• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.027 seconds

A Hybrid Centralized-Distributed Mobility Management Scheme in SDN-Based LTE/EPC Networks (SDN 기반 LTE/EPC 네트워크에서 하이브리드 중앙-분산 이동성 관리 기법)

  • Lim, Hyun-Kyo;Kim, Kyoung-Han;Kim, Young-hwan;Han, Youn-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.426-429
    • /
    • 2015
  • 최근 급격히 증가한 모바일 기기로 인하여 발생되는 데이터/제어 트래픽은 LTE/EPC 네트워크에서 중앙에 과다한 트래픽 수용문제가 중요 이슈로 부각되고 있다. 기존의 Centralized Mobility Management(CMM) 기반의 LTE/EPC 네트워크에서 Mobility Anchor 역할을 수행하는 Packet Data Network Gateway (P-GW)에서는 데이터 트래픽 과부하가 발생한다. 또한 Distributed Mobility Management (DMM) 기반의 LTE/EPC 네트워크에서 분산된 Mobility Anchor 역할을 수행하는 PDN Edge Gateway (P-EGW)에서는 제어 트래픽의 과부하가 발생한다. 본 논문에서는 이러한 문제를 해결하기 위하여 CMM 기반과 DMM 기반을 결합한 새로운 Software Defined Network (SDN) 기반의 LTE/EPC 네트워크 이동성 관리 기법을 제안한다. 이를 위하여, P-EGW를 네트워크 내에 분산 배치하고 중앙에 P-GW를 배치한다. SDN 컨트롤러는 EPC의 역할도 수행하며 UE의 이동성에 따라 적절한 CMM 기법과 DMM 기법을 이용하도록 하는 기법을 제안한다. 또한, 제안하는 새로운 LTE/EPC 네트워크 구조와 기존의 CMM기반의 LTE/EPC 네트워크 구조, DMM 기반의 LTE/EPC 네트워크 구조를 핸드오버 지연시간과 데이터 전송시간 측면에서 성능 비교 분석을 한다.

Performance Analysis of Mobile node based on SCTP in MIPv6 (MIPv6에서 SCTP 기반 이동단말의 성능 분석)

  • Kim, Gwang-Hyun;Cho, Chung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1391-1400
    • /
    • 2008
  • In recent yeats, SCTP is known as the next transport layer protocol for connection-oriented and reliable data transfer after TCP/UDP. The SCTP was developed on the basis of the existing TCP and was designed to eliminate defects of TCP. SCTP has the different characteristic of multi-streaming and multi-homing from TCP. In this paper, we studied the defects of the performance of communication using the traits of multi-homing. And we evaluated the efficiency for each application services on the basis of SCTP of IPv6. Also, we analysed the delay time of a packet using SCTP and TCP. We noticed that the efficiency of SCTP is better than that of TCP.

A Study on Development of UHF RFID R/W Using AT91SAM7S256 (AT91SAM7S256을 이용한 UHF RFID R/W 전용 단말기 개발에 관한 연구)

  • Hwang, Gi-Hyun;Jang, Wan-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1301-1307
    • /
    • 2008
  • In this paper, we developed UHF RFID R/W system using AT91SAM7S256(ARM chip), UHF RFID R/W module (WJ7090) and wireless LAN(IEEE 802.11.a/b). And we developed a transmission/receiving packet which is send to UHF R/W module in AT91SAM7S256. In order to show the usefulness of UHF RFID R/W system, we executed a performance test. The developed UHF RFID R/W system shows better performance for reading of RFID tag and data transmission through wireless LAN.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Design and Implementation of Magnetic Induction based Wireless Underground Communication System Supporting Distance Measurement

  • Kim, Min-Joon;Chae, Sung-Hun;Shim, Young-Bo;Lee, Dong-Hyun;Kim, Myung-Jin;Moon, Yeon-Kug;Kwon, Kon-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4227-4240
    • /
    • 2019
  • In this paper, we present our proposed magnetic induction based wireless communication system. The proposed system is designed to perform communication as well as distance measurement in underground environments. In order to improve the communication quality, we propose and implement the adaptive channel compensation technique. Based on the fact that the channel may be fast time-varying, we keep track of the channel status each time the data is received and accordingly compensate the channel coefficient for any change in the channel status. By using the proposed compensation technique, the developed platform can reliably communicate over distances of 10m while the packet error rate is being maintained under 5%. We also implement the distance measurement block that is useful for various applications that should promptly estimate the location of nearby nodes in communication. The distance between two nodes in communication is estimated by generating a table describing pairs of the magnetic signal strength and the corresponding distance. The experiment result shows that the platform can estimate the distance of a node located within 10m range with the measurement error less than 50cm.

