• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.026 seconds

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

A Study on Header Compression Algorithm for the Effective Multimedia Transmission over Wireless Network (무선망에서 효율적인 멀티미디어 전송을 위한 헤더압축 알고리즘 연구)

  • Yun, Sung-Yeol;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.296-304
    • /
    • 2010
  • MoIP is technology to transmit a variety of multimedia over IP, but compared to traditional voice services require greater bandwidth and radio resources in a wireless environment has already reached the limits. Therefore, as a way to resolve this issue for header compression is a lot of research. SCTP protocol header compression using ROHC-SCTP has been research, ROHC-SCTP packet structure of the ROHC algorithm with different types and, SCTP header compression to apply the characteristics of the poor performance of many of these have drawbacks. Therefore, in this paper to solve these problems better header compression algorithm was designed. In this paper, the proposed algorithm to evaluate the NS-2 simulation environment was modeled on the header compression operation. Evaluation results, the algorithm designed in this paper compared to ROHC-SCTP algorithms determine the overhead rate was low, the data types vary a lot better when the total header size was small.

A New Multicast Routing Protocol for Multicast Delivery Agent-based Mobile-IPv6 in 3GPP2 IMT-2000 System (3GPP2 IMT-2000 시스템에서 멀티캐스트 전달 대리자 기반의 새로운 Mobile-IPv6 멀티캐스트 라우팅 프로토콜)

  • Park, Byeong-Seob;Kim, Sung-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2002
  • We present a new MDA-based Mobile-IPv6 multicast routing algorithm for wirelese service operators to offer Mobile-IP over IMT-2000 service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 multimedia application services. The extended IMT-2000 system architectures use an PDSNs (i.e. IWFs), and the home network (i.e. Internet) backbone and intermediate network are composed of ATM entities. A key feature of the new protocol is the use of MDA(Multicast Delivery Agent) to reduce delivery path length of the multicast datagram. We show that proposed protocol is efficient in terms of various performance measures such as multicast traffic load, multicast related handoff, and average routing length when we implement it using the Mobile-IPv6. Particularly, the number of tunneling and average routing length of datagram are reduced relatively, the multicast traffic load is also decreased.

Fault-Management Scheme for Recovery Time and Resource Efficiency in OBS Networks (OBS 망에서 복구 시간과 자원의 효율성을 고려한 장애 복구 기법)

  • 이해정;정태근;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.793-805
    • /
    • 2003
  • In OBS (Optical Burst Switching) networks which decouple the burst from its header, the fault of a fiber link can lead to the failure of all the light-path that traverses the fiber. Because each light-path is expected to operate at a rate of a few Gbps by using WDM (Wavelength Division Multiplexing) technology, any failure may lead to large data loss. Therefore, an efficient recovery scheme must be provided. In this paper, we analyze network utilization and BCP (Burst Control Packet) loss rate according to each link failure by applying the conventional restoration schemes in OBS networks. And through these simulation results, an ASPR scheme is proposed improve the fault management scheme in terms of recovery time and throughput. Finally, We compare the performance of our proposed scheme with that of the conventional one with respect to burst loss rate, resource utilization and throughput by OPNET simulations.

Group Synchronization Method Using Adaptive Synchronization Delay Time for Media Streaming (미디어 스트리밍을 위한 적응적 동기 지연시간을 이용한 그룹 동기화 기법)

  • Kwon, Dongwoo;Ok, Kisu;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.506-515
    • /
    • 2015
  • In this paper, we propose a group playback synchronization method using adaptive synchronization delay time by the bit rate of media to synchronize a play position of streaming media between mobile smart devices. This method consists of streaming server-side and client-side synchronization algorithms based on synchronization delay time which includes connection time, control packet transmission time, streaming data buffering time, and synchronization processing time. We implement the Android media player application with synchronization support using the proposed algorithms and present the result of performance evaluation.

