• Title/Summary/Keyword: TCP/UDP

Search Result 215, Processing Time 0.023 seconds

A Performance Improvement Method with Considering of Congestion Prediction and Packet Loss on UDT Environment (UDT 환경에서 혼잡상황 예측 및 패킷손실을 고려한 성능향상 기법)

  • Park, Jong-Seon;Lee, Seung-Ah;Kim, Seung-Hae;Cho, Gi-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.69-78
    • /
    • 2011
  • Recently, the bandwidth available to an end user has been dramatically increasing with the advancing of network technologies. This high-speed network naturally requires faster and/or stable data transmission techniques. The UDT(UDP based Data Transfer protocol) is a UDP based transport protocol, and shows more efficient throughput than TCP in the long RTT environment, with benefit of rate control for a SYN time. With a NAK event, however, it is difficult to expect an optimum performance due to the increase of fixed sendInterval and the flow control based on the previous RTT. This paper proposes a rate control method on following a NAK, by adjusting the sendInterval according to some degree of RTT period which calculated from a set of experimental results. In addition, it suggests an improved flow control method based on the TCP vegas, in order to predict the network congestion afterward. An experimental results show that the revised flow control method improves UDT's throughput about 20Mbps. With combining the rate control and flow control proposed, the UDT throughput can be improved up to 26Mbps in average.

SHD Digital Cinema Distribution over a Fast Long-Distance Network

  • Takahiro Yamaguchi;Daisuke Shirai;Mitsuru Nomura;Kazuhiro Shirakawa;Tatsuya Fujii;Tetsuro Fujii;Kim, io-Oguchi
    • Journal of Broadcast Engineering
    • /
    • v.9 no.2
    • /
    • pp.119-130
    • /
    • 2004
  • We have developed a prototype super-high-definition (SHD) digital cinema distribution system that can store, transmit, and display eight-million-pixel motion pictures that have the image quality of a 35-mm film movie. The system contains a movie server, a real-time decoder, and an SHB projector. Using a Gigabit Ethernet link and TCP/IP, the server transmits JPEG2000 compressed motion picture data streams to the decoder at transmission speeds as high as 300 Mbps. The received data streams are decompressed by the decoder, and then projected onto a screen via the projector. By using an enlarged TCP window, multiple TCP streams, and a shaping function to control the data transmission quantity, we achieved real-time streaming of SHD movie data at about 300 Mbps between Chicago and Los Angeles, a distance of more than 3000 km. We also improved the decoder performance to show movies with Image qualities of 450 Mbps or higher. Since UDP is more suitable than TCP for fast long-distance streaming, we have developed an SHD digital cinema UDP relay system, in which UDP is used for transmission over a fast long-distance network. By using four pairs of server-side-proxy and decoder-side-proxy, 450-Mbps movie data streams could be transmitted.

IP Over USB for Improved QoS of UDP/IP Messages (UDP/IP 메시지 전송의 QoS 성능 향상을 위한 IP Over USB)

  • Jang, Byung-Chul;Park, Hyeon-Hui;Yang, Seung-Min
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.295-300
    • /
    • 2007
  • The Linux-based embedded systems such as mobile telephones. PDAs and MP3 players are widely in use. USB(Universal Serial Bus) is the interface for data communication between the computers and these peripheral devices. Some embedded systems like intelligent home networking and multimedia streaming require guaranteed QoS(Quality of Service), which is needed for real time transmission of UDP/IP messages through USB. Although USB Ethernet driver is supported by USB Gadget API in Linux, it is unable to provide the desirable QoS required by each type or small embedded systems due to the unpredictability or TCP/IP Stack in Linux. This paper proposes IP-Over-USB to improve QoS of UDP/IP message transmission in the embedded systems using USB in Linux system.

