• Title/Summary/Keyword: Protocol Performance

Search Result 3,211, Processing Time 0.03 seconds

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1737-1753
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Performance Analysis of NTT/BT Protocol (NTT/BT 프로토콜의 성능 분석)

  • 이창훈;백상엽;이동주
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.99-123
    • /
    • 1997
  • Performance analysis of NTT/BT protocol is investigated, which is a GFC (Generic Flow Control) ptotocol in ATM (Asynchronous Transfer Mode ) network and is based on cyclic reset mechanism. THe mean cell delay time is proposed as a performance measure of NTT/BT protocol. The mean cell delay time is defined as the duration from the instant the cell arrives at the transmission buffer until the cell is fully transmitted. The process of cell transmission can be described as a single server queueing modle with two dependent services. By utilizing this model, mean cell delay time is obtained and sensitivity of the factors such as window size and reset period is also analysed.

  • PDF

Enhancing TCP Performance to Persistent Packet Reordering

  • Leung Ka-Cheong;Ma Changming
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.385-393
    • /
    • 2005
  • In this paper, we propose a simple algorithm to adaptively adjust the value of dupthresh, the duplicate acknowledgement threshold that triggers the transmission control protocol (TCP) fast retransmission algorithm, to improve the TCP performance in a network environment with persistent packet reordering. Our algorithm uses an exponentially weighted moving average (EWMA) and the mean deviation of the lengths of the reordering events reported by a TCP receiver with the duplicate selective acknowledgement (DSACK) extension to estimate the value of dupthresh. We also apply an adaptive upper bound on dupthresh to avoid the retransmission timeout events. In addition, our algorithm includes a mechanism to exponentially reduce dupthresh when the retransmission timer expires. With these mechanisms, our algorithm is capable of converging to and staying at a near-optimal interval of dupthresh. The simulation results show that our algorithm improves the protocol performance significantly with minimal overheads, achieving a greater throughput and fewer false fast retransmissions.

Performance Analysis of Backoff Algorithm in Wireless LANs with Prioritized Messages (무선랜 환경에서 우선순위를 고려한 백오프 알고리듬 성능분석)

  • Jeong Seok-Yun;Heo Seon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1656-1660
    • /
    • 2006
  • Distributed coordination function(DCF) is the primary random access mechanism of IEEE 802.11, which is the basic protocol of wireless LAN based on the CSMA/CA protocol. It enables fast installation with minimal management and maintenance costs and is a very robust protocol for the best effort service in wireless medium. The current DCF, however, is known to be unsuitable for real-time applications such as voice message transmission. In this paper, we focus on the performance issues of IEEE 802.11 which accommodate the prioritized messages. Existing results use the initial window size and backoff window-increasing factor as tools to handle the priority of the messages. Instead, we introduce a novel scheme which chooses the backoff timer with arbitrary probabilities. By this, one can greatly reduce the backoff delay of the lower priority messages without degrading the performance of higher priority.

  • PDF

A Fast Inter-Domain Network-based IP Mobility Scheme for Urban Areas

  • Taghizadeh, Alireza;Wan, Tat-Chee;Budiarto, Rahmat
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.645-655
    • /
    • 2014
  • Latency, an identified element of Internet protocol (IP) mobility protocol execution, can reduce handover performance in mobile networks. Although the performance can be improved by applying an effective network-based IP mobility scheme in place of the traditional host-based alternatives, the existing inter-domain extensions of network-based IP mobility continue to suffer from an extended handover latency. This paper proposes a new inter-domain network-based IP mobility scheme based on node movement prediction. The proposed scheme accelerates the handover by preparing the future domain of the mobile node in a proactive manner. Analytical and simulation-based evaluations confirm improved performance of the proposed scheme in terms of handover latency and packet loss compared with existing schemes.

Performance enhancement of GSO FSS TCP/IP network (정지위성 TCP/IP 네트워크 전송 성능 향상)

  • Hong, Wan-Pyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.118-123
    • /
    • 2007
  • This paper studied the transmission control protocol over IP network to enhance the performance of the GSO satellite communication networks. The focus of this study is how to reduce the long round trip time and the transmission data rates over satellite link in the bidirectional satellite network. To do it, this study applied the caching and spoofing technology. The spoofing technology is used to reduce the required time for the link connection during communication. The caching technology is to improve the transmission bandwidth efficiency in the high transmission data rate link The tests and measurements in this study was performed in the commercial GSO communication satellite network and the terrestrial Internet network. The results of this paper show that the studied protocol in this paper highly enhance the performance of the bidirectional satellite communication network compare to the using TCP/IP satellite network protocol.

Tone Dual-Channel MAC Protocol with Directional Antennas for Mobile Ad Hoc Networks

  • Jwa, Jeong-Woo
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.98-101
    • /
    • 2012
  • The directional medium access control (MAC) protocol improves the throughput of mobile ad hoc networks but has a deafness problem and requires location information for neighboring nodes. In the dual-channel directional MAC protocol [12], the use of omnidirectional packets does not require the exact location of destination node. In this letter, we propose a tone dual-channel MAC protocol with directional antennas to improve the throughput of mobile ad hoc networks. In the proposed MAC protocol, we use a directional CTS and an out-of-band directional DATA tone with a new blocking algorithm to improve the spatial reuse. We confirm the throughput performance of the proposed MAC protocol by computer simulations using the Qualnet simulator.

Performance Analysis of an Enhanced DQRUMA/MC-CDMA Protocol with an LPRA Scheme for Voice Traffic

  • Park, Jae-Yoon;Nam, Seung-Yeob;Sung, Dan-Keun;Jemin Chung
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.43-48
    • /
    • 2003
  • This paper presents a comparative evaluation of a modified version (A-Protocol) of the Distributed-Queueing Request Update Multiple Access (DQRUMA)Multi-Code Code Division Multiple Access (MC-CDMA) protocol and an enhanced version (P-Protocol) of the DQRUMA/MC-CDMA protocol with a lattice pool for request accesses (LPRA) scheme in a packet-based voice traffic environment. Analytical results agree with the simulation ones and show that the P-Protocol outperforms the A-Protocol in terms of the packet loss rate for voice traffic.

  • PDF

Efficient RFID Secure Protocol with Forward Secrecy (전 방향 안전성을 제공하는 효율적인 RFID 보안 프로토콜)

  • Kim, Seong-Yun;Kim, Ho-Won
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.139-147
    • /
    • 2011
  • We proposed the secure and efficient passive RFID protocol which is based on one-way hash based low-cost authentication protocol (OHLCAP). The paper introduces OHLCAP and the vulnerabilities of OHLCAP and suggests security solutions by analyzing them. Afterwards, The paper presents the proposed protocol and demonstrates computational performance and security of the protocol. This protocol not only has the resistances against eavesdropping attack, impersonation attack, desynchronization attack, and replay attack but also provides untraceability and forward secrecy.

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.