 라우팅 프로토콜)

  • Kim, Jung-Hun;Lee, Su-Kyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.839-845
    • /
    • 2009
  • The Vehicular Ad-hoc Network (VANET) has two main problems to be overcome due to high mobility and frequently changing density: one is short link duration time and the other is high packet loss ratio. To solve the problems, there have been many studies to predict vehicular mobility. Most of the studies try to enhance link expire time and link reliability, however the distance between two relay nodes becomes too short to have high network throughput. In this paper, we propose a new routing algorithm that considers both link expire time and network throughput in the VANET. The proposed algorithm aims to find path with long link expire time and high throughput. Our simulation results show that the proposed algorithm outperforms the legacy greedy algorithm and its variants.

Congestion Control of a Priority-Ordered Buffer for Video Streaming Services (영상 스트리밍 서비스를 위한 우선순위 버퍼 혼잡제어 알고리즘)

  • Kim, Seung-Hun;Choi, Jae-Won;Choi, Seung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.227-233
    • /
    • 2007
  • According to the recent development of network technology, the demands of users are diversified and the needs of multimedia traffic are increasing. In general, UDP(User Datagram Protocol) traffic is used to transport multimedia data, which satisfied the real-time and isochronous characteristics. UDP traffic competes with TCP traffic and incur the network congestion. However, TCP traffic performs network congestion control but does not consider the receiver's status. Thus, it is not appropriate in case of streaming services. In this paper, we solve a fairness problems and proposed a network algorithm based on RTP/RTCP(Real-time Transport Protocol/Realtime Transport Control Protocol) in view of receiver status. The POBA(Priority Ordered Buffer Algorithm), which applies priorities in the receiver's buffer and networks, shows that it provides the appropriate environment for streaming services in view of packet loss ratio and buffer utilization of receiver's buffer compared with the previous method.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Large Scale Failure Adaptive Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 대규모 장애 적응적 라우팅 프로토콜)

  • Lee, Joa-Hyoung;Seon, Ju-Ho;Jung, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.16A no.1
    • /
    • pp.17-26
    • /
    • 2009
  • Large-scale wireless sensor network are expected to play an increasingly important role for the data collection in harmful area. However, the physical fragility of sensor node makes reliable routing in harmful area a challenging problem. Since several sensor nodes in harmful area could be damaged all at once, the network should have the availability to recover routing from node failures in large area. Many routing protocols take accounts of failure recovery of single node but it is very hard these protocols to recover routing from large scale failures. In this paper, we propose a routing protocol, which we refer to as LSFA, to recover network fast from failures in large area. LSFA detects the failure by counting the packet loss from parent node and in case of failure detection LSFAdecreases the routing interval to notify the failure to the neighbor nodes. Our experimental results indicate clearly that LSFA could recover large area failures fast with less packets than previous protocols.

Handoff Algorithm based on One-way Trip Time for Wireless Mesh Network (Wireless Mesh Network을 위한 OTT 기반 핸드오프 알고리즘)

  • Park, Cha-Hee;Yoo, Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.16-24
    • /
    • 2007
  • Wireless mesh network extends the limited coverage of conventional wireless service from one-hop access point to wider area. It is recognized as an important issue to provide seamless handoff in the wide coverage of wireless mesh network. A long handoff delay may cause high packet loss and disconnection of service, degrading the network performance. The handoff delay is mainly introduced from the channel scanning process obtaining information to make handoff decision and the unnecessary handoffs due to inaccurate handoff decision. In this paper, we propose the handoff algorithm based on one-way trip time (OTT) to expedite the handoff procedure. As compared to the handoff algorithm based on the receiving signal power, the proposed algorithm takes advantage of OTT to obtain the necessary handoff information in a relatively shorter time and reduce the unnecessary handoffs. The performance of proposed algorithm is evaluated through the simulations. It is verified that the proposed handoff algorithm can effectively enhance the handoff accuracy, and therefore reduce the handoff delay and unnecessary handoffs.

Call Admission Control for Shared Buffer Memory Switch Network with Self-Similar Traffic (Self-Similar 트래픽을 갖는 공유버퍼 메모리 스위치 네트워크 환경에서 호 수락 제어 방법)

  • Kim Ki wan;Kim Doo yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.162-169
    • /
    • 2005
  • Network traffic measurements show that the data traffic on packet switched networks has the self-similar features which is different from the traditional traffic models such as Poisson distribution or Markovian process model. Most of the call admission control researches have been done on the performance analysis of a single network switch. It is necessary to consider the performance analysis of the proposed admission control scheme under interconnected switch environment because the data traffic transmits through switches in networks. From the simulation results, it is shown that the call admission control scheme may not operate properly on the interconnected switch even though the scheme works well on a single switch. In this parer, we analyze the cell loss probability, utilization and self-similarity of output ports of the interconnected networks switch by using shared buffer memory management schemes and propose the new call admission control scheme considering the interconnected network switches under self-similar traffic environments.