A study on the outbound traffic controller for prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.759-761
    • /
    • 2016
  • ICMP(Internet Control Message Protocol) supports the processing of error in the communication network based TCP/IP. If a problem is occurred in a data transmission process, router or receiving host sends ICMP message containing the error cause to sending host. However, in this process an attacker sends a fake ICMP message to the host so that the communication between the hosts can be abnormally terminated. In this paper, we performed a study to prevent several attacks related to ICMP. To this, we have designed outbound traffic controller so that attack packet is not transmitted to network in operating system of host.

  • PDF

Improvement of inspection system for common crossings by track side monitoring and prognostics

  • Sysyn, Mykola;Nabochenko, Olga;Kovalchuk, Vitalii;Gruen, Dimitri;Pentsak, Andriy
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.3
    • /
    • pp.219-235
    • /
    • 2019
  • Scheduled inspections of common crossings are one of the main cost drivers of railway maintenance. Prognostics and health management (PHM) approach and modern monitoring means offer many possibilities in the optimization of inspections and maintenance. The present paper deals with data driven prognosis of the common crossing remaining useful life (RUL) that is based on an inertial monitoring system. The problem of scheduled inspections system for common crossings is outlined and analysed. The proposed analysis of inertial signals with the maximal overlap discrete wavelet packet transform (MODWPT) and Shannon entropy (SE) estimates enable to extract the spectral features. The relevant features for the acceleration components are selected with application of Lasso (Least absolute shrinkage and selection operator) regularization. The features are fused with time domain information about the longitudinal position of wheels impact and train velocities by multivariate regression. The fused structural health (SH) indicator has a significant correlation to the lifetime of crossing. The RUL prognosis is performed on the linear degradation stochastic model with recursive Bayesian update. Prognosis testing metrics show the promising results for common crossing inspection scheduling improvement.

Performance Comparison of 3D File Formats on a Mobile Web Browser

  • Nam, Duckkyoun;Lee, Daehyeon;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.31-42
    • /
    • 2019
  • As smartphone H/W performance and mobile communication service have been enhanced, large-capacity 3D modeling files are available in smartphones. Common formats of 3D modeling files include STL (STereoLithography), OBJ (Wavefront file format specification), FBX (Filmbox), and glTF (open GL Transmission Format). Each format has different characteristics depending on the configuration and functions, and formats that are supported are varied depending on the applications. Large-size files are commonly used. The 4th generation mobile communication network secures loading of 3D modeling files and transmission of large-size geometric files in order to provide augmented reality services via smartphones. This paper explains the concepts and characteristics of major 3D file formats such as OBJ, FBX, and glTF. In addition, it compares their performance in a wired web with that in the 4th generation mobile communication network. The loading time and packet transmission in each 3D format are also measured by means of different mobile web browsers (Google Chrome and MS Edge). The experiment result shows that glTF demonstrated the most efficient performance while the loading time of OBJ was relatively excessive. Findings of this study can be utilized in selecting specific 3D file formats for rendering time reduction depending on the mobile web environments.

Efficient Resource Slicing Scheme for Optimizing Federated Learning Communications in Software-Defined IoT Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.27-33
    • /
    • 2021
  • With the broad adoption of the Internet of Things (IoT) in a variety of scenarios and application services, management and orchestration entities require upgrading the traditional architecture and develop intelligent models with ultra-reliable methods. In a heterogeneous network environment, mission-critical IoT applications are significant to consider. With erroneous priorities and high failure rates, catastrophic losses in terms of human lives, great business assets, and privacy leakage will occur in emergent scenarios. In this paper, an efficient resource slicing scheme for optimizing federated learning in software-defined IoT (SDIoT) is proposed. The decentralized support vector regression (SVR) based controllers predict the IoT slices via packet inspection data during peak hour central congestion to achieve a time-sensitive condition. In off-peak hour intervals, a centralized deep neural networks (DNN) model is used within computation-intensive aspects on fine-grained slicing and remodified decentralized controller outputs. With known slice and prioritization, federated learning communications iteratively process through the adjusted resources by virtual network functions forwarding graph (VNFFG) descriptor set up in software-defined networking (SDN) and network functions virtualization (NFV) enabled architecture. To demonstrate the theoretical approach, Mininet emulator was conducted to evaluate between reference and proposed schemes by capturing the key Quality of Service (QoS) performance metrics.

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.