• Title/Summary/Keyword: Reliable Transport Protocol

Search Result 64, Processing Time 0.024 seconds

A Top-down based Control Tree Construction Mechanism for Reliable Multicast Transport Protocols (신뢰적인 멀티캐스트 전송 프로토콜을 위한 Top-Down 기반의 제어 트리 구축 방안)

  • Kim, Eun-Sook;Koh, Seok-Joo;Kang, Shin-Gak;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.611-620
    • /
    • 2001
  • To meet the requirements of reliable service for various applications, a Reliable Multicast Transport Protocol should be implemented over IP Multicast where currently best-effort service is provided. Among the current researches, hierarchical tree-based mechanism has been proposed and actively studied. This mechanism is known to provide high scalability as well as reliability, but needs an additional tree configuring mechanism for building an efficient logical tree in transport layer. Bottom-up approach has been used for creating such a tree. This method has benefits from parallel tree construction for receivers, while it has some drawbacks such that it does not guarantee a loop-free tree and brings heavy message overhead during tree creation process. Therefore, this paper proposes a top-down based mechanism for constructing a control tree, which can guarantee loop-freeness by step-wise mannered tree building. From experimental simulations, it shows that the proposed mechanism has less message overhead. It is recommended that the bottom-up and the proposed top-down will be selectively used in real networks, according to the requirements of the concerned multicast applications.

  • PDF

An Extension Scheme of the Berkeley Socket Interface for Multipeer Multimedia Communications

  • Kim, Yong-Woon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.11a
    • /
    • pp.500-506
    • /
    • 1998
  • This paper proposes an extension scheme of the well-known Berkeley Socket Interface for supporting QoS-provided multipeer multimedia communications. The current BSD Socket Interface has been TCP/IP-centric historically and the protocol suite was developed for the peer-to-peer best effort data communications. In order to support multiparty multimedia applications, such key functions as group management, QoS control, and reliable multicast transport should be exploited in the current simple unicast communication architecture and the well-known interface should be extended to cover the functions. This paper proposes a few new API functions and some changes in the current APIs.

  • PDF

A Survey on Transport Protocols for Wireless Multimedia Sensor Networks

  • Costa, Daniel G.;Guedes, Luiz Affonso
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.241-269
    • /
    • 2012
  • Wireless networks composed of multimedia-enabled resource-constrained sensor nodes have enriched a large set of monitoring sensing applications. In such communication scenario, however, new challenges in data transmission and energy-efficiency have arisen due to the stringent requirements of those sensor networks. Generally, congested nodes may deplete the energy of the active congested paths toward the sink and incur in undesired communication delay and packet dropping, while bit errors during transmission may negatively impact the end-to-end quality of the received data. Many approaches have been proposed to face congestion and provide reliable communications in wireless sensor networks, usually employing some transport protocol that address one or both of these issues. Nevertheless, due to the unique characteristics of multimedia-based wireless sensor networks, notably minimum bandwidth demand, bounded delay and reduced energy consumption requirement, communication protocols from traditional scalar wireless sensor networks are not suitable for multimedia sensor networks. In the last decade, such requirements have fostered research in adapting existing protocols or proposing new protocols from scratch. We survey the state of the art of transport protocols for wireless multimedia sensor networks, addressing the recent developments and proposed strategies for congestion control and loss recovery. Future research directions are also discussed, outlining the remaining challenges and promising investigation areas.

TCP Engine Design for TCP/IP Hardware Accelerator (TCP/IP Hardware Accelerator를 위한 TCP Engine 설계)

  • 이보미;정여진;임혜숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5B
    • /
    • pp.465-475
    • /
    • 2004
  • Transport Control Protocol (TCP) has been implemented in software running on CPU in end systems, and the protocol processing has appeared as a new bottleneck due to advanced link technology. TCP processing is a critical issue in Storage Area Network (SAN) such as iSCSL, and the overall performance of the Storage Area Network heavily depends on speed of TCP processing. TCP Engine implemented in hardware reduces the load of CPU in end systems as well as accelerates the protocol processing, and hence high speed data processing is achieved. In this paper, we have proposed a hardware engine for TCP processing. TCP engine consists of three major block, TCP Connection block Rx TCP block and Tx TCP block TCP Connection block is responsible for managing TCP connection states. Rx TCP block is responsible for receive flow which receives packets from network and sends to CPU. Rx TCP performs header and data processing and sends header information to TCP connection block and Tx TCP block It also assembles out-of-ordered data to in-ordered before it transfers data to CPU. Tx TCP block is responsible for transmit flow which transfers data from CPU to network. Tx TCP performs retransmission for reliable data transfer and management of transmit window and sequence number. Various test-cases are used to verify the TCP functions. The TCP Engine is synthesized using 0.18 micron technology and results in 51K gates not including buffers for temporal data storage.

