• Title/Summary/Keyword: TCP/IP Layer

Search Result 73, Processing Time 0.031 seconds

The decision method of free buffer size in hardware protocol stack (Hardware protocol stack에서 free buffer size결정 방법)

  • Moon, Choon-Kyoung;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.212-214
    • /
    • 2004
  • Hardware implemented ring buffer systems and methods are presented for the effective management of the ring buffer in TCP/IP communication. The layer interface of the ring buffer systems transfer free buffer and used buffer size information to the TCP/IP stack upper or low layer. The pointer updation interface calculates a temporary pointer from the data size which is needed by the present pointer of the ring buffer and upper or lowyer layer. The pointer manager of the ring buffer systems is responsible for saving the present pointer of the ring buffer, updating the ring buffer pointer to the new pointer, calculating the free buffer size and used buffer size of the ring buffer, and transferring the information to the upper layer. The ring buffer systems help the TCP/IP layer and TCP/IP upper or lower layer to decide the sending or receiving data size effectively. The delay of transferring data can be lowered by the ring buffer system.

  • PDF

Optimum TCP/IP Packet Size for Maximizing ATM Layer Throughput in Wireless ATM LAN

  • Lee, Ha-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.953-959
    • /
    • 2006
  • This paper provides optimum TCP/IP packet size that maximizes the throughput efficiency of ATM layer as a function of TCP/IP packet length for several values of channel BER over wireless ATM LAN links applying data link error control schemes to reduce error problems encountered in using wireless links. For TCP/IP delay-insensitive traffc requiring reliable delivery, it is necessary to adopt data link layer ARQ protocol. So ARQ error control schemes considered in this paper include GBN ARQ, SR ARQ and type-I Hybrid ARQ, which ARQ is needed, but FEC can be used to reduce the number of retransmissions. Especially adaptive type-I Hybrid ARQ scheme is necessary for a variable channel condition to make the physical layer as SONET-like as possible.

An Implementation of Socket Interface for TOEs (TOE를 위한 소켓 인터페이스의 구현)

  • Son, Sung-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1472-1482
    • /
    • 2005
  • In this paper, we propose a socket interface layer for large-scale multimedia servers that adopt TCP/IP Offload Engines (TOE). In order to provide legacy network applications with binary level compatibility, the socket interface layer intercepts all socket-related system calls to forward to either TOE or legacy TCP/IP Protocol stack. The layer is designed and implemented as a kernel module in Linux. The layer is located between BSD socket layer and INET socket layer, and passes the application's socket requests to INET socket layer or TOE. The layer provides multimedia servers and web servers with the following features: (1) All standard socket APIs and file I/O APIs that are supported (2) Support for binary level compatibility of existing socket programs (3) Support for TOE and legacy Ethernet NICs at the same time.

  • PDF

A Mobile IP Handoff Protocol for Performance Enhancement of Transport Protocol over Wireless LAN (무선 LAN에서 트랜스포트 프로토콜 성능 향상을 위한 이동 IP 핸드오프 프로토콜)

  • Park, Jee-Hyun;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.242-252
    • /
    • 2002
  • When a Mobile IP handoff occurs, the packets in flight can be lost because they are tunneled based on out-of-date location information. In this parer, we propose an enhanced handoff protocol that achieves no packet loss during Mobile IP handoff over a wireless LAN. Our handoff protocol predicts the next foreign agent that a mobile host is to visit by using: the information from the data link layer of wireless LAN. After that, when a Mobile IP handoff occult, the current foreign agent forwards the packets destined to a mobile host to the predicted foreign agent which buffers them. This eliminates packet loss and reduces the packet forwarding delay. Our handoff protocol is simulated using the Network Simulator-2 (ns-2) and shows the substantial performance enhancement of TCP with much less overhead up to 6.2 times compared to standard Mobile IP.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

A Study on The Improvement of Multidisplinary Structure Technique of Ethrnet Network based of PC Serial Communication (PC 시리얼통신 기반의 이더넷 네트워크 융복합 구성 기술 성능 향상에 관한 연구)

  • Jin, Hyun-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.263-269
    • /
    • 2015
  • This paper suggest remote control technic using TCP/IP protocol network after UART serial communication implemented through RS-232 cable to ethernet module. This is multidisplinary signal technique which is PC signal is converted to internet communication signal. Ethernet module is WIZ1000SR. This is gate module which convert RS-232 protocol to TCP/IP protocol. This module convert serial data transmitted serial device to TCP/IP type data, in contrast TCP/IP data received through network converted to serial data transmitted to serial device. This paper propose that the lower subnet internet layer UDP module make the higher speed in control board than TCP/IP signal.

