• Title/Summary/Keyword: Transport Protocol

Search Result 558, Processing Time 0.028 seconds

Enhanced Communication Transport Protocol: Implementations and Experimentations (ECTP 멀티캐스트 전송 프로토콜: 구현 및 성능분석)

  • Park, Ki-Shik;Park, Juyoung;Koh, Seok-Joo;Jo, In-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.876-890
    • /
    • 2003
  • This paper proposes a protocol for the reliableand QoS-aware multicast transport, which is called the Enhanced Communications Transport Protocol (ECTP). The ECTP has so far been developed and standardized in ITU-T SG17 and ISO/IEC JTC 1/SC 6. Differently from the conventional reliable multicast, as shownin the IETF RMT WG, the ECTP additionally provides several distinct features such as tight control of multicast session, tree-based error control, and QoS management. For the tight control of multicast connections, the sender is at the heart of one-to-many group communications, and it is responsible for overall connection management such as connection creation/termination, pause/resumption, and the join and leave operations. for tree-based reliability control, ECTP configures a hierarchical tree during connection creation. Error control is performed within each local group defined by a control tree, which was partly designed like the IETF TRACK approach. Each parent retransmits lost data in response to retransmission requests from its children. For QoS management, ECTP supports QoS negotiation for resource reservation, and it also provides QoS monitoring and maintenance operations. ECTP has been implemented and tested on Linux machine, along with Application Programming Interfaces based on Berkeley sockets. For basic testing of the ECTP functionality, we give some preliminary experimental results for performance comparison of ECTP and TCP unicast transports. In conclusion, we describe the status of ECTP experimentations over APAN/KOREN testbed networks

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.

Modeling and Interoperability Test Case Generation of a Real-Time QoS Monitoring Protocol

  • Chin, Byoung-Moon;Kim, Sung-Un;Kang, Sung-Won;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.52-64
    • /
    • 1999
  • QoS monitoring is a kind of real-time systems which allows each level of the system to track the ongoing QoS levels achieved by the lower network layers. For these systems, real-time communications between corresponding transport protocol objects is essential for their correct behavior. When two or more entities are employed to perform a certain task as in the case of communication protocols, the capability to do so is called interoperability and considered as the essential aspect of correctness of communication systems. This paper describes a formal approach on modeling and interoperability test case generation of a real-time QoS monitoring protocol. For this, we specify the behavior of flow monitoring of transport layer QoS protocol, i.e., METS protocol, which is proposed to address QoS from an end-to-end's point of view, based on QoS architecture model which includes ATM net work in lower layers. We use a real-time Input/Output finite State Machine to model the behavior of real-time flow monitoring over time. From the modeled real-time I/OFSM, we generate interoperability test cases to check the correctness of METS protocol's flow monitoring behaviors for two end systems. A new approach to efficient interoperability testing is described and the method of interoperability test cases generation is shown with the example of METS protocol's flow monitoring. The current TTCN is not appropriate for testing real-time and multimedia systems. Because test events in TTCN are for message-based system and not for stream-based systems, the real-time in TTCN can only be approximated. This paper also proposes the notation of real-time Abstract Test Suite by means of real-time extension of TTCN. This approach gives the advantages that only a few syntactical changes are necessary, and TTCN and real-time TTCN are compatible. This formal approach on interoperability testing can be applied to the real-time protocols related to IMT-2000, B-ISDN and real-time systems.

  • PDF

A Study on the Specification of Communication Protocols Using Ada (Ada 언어를 이용한 통신 프로토콜의 명세화에 관한 연구)

  • 김길준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.8
    • /
    • pp.697-700
    • /
    • 1991
  • In this paper, in first we show a main concept of Ada language and the architectures and functions of transport model for OSI, and than represent the possibility of describing the transport interface using Ada language. It is gived a following result. As we specify communication protocol using the Ada, we can to create of program for processing the communication protocol or for processing protocol itself. It is know to us to represent the effect debugging of softeware.