Routing Protocol of Shipping Container Network suitable for Port/Yard Stacking Environment: SAPDS(Simple Alternative Path Destined for Sink node) (항만/야적장 적치 환경에 적합한 컨테이너 네트워크 라우팅 프로토콜: SAPDS(Simple Alternative Path Destined for Sink node))

  • Kwark, Gwang-Hoon;Lee, Jae-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.728-737
    • /
    • 2011
  • For the real time monitoring and tracking of shipping container which is one of the core objects for global logistics, Wireless Ad-Hoc Network technology might be needed in stacking environments such as ports, yards and ships. In this paper, we propose a container network routing protocol suitable for port or yard stacking environments which include some constraints such as shadow area problem from metal material, frequent movement of container, etc. With this protocol in which a mesh network algorithm is applied, every container data packet can be delivered to the sink node reliably even with frequent join/leave of container nodes. As soon as a node on path gets malfunction, alternative backup path is supported with notice to neighbor node, which makes constant total optimal path. We also verified that the performance of proposed protocol is better than AODV, one of previous major MANet(Mobile Ad-Hoc Network) protocol with a function for alternative path, which says the proposed protocol is better for frequent join/leave and variable link quality.

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

Reducing of Authentication Signaling Traffic in LTE Networks (LTE 네트워크에서 인증 시그널링의 감소 기법)

  • Kim, Seonho;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.109-118
    • /
    • 2012
  • As a result of the prevalence of smartphone, various mobile services became faster by LTE networks. Because many mobile devices are used more wireless services, heavy signaling traffic for authentication could be generated. Authentication is an important factor in wireless networks to identify devices; it is the start of wireless networks. This paper analyzes previous patterns for more effective authentication in accessing of another external networks. We propose a fast authentication scheme for minimizing of signaling cost between the authentication server and external networks. And we calculate the rate of authentication occurrence in LTE networks using mathematical modeling as well as the change of signaling cost for authentication in various network environments. Finally, we calculate the optimized number of authentication data and show the effectiveness for authentication signaling costs.

LC-GM2: Low-Cost Global Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 저비용의 글로벌 이동성관리 기법)

  • Kim, Jongyoun;Park, Jongsun;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.193-204
    • /
    • 2012
  • This paper specifies a low-cost global mobility management architecture and protocol procedure called LC-$GM^2$, which is based on Proxy Mobile IPv6. In LC-$GM^2$, mobility management is performed by the network entity. The benefit is the elimination of the wireless link data delivery tunnel overhead between a mobile node and the access router. To compare with the well-known Hierarchical Mobile IPv6 mobility management protocol and GPMIP, the location update, packet delivery, and total cost functions generated by a mobile node during its average domain residence time are formulated for each protocol based on Fluid-flow mobility model. Then, the impacts of various system parameters on the cost functions are analyzed. The analytical results indicate that the proposed global mobility management protocol can guarantee lower total costs.

Analysis of WLAN Performance Depending on ARF Scheme with TCP and UDP Protocols (TCP와 UDP 프로토콜 상에서 ARF 기법에 따른 무선랜 성능 분석)

  • Kim Namgi;Lee Min;Yoon Hyunsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.395-400
    • /
    • 2005
  • The IEEE 802.11b WLAN supports multiple transmission rates and the rate is chosen in an adaptive manner by an auto rate control algorithm. This auto rate control algorithm deeply affects the total system performance of the IEEE 802.11b WLAN. In this paper, we examine the WLAN performance with regard to the auto rate control algorithm especially the ARF scheme. The experimental results indicate that the ARF scheme works well in the face of signal noise due to node location. However, the ARF scheme severely degrades system performance when multiple nodes contend to obtain the wireless channel and the packet is lost due to signal collision. In addition, TCP prevent the performance degradation due to ARF scheme by retaining number of active nodes. However, some applications, such as transporting multimedia data, adopt the UDP. Therefore, the TCP cannot be an optimal solution for all WLAN applications.