• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.03 seconds

A Wireless Sink Congestion Control by Tournament Scheduling (토너먼트 스케줄링을 이용한 무선싱크 혼잡제어)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.641-648
    • /
    • 2012
  • The up-streams of the continuous streaming of data packets with lower importance level in the wireless sink node can cause congestion and delay, they affect on energy efficiency, memory size, buffer size, and throughput. This paper proposes a new wireless sink congestion control mechanism based on tournament scheduling. The proposed method consists of two module parts: stream decision module part and service differentiation module part. The final winner in the tournament controls congestion effectively, minimizes packet loss due to congestion, decreases energy consumption, and improves QoS. The simulation result shows that the proposed method is more effective and has better performance compared with those of congestion descriptor-based control method, reliability-based control method, and best-effort transmission control method.

Analysis of TCP NewReno using rapid loss detection (빠른 손실 감지를 이용한 TCP NewReno 분석)

  • Kim Dong min;Han Je chan;Kim Seog gyu;Leem Cha sik;Lee Jai yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.130-137
    • /
    • 2005
  • Wireless communication environment is changing rapidly as we use new wireless communication technology such as WiBro to access high speed Internet. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired network, TCP suffers significant performance degradation over wireless network where packet losses are related to non-congestion loss. Especially RTO imposes a great performance degradation of TCP. In this paper, we analyze the loss recovery probabilities based on previous researches, and use simulation results of our algorithm to show that it prevents performance degradation by quickly detecting and recovery losses without RTO during fast recovery.

A study on the MAC protocol for an aeronautical mobile data communication (항공용 이동 무선 데이터 통신에 적합한 매체접속제어 프로토콜에 관한 연구)

  • 이은주;박효달
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2604-2612
    • /
    • 1997
  • Media access control(MAC) protocol that is used between aircraft and ground station now is non-persistent CSMA protocol, but this protocol hs defects to apply in the wireless mobile radio communication environment. In this paper, to solve this Problems, the modified ICMA/CD protocol which ban be applied in the wireless environment was proposed and analyzed. In the modified ICMA/CD protocol, instead of usig special control channel, control signal was inserted into the uplink message. After the analysis, simulation was performed to approve the analysis resutls. As a results, modified ICMA/CD protocol can solve the hidden termined effect of CSMA protocol and packet detection delay time problem of ICMA/CD protocol and acquired the same channel throughput as CSMA/CD protocol. This results shows the modified ICMA/CD protocol can be used in the aeronauical telecommunication.

  • PDF

Enhancements to the fast recovery Algorithm of TCP NewReno using rapid loss detection (빠른 손실 감지를 통한 TCP NewReno의 Fast Recovery 개선 알고리듬)

  • 김동민;김범준;김석규;이재용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.650-659
    • /
    • 2004
  • Domestic wireless network environment is changing rapidly while adapting to meet service requirements of users and growth of market. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired networt TCP suffers significant performance degradation over wireless network where packet losses are not always result of network congestion. Especially RTO imposes a great performance degradation of TCP. In this paper, we propose DAC$^{+}$ and EFR in order to prevent performance degradation by quickly detecting and recovering loss without RTO during fast recovery. Compared with TCP NewReno, proposed scheme shows improvements in steady-state in terms of higher fast recovery Probability and reduced response time.

Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments (사물인터넷 환경에서 에너지 소모량을 줄이기 위한 네트워크 부호화 기반 정보 공유 방식)

  • Kim, Jung-Hyun;Park, Dabin;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.433-440
    • /
    • 2016
  • This paper proposes a method of minimizing total energy consumption of IoT environment when communication devices in the network share the information directly. The proposed method reduces total number of transmission for the information sharing by using an effective network coding-based technique which dynamically selects a node and a data packet for each transmission. Simulation results show that the proposed method has better performance than an existing network coding-based method selecting transmission node in fixed order, a network coding-based method selecting transmission node in random order, and a uncoded method selecting transmission node in random order.

