• Title/Summary/Keyword: The Number of Router

Search Result 112, Processing Time 0.028 seconds

Design of Fault-Tolerant Node Architecture based on SCM in Optical Burst Switching Networks (광 버스트 스위칭 망에서 장애에 둔감한 SCM 기반의 노드 구조 설계)

  • Song Kyu-Yeop;Yoo Kyoung-Min;Yoo Wan;Lee Hae-Joung;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.514-524
    • /
    • 2005
  • In optical burst switching(OBS) networks, the ingress edge router assembles packets in the same class queue into the appropriate size of burst. A burst control packet(BCP) is generated for channel reservation of corresponding data burst and sent earlier than the corresponding data burst with an offset time. Offset time is determined considering the number of hops from source to destination and the required quality of service(QoS). After offset time, the burst data is passed through tile pre-configured optical switches without any O/E/O conversion. But a failure in OBS networks may lead to the loss of bursts until the ingress nodes receive the failure indication signal. This results in a significant degradation in QoS. Therefore, in this paper, we propose a fault-tolerant node architecture based on sub-carrier multiplexing to reduce the effects of failure in OBS networks. The Performance of the proposed fault-tolerant node architecture exhibits considerable improvement as compared with the previous ones.

A Tabu Search Algorithm for Network Design Problem in Wireless Mesh Networks (무선 메쉬 네트워크에서 네트워크 설계 문제를 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.778-785
    • /
    • 2020
  • Wireless mesh networks consist of mesh clients, mesh routers and mesh access points. The mesh router connects wireless network services to the mesh client, and the mesh access point connects to the backbone network using a wired link and provides Internet access to the mesh client. In this paper, a limited number of mesh routers and mesh access points are used to propose optimization algorithms for network design for wireless mesh networks. The optimization algorithm in this paper has been applied with a sub-subscription algorithm, which is one of the meta-heuristic methods, and is designed to minimize the transmission delay for the placement of mesh routers and mesh access points, and produce optimal results within a reasonable time. The proposed algorithm was evaluated in terms of transmission delay and time to perform the algorithm for the placement of mesh routers and mesh access points, and the performance evaluation results showed superior performance compared to the previous meta-heuristic methods.

Transition Decision Algorithm for Energy Saving in OBS Network with LPI (저전력 대기를 사용하는 OBS 망에서 에너지 절감을 위한 상태 천이 결정 알고리즘)

  • Kang, Dong-Ki;Yang, Won-Hyuk;Lee, Ki-Beom;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.317-326
    • /
    • 2012
  • Recently, many researchers have studied to solve the energy consumption of network equipments since the interest of Green IT has been increased. In this paper, we apply Low Power Idle (LPI) to OBS network to reduce energy consumption of network devices. Many previous researches have focused on maximizing the sleep time of network equipments to increase the energy saving efficiency of LPI. But transition overhead caused by LPI might not only depreciate the performance of energy saving but also increase packet delay. In this paper, Transition Decision (TD) algorithm is proposed to improve energy saving efficiency by reducing the number of unnecessary transition and guarantee the required QoS such as packet delay. To evaluate the performance of proposed algorithm, we model OBS edge router with LPI by OPNET and analyze the performance of the proposed algorithm in views of energy saving, transition count and average packet delay.

A New Congestion Control Algorithm for Improving Fairness in TCP Vegas (TCP Vegas에서 공정성 향상을 위한 혼잡제어 알고리즘)

  • Lee, Sun-Hun;Song, Byung-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.583-592
    • /
    • 2005
  • An important factor influencing the robustness of the Internet is the end-to-end TCP congestion control. However, the congestion control scheme of TCP Reno, the most popular TCP version on the Internet, employs passive congestion indication. It makes the network congestion worse. Brakmo and Peterson proposed a congestion control algorithm, TCP Vegas, by modifying the congestion avoidance scheme of TCP Reno. Many studies indicate that Vegas is able to achieve better throughput and higher stability than Reno. But there are three unfairness problems in Vegas. These problems hinder the spread of Vegas in the current Internet. In this paper, in order to solve these unfairness problems, we propose a new congestion control algorithm called TCP NewVegas. The proposed NewVegas is able to solve these unfairness problems effectively by using the variation of the number of queued packets in a bottleneck router. To evaluate the proposed approach, we compare the performance among NewVegas, Reno and Vegas. Through the simulation, NewVegas is shown to be able to achieve throughput and better fairness than Vegas.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