Development of a Ubiquitous Vision System for Location-awareness of Multiple Targets by a Matching Technique for the Identity of a Target;a New Approach

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.68-73
    • /
    • 2005
  • Various techniques have been proposed for detection and tracking of targets in order to develop a real-world computer vision system, e.g., visual surveillance systems, intelligent transport systems (ITSs), and so forth. Especially, the idea of distributed vision system is required to realize these techniques in a wide-spread area. In this paper, we develop a ubiquitous vision system for location-awareness of multiple targets. Here, each vision sensor that the system is composed of can perform exact segmentation for a target by color and motion information, and visual tracking for multiple targets in real-time. We construct the ubiquitous vision system as the multiagent system by regarding each vision sensor as the agent (the vision agent). Therefore, we solve matching problem for the identity of a target as handover by protocol-based approach. We propose the identified contract net (ICN) protocol for the approach. The ICN protocol not only is independent of the number of vision agents but also doesn't need calibration between vision agents. Therefore, the ICN protocol raises speed, scalability, and modularity of the system. We adapt the ICN protocol in our ubiquitous vision system that we construct in order to make an experiment. Our ubiquitous vision system shows us reliable results and the ICN protocol is successfully operated through several experiments.

  • PDF

A Study on the Application method of Server Router for Reliable Multicast (신뢰성 있는 멀티캐스트를 위한 서버라우터의 활용 방안에 관한 연구)

  • Choi, Won-Hyuck;Lee, Kwang-Jae;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1483-1486
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The purpose of this dissertation is to find a method to utilize sewer routers to form multicasts that can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM method has been used. Three packets per TCP transmission control window size are used for transport and an ACK is used for flow control. A CBR and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

Accuracy Improvement of RTT Measurement on the Alternate Path in SCTP (SCTP에서 대체 경로의 RTT 정확도 향상)

  • Kim, Ye-Na;Park, Woo-Ram;Kim, Jong-Hyuk;Park, Tae-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.509-516
    • /
    • 2009
  • The Stream Control Transmission Protocol(SCTP) is a reliable transport layer protocol that provides several features. Multihoming is the one of the features and allows an association(SCTP's term for a connection) between two endpoints to use multiple paths. One of the paths, called a primary path, is used for initial data transmission and in the case of retransmission an alternate path is used. SCTP's current retransmission policy attempts to improve the chance of success by sending all retransmissions to an alternate destination address. However, SCTP's current retransmission policy has been shown to actually degrade performance in many circumstances. It is because that, due to Karn's algorithm, successful retransmissions on the alternate path cannot be used to update RTT(Round-Trip Time) estimation for the alternate path. In this paper we propose a scheme to avoid such performance degradation. We utilize 2bits which is not used in the flag field of DATA and SACK chunks to disambiguate original transmissions from retransmissions and to keep RTT and RTO(Retransmission Time-Out) values more accurate.

A Study on a Multi-path ATP Protocol at Ad-hoc Networks (Ad-hoc 네트워크에서 다중경로를 지원하는 ATP 프로토콜에 대한 연구)

  • Lee, Hak-Ju;Jang, Jae-Shin;Lee, Jong-Hyup
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.123-131
    • /
    • 2009
  • Wireless networks have several unique features : node mobility, restricted bandwidth, time-variable bandwidth, large latency, and high bit error rates time due to channel fading. These features at wireless networks intend to decrease the performance TCP protocols are used in wireless networks. Lots of studies have been done for finding appropriate wireless transport protocols for current wireless communications. However, related studies have not provided good performance or some protocols have a good performance only in specific circumstances. Thus, these are not suitable for general wireless circumstance. Therefore, we propose a new wireless transport protocol which provides better performance than the previous ones. And we'd like to solve a problem that previous protocols cannot maintain their connections even though they have multiple paths until another path is successfully set up. To solve these problems, a new protocol ATP-M is proposed which is designed on already known TCP-M and ATP protocols. With NS-2 computer simulation, it is shown that this newly proposed protocol has better system throughput than TCP, TCP-M and ATP protocols.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Performance improvement of TCP over ATM using RM cell information (RM 셀 정보를 이용한 TCP over ATM의 성능개선)

  • 최진혁;정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.487-492
    • /
    • 2000
  • The ABR(available bit rate) service has been developed to support data application over ATM(asynchronous Transfer mode) networks, and TCP is the most widely used transport layer protocol in existing data networks. Thus, the performance improvement of TCP over ABR is an issue of cardinal importance. In this paper, we propose algorithm of the adjustment of congestion window size utilizing RM(resource Management) cell information. The motivation is to use more reliable information in ER(explicit rate) field within RM cell to determine TCP window size. Simulations are performance using the suggested algorithm is improved, as compared to TCP-reno.

  • PDF