Countermeasure of Sniffing Attack: Survey (효율적인 Sniffing 공격 대응방안 연구)

  • Hong, Sunghyuck;Seo, Yujeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2016
  • Sniffing attack is a passive attack which is reassembling packets to collect personal information, bank accounting number, and other important information. Sniffing attack happens in LAN and uses promiscuous mode which is opening filtering by pass all packets in LAN, attackers could catch any packets in LAN, so they can manipulate packets. They are Switch Jamming, Port mirroring, ARP Redirect, and ICMP Redirect attack. To defend these attacks, I proposed to use SSL packet encryption, reconfiguration of switching environment, DNS, and decoy method for defending all kinds of Sniffing attacks.

Wavelet-based Time Delay Estimation in Tomographic Signals (웨이브렛을 이용한 해양음향 토모그래피 음파 도달시간 분석)

  • 오선택;조환래;나정열;김대경
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.2
    • /
    • pp.153-161
    • /
    • 2003
  • In this paper, we propose a wavelet-based detection method to identify efficiently the time-delay or multipath channel of ocean acoustic signals due to complex ocean medium and boundary layers. Our proposed method employs wavelet packet transform to analyze the received broadband acoustic signals and applies the matched filter to determine the time region of interest. Also, we present numerical testing that results on both the simulated and real data revealed the efficiency of this method in time-delay estimation and moreover its capability in estimating the time-delay of individual path in multipath channel, in which the arrival patterns are too close to be separated by the matched filter method.

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

A Study on the Introduction of an International Communication Protocol(DATEX-ASN) to Traffic Control System in Korea (ITS센터 간 국제통신규격(DATEX-ASN)을 신호시스템에 도입하는 방안에 대한 연구)

  • Ko, Kwang-Yong;Lee, Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.138-152
    • /
    • 2007
  • A communication system based on DATEX-ASN, an international communication protocol for use in COSMOS, a real-time traffic responsive signal system of Seoul, was developed in this study. Through laboratory experiments, it was identified that some additional rules were necessary for its successful application to COSMOS and thus proper complementary rules were devised. Laboratory experiments were to measure error-rates of monitoring information packet, EOC duration and operating cycle-length errors at different data transmission rates and the results of each experiment were compared each other. The results show that the DATEX-ASN protocol requires a transmission rate of at least 9,600bps which is higher than a transmission rate of 4,800bps required by NTCIP.

  • PDF

An Efficient Code Assignment Algorithm in Wireless Mesh Networks (무선 메쉬 네트워크에서의 효율적인 코드할당 알고리즘에 대한 연구)

  • Yeo, Jae-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.261-270
    • /
    • 2008
  • Wireless Mesh Networks (WMNs) have emerged as one of the new hot topics in wireless communications. WMNs have been suggested for use in situations in which some or all of the users are mobile or are located in inaccessible environments. Unconstrained transmission in a WMN may lead to the time overlap of two or more packet receptions, called collisions or interferences, resulting in damaged useless packets at the destination. There are two types of collisions; primary collision, due to the transmission of the stations which can hear each other, and hidden terminal collision, when stations outside the hearing range of each other transmit to the same receiving stations. For a WMN, direct collisions can be minimized by short propagation and carrier sense times. Thus, in this paper we only consider hidden terminal collision while neglecting direct collisions. To reduce or eliminate hidden terminal collision, code division multiple access (CDMA) protocols have been introduced. The collision-free property is guaranteed by the use of spread spectrum communication techniques and the proper assignment of orthogonal codes. Such codes share the fixed channel capacity allocated to the network in the design stage. Thus, it is very important to minimize the number of codes while achieving a proper transmission quality level in CDMA WMNs. In this paper, an efficient heuristic code assignment algorithm for eliminating hidden terminal collision in CDMA WMNs with general topology.

  • PDF