Mini-Bin Based Implementation Complexity Improvement in Fair Packet Schedulers (공정 패킷 스케줄러에서 미니빈 기반 구현 복잡도 개선)

  • Kim, Tae-Joon;Kim, Hwang-Rae
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1020-1029
    • /
    • 2006
  • Realization of high-capacity quality-of-service router needs fair packet schedulers with a lower complexity. Timestamp based fair packet schedulers have the ideal complexity of O(log V), where V is the maximum number of admitted flows, but it has been recently reduced to O(1) using bin concept. However, the latency property was deteriorated and the bandwidth utilization was also declined. In addition, traffic flows requiring strong delay bound may not be admitted. To overcome these problems, this paper proposes a Mini-Bin based Start-Time (MBST) scheduler with variable complexity and evaluates its performance. The MBST scheduler uses the timestamp calculation scheme of start-time based schedulers to enhance the bandwidth utilization and also introduces mini-bin concept to improve the latency, The performance evaluation shows that the proposed scheduler can reduce the complexity of the legacy start-tine based schedulers by $1.8{\sim}5$ times without deteriorating the bandwidth utilization property.

  • PDF

An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks (이동통신환경에서의 소규모 그룹통신을 위한 XMIP 프로토콜의 구현)

  • PARK IN-SOO;PARK YONG-JIN
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.267-280
    • /
    • 2005
  • In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP's mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.

A New RED Algorithm Adapting Automatically in Various Network Conditions (다양한 네트워크 환경에 자동적으로 적응하는 RED 알고리즘)

  • Kim, Dong-Choon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.461-467
    • /
    • 2014
  • Active queue management (AQM) algorithms run on routers and detect incipient congestion by typically monitoring the instantaneous or average queue size. When the average queue size exceeds a certain threshold, AQM algorithms infer congestion on the link and notify the end systems to back off by proactively dropping some of the packets arriving at a router or marking the packets to reduce transmission rate at the sender. Among the existing AQM algorithms, random early detection (RED) is well known as the representative queue-based management scheme by randomizing packet dropping. To reduce the number of timeouts in TCP and queuing delay, maintain high link utilization, and remove bursty traffic biases, the RED considers an average queue size as a degree of congestions. However, RED do not well in the specified networks conditions due to the fixed parameters($P_{max}$ and $TH_{min}$) of RED. This paper addresses a extended RED to be adapted in various networks conditions. By sensing network state, $P_{max}$ and $TH_{min}$ can be automatically changed to proper value and then RED do well in various networks conditions.

An Internet Stopper Using ARP Spoofing with Automatic Node Identification (자동 노드 인식 기능을 갖는 ARP 스푸핑을 이용한 인터넷 차단기)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.93-106
    • /
    • 2011
  • In this paper we describe an efficient and easy to use internet stopper, which is called AINS (Automatic Internet Stopper), which uses ARP spoofing scheme. Instead of forwarding packets to router for the case of hacking, in ARP spoofing, the AINS ignores all the packets so that internet stopping operates. The AINS program needs to be installed only in manager computer that does not require additional agent program. In addition to setting manually the stopping computer list, it is able to indentify network nodes automatically by analyzing broadcasting packets. The experimental results show that less than 4 secs for spoofing interval is enough for blocking internet usage regardless the number of computers and therefore network overhead is negligible. The AINS can indentify and control network nodes not only on same subnet but also on different subnet only if they are connected onto same ethernet switch physically. It is being used for an efficient tool for controling internet usage of university computer laboratory and also for an efficient network management.

A Parallel IP Address Lookup Scheme for High-Speed Routers (고속의 라우터를 위한 병렬 IP 주소 검색 기법)

  • Park, Jae-hyung;Chung, Min-Young;Kim, Jin-soo;Won, Yong-gwan
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.333-340
    • /
    • 2004
  • In order that routers forward a packet to its destination, they perform IP address lookup which determines the next hop according to the packet's destination address. In designing high speed routers, IP address lookup is an important issue. In order to design high speed routers, this paper proposes a parallel IP lookup scheme which consists of several IP lookup engines without any modification of already fabricated indirect IP lookup chipsets. Also, we propose a simple rule for partitioning IP prefix entries In an overall forwarding table among several IP lookup engines. And we evaluate the performance of the proposed scheme in terms of the memory size required for storing lookup information and the number of memory accesses on constructing the forwarding table. With additional hardware logics, the proposed scheme can reduce about 30% of the required memory size and 80% of the memory access counts.