Design and Implementation of 128bits SSL-Proxy for Secure TCP/IP Communication (안전한 TCP/IP 통신을 위한 128bits SSL-Proxy 설계 및 구현)

  • 박성준;김창수;황수철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.65.1-70
    • /
    • 2000
  • 최근 인터넷 사용자의 증가와 인터넷을 이용한 전자상거래가 활발해지면서 TCP/IP 통신 보안에대한 많은 연구들이 진행되고 있다. 이러한 연구들중 SSL(Secure Socket Layer) 은 인증 및 보안 프로토콜로서 인터넷을 이용한 통신 보안에 가장 많이 사용되고있는 방법이다. 본 논문에서는 국내 암호 알고리즘의 표준으로 채택된 SEED 알고리즘을 SSL에 적용하여 서버와 클라이언트의 통신을 128bits 암호화할 수 있는 SSL-Proxy 프로그램을 구현하였으며, Windows 와 Unix 시스템에 모두 적용 가능하도록 모듈화하였다.

  • PDF

Control System of a Remote Robot using PDA (PDA를 이용한 원격 로봇 제어 시스템)

  • Han, Jong-Hye;Lee, Kee-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.206-208
    • /
    • 2004
  • A new method to control a remote robot with PDA and wireless network is presented. The needs of remote control systems using a home network environments are increased in these days. To solve the shortage of IP address in network, authorized TCP/IP and unauthorized TCP/IP address are used. The unauthorized TCP/IP is obtained by using MAC Address in the system and Network Layer. The model in the system is similar to Sever&Client in structure. Using this system, it is very easy to combine one network device with other network system. A robot system and PDA are used to show the effectiveness of the control system in home network environments.

  • PDF

A MAC Protocol Mechanism for Mobile IP over Wireless LANs

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.194-198
    • /
    • 2003
  • Recently, the use of TCP/IP protocols over wireless LANs poses significant problems. In this paper, we have analyzed transmission control protocol (TCP) packet transmission time for mobile IP over wireless local area networks (LANs) using a proposed a new random backoff scheme. We call it as a proxy backoff scheme. It is considered the transmission time of TCP packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) channel. From the results, a proposed proxy backoff scheme produces a better performance than an original random backoff in mobile IP over wireless LANs environment. Also, in OFDM/quadrature phase shift keying (QPSK) medium access control (MAC), we have obtained that the transmission time in wireless channel decreases as the TCP packet size increases.

Gateway Architecture for Ubiquitous Access to ZigBee-Based Sensor Networks (ZigBee 기반 센서 네트워크로의 유비쿼터스 접근을 위한 게이트웨이 아키텍처)

  • Heo, Ung;Peng, Qiu;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.73-83
    • /
    • 2010
  • This paper investigates protocol architecture of a Web-ZigBee gateway for interconnecting TCP/IP-based networks and ZigBee/IEEE802.15.4-based wireless sensor networks. The Web-ZigBee gateway delivers data between the TCP/IP network and the ZigBee network. Since those two networks have different communication protocols, a protocol translation mechanism is needed. Herein, we propose a method to deliver query messages from the Internet to the sensor network and receive data from sensors. The protocol translation is performed in the translation layer that is placed above the two application layers, i.e., the Internet application layer and ZigBee application layer. Among various interfaces, we use CGI programming to take care of translation functions efficiently. The CGI manages query information from a client on the Internet and data from the ZigBee sensor network. Whereas the TCP/IP enabled sensor network overlays two heterogeneous communication protocols, overlaying layers increase the complexity and cost of implementing the sensor network. On the contrary, the sensors in our gateway-based system are not only light (because each communication protocol works independently without overlaying), but also efficient because the translation layer mostly alleviates header overloading.