• Title/Summary/Keyword: Packet Transfer Protocol

Search Result 90, Processing Time 0.021 seconds

A Study on Multi-level Attack Detection Technique based on Profile Table (프로파일 기반 다단계 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.89-96
    • /
    • 2014
  • MANET has been applied to a wide variety of areas because it has advantages which can build a network quickly in a difficult situation to build a network. However, it is become a victim of malicious nodes because of characteristics such as mobility of nodes consisting MANET, limited resources, and the wireless network. Therefore, it is required to lightweight attack detection technique which can accurately detect attack without causing a large burden to the mobile node. In this paper, we propose a multistage attack detection techniques that attack detection takes place in routing phase and data transfer phase in order to increase the accuracy of attack detection. The proposed attack detection technique is composed of four modules at each stage in order to perform accurate attack detection. Flooding attack and packet discard or modify attacks is detected in the routing phase, and whether the attack by modification of data is detected in the data transfer phase. We assume that nodes have a public key and a private key in pairs in this paper.

A Priority-based Feedback Control Mechanism for Scalability (확장적 우선 순위 피드백 제어 기법)

  • 정상운;정원창;김상복
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.339-346
    • /
    • 1999
  • When a multicast video conference system utilizes RTP (Real Time Protocol) and RTCP (Real Time Control Protocol), the loss rate and the synchronization of transfer in RTCP affect the scalability of the system. The random delay technique introduced to resolve the problems is so simple that leads the network to meet some congestion in synchronizing feedback information when lots of people transfer the feedback information simultaneously, which reduces the scalability of system. In this paper, we propose a new feedback control algorithm that provides priority levels with the RTCP packet, which cuts down the feedback delay and increases the scalability. The criteria of providing priority Based on the decided priority level, Agent forced the session participants to provide much more RTCP packets, positively controlled, and the possible bandwidth can be measured. The simulation on this technique decreases the delay, and the feedback messages are equally distributed on a given time period.

  • PDF

An Adaptive UDT Rate Control Method on Network Traffic Condition (네트워크 트래픽 상태에 적응적인 UDT Rate Control 기법)

  • An, Do-Sik;Wang, Gi-Cheol;Kim, Seung-Hae;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.19-27
    • /
    • 2011
  • Due to the growth of optical fiber network technologies, most networks recently support several tens of Gb/s bandwidth. UDT(UDP-based Data Transfer protocol) is an optimized protocol for bulk data transmission on the network, which has the high bandwidth and long delay time. It periodically controls the sending rate on the fixed sync-interval, 0.01 sec. Here, if the network traffic status varies quickly, available network bandwidth is not able to be properly utilized in-between the sync-intervals. In this paper, we propose an adaptive rate control method with considering the network traffic status in-between the sync-interval periods. The network traffic status is determined based on the RTT variances. With dividing the network status into four classes, the proposed method performs a new rate control by adjusting the inter-packet sending period for a corresponding class. As a simulation result, the proposed method improves the message delivery throughput as well as stability than that of the existing UDT Protocol.

Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks

  • Cao, Yuanlong;Liu, Qinghua;Zuo, Yi;Huang, Minghe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2354-2370
    • /
    • 2015
  • The advantages of employing SCTP-based Concurrent Multipath Transfer (CMT) have been demonstrated to be very useful for data delivery over multi-homed wireless networks. However, there is still significant ongoing work addressing some remaining limitations and challenges. The most important concern when applying CMT to data delivery is related to handling packet reordering and buffer blocking. Another concern on this topic is that current sender-based CMT solutions seldom consider balancing the overhead and sharing the load between the sender and receiver. This paper proposes a novel Receiver-driven Cooperation-based Concurrent Multipath Transfer solution (CMT-Rev) with the following aims: (i) to balance overhead and share load between the sender and receiver, by moving some functions including congestion and flow control from the sender onto receiver; (ii) to mitigate the data reordering and buffer blocking problems, by using an adaptive receiver-cooperative path aggregation model, (iii) to adaptively transmit packets over multiple paths according to their receiver-inspired sending rate values, by employing a new receiver-aware data distribution scheduler. Simulation results show that CMT-Rev outperforms the existing CMT solutions in terms of data delivery performance.

Mean Response Delay Estimation for HTTP over SCTP in Wireless Internet (무선 인터넷 환경에서 HTTP over SCTP의 평군 응답 시간 추정)

  • Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2008
  • Hyper text transfer protocol (HTTP) over transmission control protocol (TCP) is currently used to transfer objects in the Internet. Stream control transmission protocol (SCTP), an alternative to TCP, which allows for independent delivery among streams, and can thus reduce the mean response delay of web object. We present an analytical model to find the mean response delay for HTTP over SCTP, therefore, estimate the effectiveness of SCTP over TCP. Typical TCP delay models assume the wired environment. On the contrary, the proposed model in this paper assumes the multiple packet losses and wireless environment where fast retransmission is not possible due to small window. The estimated mean response time can be used the benchmark to meet quality of service (QoS) at end-user. We validate the accuracy of our model using experiments. It is shown that the differences between the results from model and those from experimental are very small below 6 % on average. We also find that the mean response delay for HTTP over SCTP is less than that for HTTP over TCP.

