• Title/Summary/Keyword: TCP 메커니즘

Search Result 102, Processing Time 0.029 seconds

The Energy efficient Transmission Scheme based on Cross-Layer for Wired and Wireless Network (유.무선 혼합망에서 Cross-Layer기반의 에러지 효율적인 전송 기법)

  • Kim Jae-Hoon;Lee Sun-Hun;Rhee Seung-Hyong;Choi Woong-Chul;Chung Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.13-15
    • /
    • 2006
  • 유선망에 최적화되도록 진화해온 TCP는 무선망이 가지는 링크의 불안정함으로 인한 손실을 네트워크의 혼잡으로 인한 손실로 오해한다. 그 결과 혼잡 제어 메커니즘이 수행되어 불필요하게 전송율을 줄이므로써 전송 성능을 저하시키는 문제점을 초래한다. 이러한 이유로 최근 유 무선 혼합망에서 TCP의 성능을 향상시키기 위한 연구가 활발히 이루어지고 있다. 본 논문에서는 기존에 제안된 성능향상 기법들 중 상대적으로 뛰어난 성능을 보이는 Snoop 프로토콜이 유 무선 혼합망 특히 IEEE 802.11 MAC 프로토콜을 사용하는 무선망에서 가지는 문제점을 분석하고, Cross-layering 기법을 통하여 이를 보완하는 기법을 제안한다.

  • PDF

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.

Analysis of Congestion Control Mechanisms for Many-to-many Reliable Multicast (다대다 신뢰적 멀티캐스트를 위한 혼잡 제어 기술의 비교 분석)

  • 유제영;강경란;이동만
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.307-309
    • /
    • 2002
  • 멀티캐스트는 네트워크 대역폭을 효율적으로 사용하기 위한 방법으로써, 한번의 전송으로 동일한 데이터의 수신을 원하는 여러 수신자들이 동시에 받을 수 있도록 해줌으로써, 동일한 데이터를 여러 번 전송함으로써 발생하는 대역폭의 낭비를 줄인다. 그와는 달리 혼잡 제어 기술은 어떻게 대역폭을 여러 사람들이 공평하게 나누어 사용할 것이며, 대역폭의 이용률을 최대화할 것인가를 주된 연구 대상으로 한다. 특히, 혼잡 제어 기술은 인터넷에서 더욱 중요한 부분으로 혼잡 제어 메커니즘이 적용되어 있지 않은 플로우는 네트워크 사용의 불공평성과 혼잡으로 인한 네트워크 동작 중단(congestion collapse)을 초래한다〔1〕.따라서 새로운 프로토콜을 제안하는 데 있어서 핵심 기능 중 하나는 효율적인 혼잡 제어 메커니즘의 유무이며, 그 혼잡 제어 기법이 인터넷 트래픽의 대부분을 차지하고 있는 TCP와 공평하게 대역폭을 나누어서 사용할 수 있는가가 프로토콜 평가의 중요한 기준중 하나이다. 본 연구에서는 기존의 일대다 신뢰적 멀티캐스트를 위한 혼잡제어 기법들의 비교 분석을 통하여, 각각의 특성을 밝히며, 각 기법들의 특징을 비교함으로써 다대다 멀티케스트 혼잡 제어를 위한 가장 적합한 방법을 알아본다.

  • PDF

A Study on Application SCTP SNOOP for Improving a Data Transmission in Wireless Network (무선망에서 데이터 전송 향상을 위한 SCTP SNOOP 적용 연구)

  • Hwang, Eun-Ah;Seong, Bok-Sob;Kim, Jeong-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.126-129
    • /
    • 2007
  • Recently the use of wireless network increases according to it solves the hand-off and with path loss, pading, noise etc of wireless network the research for transmission error improvement is developed. TCP and SCTP of standard where it guarantees the reliability of wire network apply in wireless network the congestion control, flow control mechanism used it decreases the efficiency of data transfer throughputs. In this paper, It mixes SCTP and SNOOP for SCTP apply on wireless network, to improve BS(Basic Station) operation processes when the transmission error occurs in wireless network. BS send ZWP(Zero Window Probe) to MN(Mobile Node) when the transmission error occurs so, check path and status and update RWND and error status checked. It selects the new path, send ZWA(Zero Window Advertisement) to FH(Fixed Host) and the prevents call to congestion control or flow control and it does to make wait status standing. Continuously of data transfer after the connection of wireless network is stabilized, it make increase about 10% the transmission throughput of data.