Analysis and Prospect of Stream Control Transmission Protocol (SCTP 표준기술 분석 및 전망)

  • Koh, S.J.;Jung, H.Y.;Min, J.H.;Park, K.S.
    • Electronics and Telecommunications Trends
    • /
    • v.18 no.3 s.81
    • /
    • pp.11-20
    • /
    • 2003
  • 최근 SCTP(Stream Control Transmission Protocol)는 TCP/UDP 이후의 차세대 수송계층 프로토콜로서 주목 받고 있다. SCTP는 기존 TCP 및 UDP의 문제점을 극복하도록 설계되었으며 특히 multi-streaming 및 multi-homing 특성을 제공한다. 본 고에서는 SCTP 프로토콜의 기본 특징에 대하여 알아보고, 현재 논의중인 확장작업의 주요 골자를 살펴본다.

Performance and Fairness Analyses of a STA/LTA based Internet Congestion Algorithm

  • Chung, Young-Jun;Song, Hwa-Sun;Joo, Sang-Yeol
    • International Journal of Reliability and Applications
    • /
    • v.3 no.2
    • /
    • pp.99-112
    • /
    • 2002
  • Traffic congestion is one of critical factors in Internet applications to guarantee their QoS and provide reliable services. This paper discusses many existing congestion control algorithms and proposes a new ISDA. The algorithm is analyzed in respect of queue length, throughput and fairness. The proposed algorithm is working well with TCP and UDP traffics to offer QoS guarantee and fairness.

  • PDF

Analysis of WLAN Performance Depending on ARF Scheme with TCP and UDP Protocols (TCP와 UDP 프로토콜 상에서 ARF 기법에 따른 무선랜 성능 분석)

  • Kim Namgi;Lee Min;Yoon Hyunsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.395-400
    • /
    • 2005
  • The IEEE 802.11b WLAN supports multiple transmission rates and the rate is chosen in an adaptive manner by an auto rate control algorithm. This auto rate control algorithm deeply affects the total system performance of the IEEE 802.11b WLAN. In this paper, we examine the WLAN performance with regard to the auto rate control algorithm especially the ARF scheme. The experimental results indicate that the ARF scheme works well in the face of signal noise due to node location. However, the ARF scheme severely degrades system performance when multiple nodes contend to obtain the wireless channel and the packet is lost due to signal collision. In addition, TCP prevent the performance degradation due to ARF scheme by retaining number of active nodes. However, some applications, such as transporting multimedia data, adopt the UDP. Therefore, the TCP cannot be an optimal solution for all WLAN applications.

Study of Zero-copy Mechanism in TCP/IP (TCP/IP 에서의 Zero-copy 매커니즘 연구)

  • Chae, Byoung soo;Tcha, Seung Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.131-136
    • /
    • 2008
  • From the reciprocal connection by this Internet network researchs about the efficiency improvement of the whole system is accomplished with the method which reduces delays in message transmission. From here, we will do a comparative study between the user data program protocol (UDP) and the zero copy which does not use the buffer cache to fine out the valid method to improve the efficiency. In this thesis, I will change the message copy from execution process of the buffer cache of the TCP/IP on Unix OS with process on Linux OS. The object of conversion is to show you that the zero copy which doesn't use the buffer cache from transfer control class improves the communication efficiency.

  • PDF

A Study for Vulnerability of Security of the UPnP Home-Networking (UPnP 홈네트워크 보안 취약점에 관한 연구)

  • Oh, Im-Geol;Lee, Jong-Il
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2007
  • The UPnP uses the same standard protocol as SSDP and UDP based on standard internet and technology like the TCP/IP, and is independent of other physical networking product. But the structure of the UPnP has the of vulnerability to the security countermeasure for home-networking technology since it is operated on the same protocol as the SSDP and UDP. In this paper, we analyze and report against the DoS attack, where the worm virus, using the vulnerability to the UPnP, eliminates the attack of all equipments that are based on networking and eliminates the information belonging to the equipments of the home-networking or transmits the massive data.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF