• Title/Summary/Keyword: Transmission congestion management

Search Result 68, Processing Time 0.022 seconds

A Switch Behavior Supporting Effective ABR Traffic Control for Remote Destinations in a Multiple Connection (다중점 연결의 원거리 수신원에 대한 효율적이 ABR 트래픽 제어를 제공하는 스위치 동작 방식)

  • Lee, Sook-Young;Lee, Mee-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1610-1619
    • /
    • 1998
  • The ABR service class provides feedback based traffic control to transport bursty data traffic efficiently. Feedback based congestion control has first been studied to be applied to unicast connections. Recently. several congestion control algorithms for multicast connections have also been proposed as the number of ABR applications requiring multicast increases. With feedback based congestion control, the effectiveness of a traffic control scheme diminishes as propagation delay increases. Especially for a multicast connection, a remote destination may suffer unfair service compared to a local destination due to the delayed feedback. Amelioration of the disadvantages caused by feedback delay is therefore more important for remote destinations in multicast connections. This paper proposes a new switch behavior to provide effective feedback based mathc control for rentoh destinations. The proposed switches adjust the service rate dynamically in accordance woth the state of the downstream, that is, the congestion of the destinaion is immediately controlled by the nearest apstream switch before the source to ramp down the transmission rate of the connection. The proposed switch has an implementation overhead to have a separate buffer for each VC to adjust the service rate in accordance with a backward Rm cell of each VC. The buffer requirement id also increased at intermediate switches. Simulation results show that the proposed switch reduces the cell loss rate in both the local and the remote destinations and slso amelioratd the between the two destinations.

  • PDF

A Fair Scalable Inter-Domain TCP Marker for Multiple Domain DiffServ Networks

  • Hur, Kyeong;Eom, Doo-Seop
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.338-350
    • /
    • 2008
  • The differentiated services (DiffServ) is proposed to provide packet level service differentiations in a scalable manner. To provide an end-to-end service differentiation to users having a connection over multiple domains, as well as a flow marker, an intermediate marker is necessary at the edge routers, and it should not be operated at a flow level due to a scalability problem. Due to this operation requirement, the intermediate marker has a fairness problem among the transmission control protocol (TCP) flows since TCP flows have intrinsically unfair throughputs due to the TCP's congestion control algorithm. Moreover, it is very difficult to resolve this problem without individual flow state information such as round trip time (RTT) and sending rate of each flow. In this paper, to resolve this TCP fairness problem of an intermediate marker, we propose a fair scalable marker (FSM) as an intermediate marker which works with a source flow three color marker (sf-TCM) operating as a host source marker. The proposed fair scalable marker improves the fairness among the TCP flows with different RTTs without per-flow management. Through the simulations, we show that the FSM can improve TCP fairness as well as link utilization in multiple domain DiffServ networks.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Performance Analysis of Bandwidth Allocation Scheme using POBP Method in ATM Networks. (ATM 네트워크에서 POBP 방식을 이용한 대역폭 할당 방법의 성능분석)

  • 한상엽;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.537-548
    • /
    • 2000
  • ATM is the effective information transmission method which multiply statistical and can accept effective the traffic of the various transmission rate. However, it can happen excessive cell loss probability and cell delay when it have temporarily overload. Therefore, it is required the effective traffic control and network resource management for which guarantee QoS(Quality of Service) in terms of users and bandwidth utilization maximization in terms of networks. In this paper, we proposed POBP(PushOut BP) scheme which mixed pushout scheme with BP(Back Pressure), reactive control scheme recommended at the ATM Forum, to guarantee QoS in two stages ATM switch networks. In proposed method, we have to understand exactly using bandwidth information in real-time and become traffic shaping. Thorough these processes, we can not only use effectively unused bandwidth, but also guarantee the fair bandwidth utilization and then can improve cell-loss possibility happened by congestion states in two stage ATM networks.

  • PDF

TCP Performance Analysis of Packet Buffering in Mobile IP based Networks (모바일 IP 네트워크에서 패킷 버퍼링 방식의 TCP 성능 분석)

  • 허경;노재성;조성준;엄두섭;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.475-488
    • /
    • 2003
  • To prevent performance degradation of TCP due to packet losses in the smooth handoff by the route optimization extension of Mobile IP protocol, a buffering of packets at a base station is needed. A buffering of packets at a base station recovers those packets dropped during handoff by forwarding buffered packets at the old base station to the mobile user. But, when the mobile user moves to a congested base station in a new foreign subnetwork, those buffered packets forwarded by the old base station are dropped and TCP transmission performance of a mobile user in the congested base station degrades due to increased congestion by those forwarded burst packets. In this paper, considering the general case that a mobile user moves to a congested base station, we analyze the influence of packet buffering on TCP performance according to handoff arrival distribution for Drop-tail and RED (Random Early Detection) buffer management schemes. Simulation results show that RED scheme can reduce the congestion increased by those forwarded burst packets comparing Drop-Tail, but RED scheme cannot avoid Global Synchronization due to forwarded burst packets by the old base station and new buffer management scheme to avoid it is needed in Mobile IP based networks.