  • PDF

Evaluating an (m, k)-firm Deadline Real-time Stream Based on a Reliable Transport Protocol in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.129-134
    • /
    • 2012
  • As application-specific requirements for wireless sensor networks emerge, both real-time and reliable communications become major research challenges in wireless sensor networks due to the many constraints on nodes and wireless links. To support these services, several protocols have been proposed. However, since most of them were designed as well as developed for general purpose applications, it is not recommended that they be directly adapted to applications with special requirements. In this paper, we propose a way to extend the current reliable transport protocol to cover a special real-time service, the (m,k)-firm deadline stream, in wireless sensor networks. While the proposed scheme is basically built on the PSFQ protocol for reliability, some features have been newly developed to support the (m,k)-firm stream efficiently. Finally, simulation results are given to demonstrate the feasibility of the proposed scheme in high traffic and with failed links.

A New RFID Tag Identification Protocol Utilizing Collision Patterns (충돌 패턴을 고려한 RFID 태그 인식 프로토콜)

  • Park, Young-Jae;Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.98-104
    • /
    • 2012
  • In RFID Systems, collisions between multiple tags frequently arise due to simultaneous responses from multiple tags using the same communication channel. Most of anti-collision protocols such as QT regard these collisions as useless cycles, thereby wasting the channel bandwidth. In this paper, we propose a new anti-collision protocol, namely ASP (Adjustable splitting by patterns of collisions) protocol that utilizes the patterns collision for noticeable performance enhancements.

Design and Implementation of MPEG-4 Media Player supporting QoS and Retransmission (QoS와 재전송을 지원하는 MPEG-4 미디어 재생기의 설계 및 구현)

  • 전형국;마평수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.343-345
    • /
    • 2002
  • 본 논문에서 구현한 MPEG-4 미디어 재생기는 네트워크를 통하여 스트리밍 서버에 메시지를 전송하고, 스트리밍 서버로부터 전송된 미디어 스트림을 처리하여 사용자의 화면에 보여주는 역할을 수행한다. 미디어 재생기는 서버에게 VCR(Play, Pause, Stop, Jump)이벤트를 전송하며, 리눅스 운영체제에서 동작한다. 본 논문에서 제안하는 미디어 재생기는 VCR 연산을 위한 RTSP(Real Time Streaming Protocol)를 지원하며 데이터의 실시간 전송을 위하여 RTP(Real-time Transport Protocol)/RTCP(real-time transport control protocol)를 지원한다. RTP/RTCP를 통하여 네트워크 QoS와 관련된 정보를 획득하며 그 정보에 따라서 데이터 전송율을 조절하고 RTCP를 이용하여 에러 패킷에 대한 재전송을 사용한다. 재전송시 미디어 재생기의 버퍼링 상태와 멀티미디어 데이터의 재생시간을 고려하여 멀티미디어 데이터의 끊김이 없도록 한다.

  • PDF

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Method of DASH segments into a MMTP stream for switching contents under a hybrid broadcasting environment

  • Kang, Jeonho;Kang, Dongjin;Kim, Kyuheon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5981-5997
    • /
    • 2017
  • Advanced Television Systems Committee (ATSC) produced ATSC 2.0 standard, which has been used for a HD/SD digital broadcasting service with MPEG-2 Transport Stream (TS) as a delivery protocol. Recently, users might want to consume multimedia services without being constrained by transport network. However, MPEG-2 TS is not suitable protocol for IP network. Thus, ATSC has enacted ATSC 3.0 standard, which is designed for a hybrid service through a conversion of both broadcasting and broadband channels. The ATSC 3.0 specifies delivery protocols as MPEG Media Transport (MMT) for a broadcasting environment and Dynamic Adaptive Streaming over HTTP (DASH) for a broadband. However, it seems difficult to combine broadcast and broadband for hybrid broadcasting, and it is difficult to synchronize media data between MMT and DASH. This paper suggests various new service scenarios to be brought up by a hybrid broadcasting, ATSC 3.0, and also proposes a stable mechanism for switching contents between different delivery protocols such as MMT and DASH.

Development of Security System in the OSI Transport Layer (OSI 트랜스포트 계층에서의 보호시스템 개발)

  • Park, Young-Ho;Kim, Ki-Hyun;Moon, Sang-Jae;Gang, Shin-Gak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.65-84
    • /
    • 1995
  • The information security is needed to guarantee the safety and the confidence to users in open system. This paper analyzes transport layer security protocol and security association protocol, which are standards proposed by ISO/IEC, to provide a security service in the transport layer and particulars, not in the standard, are defined for development. And this paper suggests a development model and develps security system based upon the suggested model. The ONP of USL is used as the development environment.