  • PDF

Network-Based Partially-Distributed Mobility Management Mechanism and Performance Evaluation (망기반 부분분산형 이동성 관리 메커니즘 및 성능분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.75-84
    • /
    • 2014
  • In order to solve the problems such as overload, single point of failure, non-optimized data path, and network scalability in conventional central mobility management protocols, distributed mobility management schemes have been continually studied in and around the IETF. In this paper, a network-based partially-distributed mobility management mechanism, pDMMv6, is suggested and the performance comparison with traditional protocols such as PMIPv6 and MIPv6 is made through simulation under the various user traffic environment. The simulation results include UDP packet delivery ratio, end-to-end packet delay, binding delay for registration signaling, CPU utilization in each node, and response delays in several server-client TCP applications such as web browsing, e-mail, telnet remote login, FTP file up/down-load, and database access.

Preventing Network Performance Interference with ACK-Separation Queuing Mechanism in a Home Network Gateway using an Asymmetric Link (비대칭 링크를 사용하는 홈 네트워크 게이트웨이에서 네트워크 성능 간섭 현상을 막기 위한 패킷 스케줄링 기법)

  • Hong, Seong-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.1
    • /
    • pp.78-89
    • /
    • 2006
  • In development of network-enabled consumer electronics, much of the time and effort is spent analyzing and solving network performance problems. In this paper, we define an instance of such problems discovered while developing a commercial home network gateway. We then analyze its cause and propose a solution mechanism. Our home network gateway uses art asymmetric link (ADSL) and suffers from an undesirable phenomenon where downlink traffic interferes with upload speed. We call this phenomenon the network performance interference problem. While this problem can easily be confused with receive livelock caused by packet contention at the input queue, we and that this is not the case. By performing extensive experiments and analysis, we reveal that our problem is caused by packet contention at the output queue and certain intrinsic characteristics of TCP. We devise an ACK-separation queuing mechanism for this problem and implement it in the home network gateway Our experiments show that it effectively solves the problem.

A Three-Color Marking Mechanism for Fairness Improvement in the Assured Service of the Diffserv Network (차등 서비스 네트워크의 확신 서비스에서 공평성 향상을 위한 3색 마킹 메커니즘)

  • 모상덕;정광수
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.764-775
    • /
    • 2003
  • Previous works for the assured service in the Diffserv network have no sufficient consideration on the fairness of bandwidth share based on RTTs and the target rates of TCP flows. In this paper, in order to solve these problems, we propose a TRA3CM(Target rate and RTT Aware 3 Color Marking) mechanism. The TRA3CM mechanism provides three color marking and fair transmission rates among aggregate flows by considering RTT and target rate simultaneously. In case of higher target rate than bottleneck bandwidth, the TRA3CM mechanism is able to mitigate the RTT effect and provides fair transmission rates. In the results of comparing the performance among existing mechanisms and the TRA3CM, the TRA3CM mechanism was able to mitigate the RTT effect better than the former. The TRA3CM is shown to provide good performance for transmission rates proportional to various target rates.

A Secure 6LoWPAN Re-transmission Mechanism for Packet Fragmentation against Replay Attacks (안전한 6LoWPAN 단편화 패킷 재전송 기법에 관한 연구)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.101-110
    • /
    • 2009
  • The 6LoWPAN(IPv6 Low-power Wireless Personal Area Network) performs IPv6 header compression, TCP/UDP/IGMP header compression, packet fragmentation and re-assemble to transmit IPv6 packet over IEEE 802,15.4 MAC/PHY. However, from the point of view of security. It has the existing security threats issued by IP packet fragmenting and reassembling, and new security threats issued by 6LoWPAN packet fragmenting and reassembling would be introduced additionally. If fragmented packets are retransmitted by replay attacks frequently, sensor nodes will be confronted with the communication disruption. This paper analysis security threats introduced by 6LoWPAN fragmenting and reassembling, and proposes a re-transmission mechanism that could minimize re-transmission to be issued by replay attacks. Re-transmission procedure and fragmented packet structure based on the 6LoWPAN standard(RFC4944) are designed. We estimate also re-transmission delay of the proposed mechanism. The mechanism utilizes timestamp, nonce, and checksum to protect replay attacks. It could minimize reassemble buffer overflow, waste of computing resource, node rebooting etc., by removing packet fragmentation and reassemble unnecessary.

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

A Study of an NAT Protocol using Virtual IP Information in the TCP Segment (TCP 세그멘트내의 가상 IP 정보를 이용하는 NAT 프로토콜에 대한 연구)

  • Hwang, Jae-Yong;Ju, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.45-55
    • /
    • 2004
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP address into authentic Internet address. The main features of NAT are to improve network security and to save IP address. Generally speaking, in order to perform its functionality, NAT uses the address information in the packet header. Certain application protocols, however, use the information in the packet data as well as the information in the packet header to perform end-to-end communication. Therefore, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet date into real IP information by using port proxy server.

  • PDF