Delay Guaranteed Bandwidth-Efficient Multicast Routing in Wireless Multi-hop Networks (다중 홉 무선 네트�p에서 지연을 고려한 멀티케스트 루팅)

  • Sohn, Hee-Seok;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.2
    • /
    • pp.53-65
    • /
    • 2016
  • Static wireless multi-hop networks, such as wireless mesh networks and wireless sensor networks have proliferated in recent years because of they are easy to deploy and have low installation cost. Two key measures are used to evaluate the performance of a multicast tree algorithm or protocol : end-to-end delay and the number of transmissions. End-to-end delay is the most important measure in terms of QoS because it affects the total throughput in wireless networks. Delay is similar to the hop count or path length from the source to each destination and is directly related to packet success ratio. In wireless networks, each node uses the air medium to transmit data, and thus, bandwidth consumption is related to the number of transmission nodes. A network has many transmitting nodes, which will cause many collisions and queues because of congestion. In this paper, we optimize two metrics through a guaranteed delay scheme. We provide an integer linear programming formulation to minimize the number of transmissions with a guaranteed hop count and preprocessing to solve the aforementioned problem. We extend this scheme not only with the guaranteed minimum hop count, but also with one or more guaranteed delay bounds to compromise two key metrics. We also provide an explanation of the proposed heuristic algorithm and show its performance and results.

A Study of Sensitivity Analysis and Traffic Performance by Competition in the Ad hoc Network (애드혹(Ad hoc) 네트워크에서 경쟁에 의한 트래픽성능 및 민감성 분석)

  • Cho, Hyang-Duck;Kim, Woo-Shik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.3
    • /
    • pp.39-49
    • /
    • 2010
  • Ad hoc network is infrastructureless network, that the network topology is configured by each node. Each node capacity device function namely, accomplishes a network control and a function of management because not being Network device of the exclusively. Ad hoc networks what kind of node join or leave the network topology to facilitate the expansion of arbitrary topology, to the case which is the distance whose traffic is distant the place must overtake through the route of intermediate nodes, like these facts give an effect to performance fluctuation. Consequently, each node in order to maintain traffic of oneself stably there is a necessity which will consider traffic and congestion control from the node which traffic of a condition and oneself of traffic of the circumference and the route which compose the network will overtake through. This paper assumes the path of the band with a finite resource, and path traffic to occupy the competition and its impact on transmission performance of these competing arguments to configure the model factor to analyse the performance impact on the results presented. Like this result with the fact that from the study, it will contribute in network management policy and the technique.

A Study on Significance Testing of Driver's Visual Behavior due to the VMS Message Display Forms on the Road (도로상 VMS 표출방식별 운전자 유의성 검증에 관한 연구)

  • Kum, Ki-Jung;Son, Young-Tae;Bae, Deok-Mo;Son, Seung-Neo
    • International Journal of Highway Engineering
    • /
    • v.7 no.4 s.26
    • /
    • pp.151-162
    • /
    • 2005
  • Variable Message Sign (VMS), which provides drivers with direct information about state of traffic congestion and for prevent an accident, is the most effective method among the methods of providing information in Advanced Transportation Management System. Currently establishment and the VMS which is operated foundation lets in Guidelines on the use of Variable message sign (a book of the VMS) of 1999 November the Ministry Construction & Transportation, these contents mean main viewpoint on physical part such as message special quality variable (font, character size and line space, word interval) and position mainly among standard about establishment in general. But, it is true that using without effect verification on the character of VMS display and that using mode of stationary-centered. In this paper, it executed significance test to effort verification on the character of VMS display for more practical and effective information transmission based on the driver viewpoint For the researches; develop 3D-Simulation, select characteristics of driver's visual cognition behavior (the conspicuity, the legibility and the comprehensibility), evaluation each issue (day or night, 80km/h or 100km/h). Especially, that used the Eye Marker Recorder to measure of reading-time (legibility) thus, confirmed objectivity and reduce an observational error. The results showed that the conspicuity is Flashing> Stationary>Scroll. The legibility is not deference that Flashing between stationary form. Also the comprehensibility result showed that Flashing> Stationary>Stroll form.

  • PDF