• 제목/요약/키워드: protocol Analysis

Search Result 2,534, Processing Time 0.036 seconds

A Study of Protocol comparison Analysis for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 프로토콜 비교 분석에 관한 연구)

  • Ha, Yun-Sik;Kim, Dong-Il;Choi, Sam-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.105-108
    • /
    • 2005
  • To support abruptly increasing data traffic in these days. network management is needed. And also to maintain the steady infra, there is MPLS need which can support traffic engineering. It's necessary that MPLS doesn't only manage network to support recently booming data traffic, but has capacity to support traffic engineering to keep static infrastructure. Traffic engineering, method that a large-scale user shifts traffic to the beforehand designated routes that pass through specific nodes on network, is operation that is mapping traffic flow to the physical network topology. In this paper, we supplement the defect of the traditional RSVP traffic engineering and to construct far more steady infra, we suggest the way of its development of ERSVP signaling protocol.

  • PDF

Throughput analysis of DCF protocol for packet applied to the nonmarkov process in the wireless LAN (비 마르코프 과정을 적용한 무선 LAN의 DCF 패킷 처리율 분석)

  • Ha, Eun-Sil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1410-1418
    • /
    • 2007
  • This paper analyzes the throughput of DCF protocol at the MAC layer in the 802.11a wireless LAN. The throughput of DCF protocol is related on probability of backoff, depends on retransmission of each terminal. This paper applied to nonmarcov discrete model for each terminal BER in the base station versus the packet throughput is progressing with the data rate of 6,12,24,54 Mbps, We find the fact that the less the data rate be the higher the throughput. We also find from the throughput calculation by means of traffic intensity in OFDM wireless LAN.

  • PDF

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.

A Study on the performance improvement of CSMA in the distributed wireless communication network (분산 무선통신망에서 CSMA 성능 개선에 관한 연구)

  • 조병록;최병진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.4
    • /
    • pp.605-613
    • /
    • 1994
  • In this paper, we evaluate performance of multiple access for distributed wireless communication network by CSMA protocol. It is envident that the existence of hidden node in an environment degrades the performance of CSMA. In order to improve performance due to the problem of hidden node, the previous paper used random multiple access protocols a as such as ISMA, BTMA, BCMA. In this paper, We propose a protocol that we can improve performance by allowing node to sense the carrier of any other transmission on the channel in the distributed wireless communication networks The probability of transmission success was obtained by steady stats analysis under given assumptions. We confirmed that hidden node problem be virtually elimated by using a new protocol.

  • PDF

Analysis of Application protocol for Demand response System (수요반응 시스템에서의 응용 프로토콜 분석)

  • Park, Jae Jung;Kim, Jin Young;Seo, Jong Kwan;Lee, Jae Jo
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.56-61
    • /
    • 2013
  • With the rapidly increasing power demand in recent years, variety of methods have been proposed for efficient power consumption.. Among them, the most representative example is demand response system based smart grid. Demand response system is not passive, one-side power demand. This system can efficiently consume through communication between service provider and power consumer. Demand response system uses HTTP based TCP/IP. And currently, there are variety of communication application protocol. In this paper, we analyze procotol type and application for demand response system.

Design and Implementation of CORBA Inter-ORB Protocol Based on Shared Memory for Communication Systems (통신 시스템을 위한 공유 메모리 기반 CORBA 연동 프로토콜 설계 및 구현)

  • Jang, Jong-Hyun;Lee, Dong-Gil;Choi, Wan;Han, Chi-Moon;Jang, Ik-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.231-238
    • /
    • 2003
  • Distributed systems present new system architecture for solving interoperability problem in heterogeneous system. This paper presents CORBA Inter-ORB protocol model based on shared memory to support communication software through analysis of existing CORBA IIOP protocol performance and Inter-Process Communication techniques. In the same host environment, proposed model applied standard CORBA mechanism to minimize message transfer overhead can develop software independently to hardware architecture of target communication system. This communication software that has flexibility and extensibility can improve productivity, duality and reusability of software.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

Implementation of Automatic Power Management System using the Arduino and Beacons (아두이노와 비콘을 활용한 자동 전원 관리 시스템의 구현)

  • Kang, Bong-Gu;Yeo, Junki;Shim, Jaechang
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1471-1478
    • /
    • 2016
  • In this study, the system to manage the power automatically was implemented by using Arduino, Raspberry pi, and Beacon technologies. Before the research, pre-research was carried out with the analysis on the existing power management systems in the market in order to find a solution to reduce burdens from standby power and power waste with the increase of electric charges. The system is designed to be able to deliver and receive data through IEEE 802.15.4 wireless protocol, by using Xbee module. Arduino was tested to verify whether it is able to control SSR(Solid State Relay), and it was found that there is no problem. Meanwhile, it was also tested whether it is possible to organize a star topology network through Arduino and Raspberry Pi, and it was confirmed that normal wireless communication is possible through IEEE 802.15.4 wireless protocol. It is designed that the signal from Android smartphone application is to be delivered to Raspberry Pi and then, to be delivered to Arduino through Xbee so that Arduino could control SSR. In addition to this, wireless protocol required to control Arduino with Raspberry Pi is also designed and applied to this research.

Multi-interface Wireless Mesh Network Testbed using Wireless Distribution System (무선 분산 시스템을 이용한 멀티 인터페이스 무선 메쉬 네트워크 테스트베드)

  • Yoon, Mi-kyung;Yang, Seung-chur;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.87-90
    • /
    • 2009
  • Wireless Mesh Network(WMN) is wireless backbone networks technique which has ease of network configuration and cost of advantage. Recently, WNM released a new product, but most of existing research and technology analysis the performance through the simulation. This paper build the wireless mesh network testbed for actual situation. Testbed supports multi-channel multi-interface using bridge, the Wireless Distribution System and dynamic location-based routing protocol. This routing protocol strongly design against wireless interference using metric for link channel change and real distance. Then, the address of mesh clients assigned by the centralized address management server. Mesh clients is designed and implemented to manage network through Simple Network Management Protocol.

  • PDF