A Performance Improvement Method with Considering of Congestion Prediction and Packet Loss on UDT Environment (UDT 환경에서 혼잡상황 예측 및 패킷손실을 고려한 성능향상 기법)

  • Park, Jong-Seon;Lee, Seung-Ah;Kim, Seung-Hae;Cho, Gi-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.69-78
    • /
    • 2011
  • Recently, the bandwidth available to an end user has been dramatically increasing with the advancing of network technologies. This high-speed network naturally requires faster and/or stable data transmission techniques. The UDT(UDP based Data Transfer protocol) is a UDP based transport protocol, and shows more efficient throughput than TCP in the long RTT environment, with benefit of rate control for a SYN time. With a NAK event, however, it is difficult to expect an optimum performance due to the increase of fixed sendInterval and the flow control based on the previous RTT. This paper proposes a rate control method on following a NAK, by adjusting the sendInterval according to some degree of RTT period which calculated from a set of experimental results. In addition, it suggests an improved flow control method based on the TCP vegas, in order to predict the network congestion afterward. An experimental results show that the revised flow control method improves UDT's throughput about 20Mbps. With combining the rate control and flow control proposed, the UDT throughput can be improved up to 26Mbps in average.

Performance Evaluation of the Probability based MAC Protocol for Fair Transmission in WDM Metro Ring (WDM 메트로 링에서 공정한 전송을 위한 확률기반 MAC 프로토콜에 대한 성능 평가)

  • So Won-Ho;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.323-332
    • /
    • 2006
  • In this paper, we consider a WDM based metro ring connecting broadband access networks by using FT-TR (Fixed Transmitter-Tunable Receiver) type access nodes and a new MAC protocol for fair transmission is proposed. The basic channel access scheme is CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) and the transferred optical slot is changed to be empty slot by SS(Source-Stripping) which drops a packet from ring-rotated slot. This empty slot can be either used to send head-of-line packet in buffer or transmitted to next access node. In former cases, there is the improvement of network throughput, but latter case leads unfairness problem of transmission. Thus the proposed MAC protocol exploits the advantages form tow cases. It gives downstream access nodes chance to use empty slots and limits the unconditional usage of empty slots at upstream access nodes with probability as called p-Persistent MAC protocol. We use a numerical analysis to evaluate bandwidth efficiency and maximum node throughput and compares simulation results in terms of node throughput, fairness factor, transfer delay depending on probability. Under two different FT-TR type architectures for metro ring network the proposed MAC protocol is evaluated and compared.

On Suppressing the Occurrence of Redundant Sensing-Reporting Packets in Assets Monitoring Networks (관심 대상모니터링 네트워크에서의 중복된 감지-보고 패킷들의 발생 억제에 관한 연구)

  • Tscha, Yeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1955-1963
    • /
    • 2009
  • In the application of wireless sensor networks to monitor valuable assets under concern, the appearance of a certain asset can be identified and reported simultaneously by several adjacent nodes, and this may dissipate the power of related nodes and network bandwidth as well. In the proposed method, a node that senses the appearance of some asset is allowed to send the sensing-reporting packet only after it has been being idle for a certain period without receiving any DRP(Don't Report Packet) from neighbors. It turns out that not only the cost of propagating DRPs but also that of reporting the events to the sink becomes minimal when depth of each DRP propagation is 2. In case of depth 1, at least, two routes are set up for the delivery of the sensing-reporting packet hence, reliable transfer to the sink is provided.

Routing Configuration Scheme of Ad hoc Node Using Smart Packet in Heterogeneous Routing Domains (이질적인 라우팅 도메인에서 스마트 패킷을 사용한 이동 노드의 라우팅 프로토콜 설정 기법)

  • Choi Jae-Duck;Roh Hyo-Sun;Kim Young-Han;Jung Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.803-810
    • /
    • 2006
  • Mobile ad hoc nodes are supposed to be equipped with a number of operation modules including a specific routing operation module in heterogeneous MANET environment. It is not possible for a mobile node to carry all the necessary operation modules due to the limited resources. This paper proposes a scheme to reconfiguring mobile ad hoc nodes using smart packets in heterogeneous routing domains. The smart packet protocol has a capability to transfer a binary execution module to a mobile node, by which a node can be equipped with any necessary routing modules in any MANET environment. The proposed smart packet agent is designed to be suitable to a light weight terminal owing to its simple architecture. The utility of the proposed scheme was demonstrated through an example of DYMO scenario in the wireless network.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF