• Title/Summary/Keyword: packet data

Search Result 1,637, Processing Time 0.027 seconds

An Efficient Dynamic Bandwidth Allocation Algorithm for VoDSL Services (VoDSL 서비스를 위한 효율적인 동적 대역폭 할당 알고리즘)

  • Kim, Hoon;Park, Jong-Dae;Nam, Sang-Sig;Park, Kwang-Chae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.48-58
    • /
    • 2002
  • As internet traffic increases, the problem that it should be efficiently accepted in to the existing voice network in the pending problem importantly to the existing communication corporations. The feature of next generation exchange network is made up of the form of integration network that connect data traffic(internet service. Etc) with the existing voice network and it can be showed with very diverse aspects according to the constitution time of network or the characteristics of business. The progress strategy that develop the existing circuit based communication network into packet-based communication network can be divided into two in a large scale according to the application position These are VoDSL application method(Technology that packetize access network) and softswitch technology application method(after packetizing relay network, packetizing that into the access network). In this paper, we will deduce the desirable technology that can construct packet-based next generation exchange networks in the structure of the existing communication network environment. We will perform the research on a device to offer the necessary core technique VoSDL service with realistic resolutions primarily.

Unified Model for Performance Analysis of IEEE 802.11 Ad Hoc Networks in Unsaturated Conditions

  • Xu, Changchun;Gao, Jingdong;Xu, Yanyi;He, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.683-701
    • /
    • 2012
  • IEEE 802.11 standard has achieved huge success in the past decade and is still under development to provide higher physical data rate and better quality of service (QoS). An important problem for the development and optimization of IEEE 802.11 networks is the modeling of the MAC layer channel access protocol. Although there are already many theoretic analysis for the 802.11 MAC protocol in the literature, most of the models focus on the saturated traffic and assume infinite buffer at the MAC layer. In this paper we develop a unified analytical model for IEEE 802.11 MAC protocol in ad hoc networks. The impacts of channel access parameters, traffic rate and buffer size at the MAC layer are modeled with the assistance of a generalized Markov chain and an M/G/1/K queue model. The performance of throughput, packet delivery delay and dropping probability can be achieved. Extensive simulations show the analytical model is highly accurate. From the analytical model it is shown that for practical buffer configuration (e.g. buffer size larger than one), we can maximize the total throughput and reduce the packet blocking probability (due to limited buffer size) and the average queuing delay to zero by effectively controlling the offered load. The average MAC layer service delay as well as its standard deviation, is also much lower than that in saturated conditions and has an upper bound. It is also observed that the optimal load is very close to the maximum achievable throughput regardless of the number of stations or buffer size. Moreover, the model is scalable for performance analysis of 802.11e in unsaturated conditions and 802.11 ad hoc networks with heterogenous traffic flows.

A Fast Multiresolution Motion Estimation Algorithm in the Adaptive Wavelet Transform Domain (적응적 웨이브렛 영역에서의 고속의 다해상도 움직임 예측방법)

  • 신종홍;김상준;지인호
    • Journal of Broadcast Engineering
    • /
    • v.7 no.1
    • /
    • pp.55-65
    • /
    • 2002
  • Wavelet transform has recently emerged as a promising technique for video processing applications due to its flexibility in representing non-stationary video signals. Motion estimation which uses wavelet transform of octave band division method is applied In many places but if motion estimation error happens in the lowest frequency band. motion estimation error is accumulated by next time strep and there has the Problem that time and the data amount that are cost In calculation at each steps are increased. On the other hand. wavelet packet that achieved the best image quality in a given bit rate from a rate-distortion sense is suggested. But, this method has the disadvantage of time costs on designing wavelet packet. In order to solve this problem we solved this problem by introducing Top_down method. But we did not find the optimum solution in a given butt rate. That image variance can represent image complexity is considered in this paper. In this paper. we propose a fast multiresolution motion estimation scheme based on the adaptive wavelet transform for video compression.

Efficient DBA Algorithm for Supporting CBR Service on EPON with Traffic Burstiness (트래픽이 급증하는 EPON 환경에서 고정비트율 서비스를 효율적으로 지원하는 DBA 알고리즘)

  • Lee, Jin-Hee;Lee, Tae-Jin;Chung, Min-Young;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.61-68
    • /
    • 2008
  • Ethernet passive optical network (EPON) is the next-generation technology mitigating the bottleneck between high-capacity local area networks (LANs) and a backbone network. The bottleneck is aggrevated depending on burstiness and long range dependence (LRD) of traffic characteristics as well as amount of outgoing traffic from the high-capacity LANs. The proposed scheme decreases average packet delay for data upstreaming by considering such traffic characteristics to dynamically allocate bandwidth to multiple optical network units (ONUs). In addition, it can appropriately support delay-sensitive traffic such as constant bit ratio (CBR) traffic by making maximum cycle time fix regardless of the number of ONUs. The comprehensive simulation results indicate that the proposed scheme acheives up to 77% and 82% lower than previous schemes in terms of average packet delay and average queue size while it limits the maximum cycle time to twice of the basic cycle time.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Packet Delay and Loss Analysis of Traffic with Delay Priority in a DBA Scheme of an EPON (EPON의 DBA방안에서 지연 우선순위를 갖는 트래픽의 재킷 손실률과 지연 성능 분석)

  • Park Chul-Geun;Shim Se-Yong;Jung Ho-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.507-513
    • /
    • 2005
  • As the rapid increasement of the number of internet users has occured recently, many multimedia application services have been emerging. To improve quality of service, traffic can be suggested to be classified with priority in EPON(Ethernet Passive Optical Network), which is supporting the multimedia application services. In this paper, multimedia application services treat bandwidth classifying device in serving both delay sensitive traffic for real-time audio, video and voice data such as Von(Voice over Internet Protocol), and for real-time traffic such as BE(Best Effort). With looking through existing mechanisms, new mechanism to improve the quality will be suggested. The delay performances and packet losses of traffic achieved by supporting bandwidth allocation of upstream traffic in suggested mechanism will be analized with simulations.

Performance Evaluation of Uplink ACK Packets Transmission IEEE 802.16e WiMAX Systems (IEEE 802.16e WiMAX 시스템에서 업링크 ACK 패킷 전송 성능평가)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.790-795
    • /
    • 2011
  • The need for broadband wireless data networks such as IEEE 802.16e WiMAX systems increases as a variety of wireless information devices like smart phones are adopted rapidly in everyday life. Since most of mobile applications employ TCP as their transport layer protocol, the performance improvement of TCP in WiMAX systems is crucial. This paper proposes an efficient method to transmit uplink piggyback ACK packets by exploiting the uplink packet buffering which happens because of the resource allocation scheme of the WiMAX systems. The proposed method can support not only the ACK filtering but also the merging of the piggyback ACK packets. As a result, the bandwidth reduction in the piggyback ACK packet transmission leads to the improvement of the downlink throughput. The simulation results show that the bandwidth for the ACK packets reduces more than 90%, and the downlink throughput increases at least 30%.

A Control Platform Scheme for Seamless Service Provisioning During Handover on FMC Networks (유무선 통합망에서 핸드오버시 끊김없는 서비스 제공을 위한 제어 플랫품)

  • Maeng, Doo-Lyel;Park, Jong-Kae;Kim, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.857-866
    • /
    • 2009
  • Recently, IP mobility study of infra's common elements is undergoing processes to achieve FMC based on All-IP. Existing typical mobility technology based on IP is IETF's Mobile IP. However, it faced to limitations due to packet loss, delays when MN is moving on Mobile IP, also existing network infra - routers (FA)-needed to add/change the functions to support Mobile IP. In this paper, existing mobility problems based on IP and the suggested improvements for platforms which support mobility, quality, security are proposed. It discusses the performance on the current existing IP infrastructure derived from simulation analysis on mobility packet loss and delay. From the resulting data, improvements will also be outlined for optimal performance.

Digital Hologram Encryption using Discrete Wavelet Packet Transform (이산 웨이블릿 패킷 변환을 이용한 디지털 홀로그램의 암호화)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.905-916
    • /
    • 2008
  • In this paper, we propose a new method which estimates and encrypts significant component of digital hologram using discrete wavelet packet transform (DWPT). After analyzing the characteristics of digital hologram in spatial and frequency domain, the required information for ciphering digital hologram was extracted. Based on this information an ciphering method was proposed with wavelet transform and packetization of subbands. The proposed algorithm can encrypt digital hologram in various robust from selecting transform-level and energy threshold. From analyzing the encryption effect numerically and visually, the optimized parameter for encryption is presented. Without additional analyzing process, one can encrypt efficiently digital hologram using the proposed parameter. Although only 0.032% among total data is encrypted, the reconstructed object dose not identified. The paketization information of subbands and the cipher key can be used for the entire secret key.

Beacon-Less Operation and Idle Ping Slot Control for Low Power Communication in LoRaWAN (LoRaWAN의 저전력 통신을 위한 Beacon-Less 동작 및 유휴 Ping 슬롯 억제 기법)

  • Kim, Kyungtae;Yoo, Younghwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.231-238
    • /
    • 2017
  • A Class B device in LoRaWAN periodically receives a Beacon message from a gateway for synchronization, and it also periodically activates a ping slot to receive data from the server. In this paper, we save energy consumption by controlling the beacon-less operation which is immediately started on the packet loss. In addition, we propose a method that the server inactivates the ping slots of a device according to the amount of messages, which have to be received from the server, to save energy consumption resulting from activated but unused empty slots. The experiment with the 20% of packet loss rate showed that the reduced beacon-less operation and the inactivation of the ping slot decrease the energy consumption by 96.7% and 60% as compared to the existing method.