• Title/Summary/Keyword: transport protocols

Search Result 147, Processing Time 0.027 seconds

Performance Analysis of ECTP Error Control Mechanism (ECTP 오류복구 성능평가)

  • 박주영;고석주;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.605-609
    • /
    • 2002
  • Reliable multicast data transmission in a 1:N environment needs more sophisticated error control mechanism than that of in 1:1 environment due to ACK implosion and duplicated retransmission. Although there have been many related research on error control in reliable multicast, real implemented protocols are rare. As one of the reliable multicast transport protocols, ECTP is selected as an international standard reliable multicast protocol by ITU-T and ISO and implemented on RedHat 7.2 machine by us. In this paper, we evaluate the performance of the error control mechanism in the respect of throughput and generated control packet numbers with a real implementation code. From the results, it is concluded that the suitable values of error control parameters can be obtained from the local group size and network environments.

  • PDF

Design and Performance Analysis of CDMA Radio Link Protocols for QoS Control of Multimedia Traffic (멀티미디어 트랙픽의 QoS 지원을 위한 CDMA 무선데이터링크 프로토콜 설계 및 성능분석)

  • 조정호;이형옥;한승완
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.451-463
    • /
    • 2000
  • In this paper, we design the radio data link protocols with QoS provisioning for mobile multimedia such as voice, data, and video in CDMA-based ATM networks, and analyze the performance of the data link protocols. To support mobile multimedia traffic, the required QoS parameters and the characteristics are analyzed, and wireless protocol stacks are proposed for integrating the wireless access network and ATM transport networks, and radio data link protocols are designed for provisioning QoS Control. The data link protocols are analyzed assuming that the system is supporting voice and data traffic simultaneously. In case of data traffic, the delay and throughput of SREJ ARQ and Type-1 Hybrid ARQ scheme are compared, and in case of voice traffic, the packet loss rate of BCH coding is analyzed according to the varying data traffic loads. The results indicate that the adaptive radio link protocols are efficient to support QoS requirements while the complexities are increased.

  • PDF

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

A Simulation Study on the Performance of Transport Protocol HSTP and TP4 (트랜스포트 프로토콜 HSTP와 TP4의 성능에 대한 시뮬레이션 연구)

  • 박장연;최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1283-1294
    • /
    • 1993
  • The conventional transport protocols, developed on top of the low-bandwidth high-error network services, exhibit poor performances when operating in the new high-bandwidth low-error networks. A new transport protocol HSTP(High Speed Transport Protocol) was proposed to take advantage of the new network environment. This paper gives a performance evaluation by simulation technique of the proposed HSTP and conventional TP4(Transport Protocol class 4) in their data trans-fer characteristics. The performance variation by HSTP and TP4 are investigated when their various error control techniques are employed, three different techniques for HSTP, and two for TP4. The performance enhancement in HSTP is also evaluated when the rate control technique is used as part of the flow control mechanisms.

  • PDF

Utilizing Multicasts Routers for Reliability in On-Line Games (온라인 게임에서 신뢰성 확보를 위한 멀티캐스트 라우터의 활용)

  • Doo, Gil-Soo;Lee, Kwang-Jae;Seol, Nam-O
    • Journal of Korea Game Society
    • /
    • v.2 no.1
    • /
    • pp.23-29
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication such as video conference, Internet broadcasting and On-Line Game, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The Purpose or this Paper is to find a method to utilize multicast routers can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM(Scalable Reliable Multicast)method has been used. Three packets per TCP transmission control window site are used for transport and an ACK is used for flow control. A CBR(Constant Bit Rate) and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

Evaluation of Security Protocols for the Session Initiation Protocol (SIP 보안 프로토콜의 성능 분석)

  • Cha, Eun-Chul;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.55-64
    • /
    • 2007
  • Behind the popularity of VoIP in these days, it may present significant security challenges in privacy and accounting. Authentication and message encryption are considered to be essential mechanisms in VoIP to be comparable to PSTN. SIP is responsible for setting up a secure call in VoIP. SIP employs TLS, DTLS or IPSec combined with TCP, UDP or SCTP as a security protocol in VoIP. These security mechanisms may introduce additional overheads into the SIP performance. However, this overhead has not been understood in detail by the community. In this paper we present the effect of the security protocol on the performance of SIP by comparing the call setup delays among security protocols. We implement a simulation of the various combinations of three security protocols and three transport layer protocols suggested for SIP. UDP with any combination of security protocols performs a lot better than the combination of TCP. TLS over SCTP may impose higher impact on the performance in average because TLS might have to open secure channels as the same number of streams in SCTP. The reasons for differences in the SIP performances are given.

Method for Group Communication Support in CORBA using OCI (OCI를 이용한 CORBA에서의 그룹 통신 지원 방법)

  • Nam, Duk-Yun;Lee, Dong-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.399-410
    • /
    • 2002
  • Group communication is one of key components supporting object replication. CORBA provides little support for fault tolerance and high availability that can be supported by means of object replication. The existing approaches do not allow transparent plug-in of group communication protocols into CORBA with which CORBA application programmers are able to directly exploit group communication protocols. They either require modification of CORBA or OS, or provide no room for incorporating group communication transport protocols into CORBA. In this paper, we propose a generic group communication framework that allows transparent plug-in of various group communication protocols with no modification of standard CORBA. For this, we extend the Open Communications Interface(OCI) to support interoperability, reusability of existing group communication, and independency on ORB and OS. The proposed approach can also be applied to various group communication protocols.

Networks and Protocols for MPEG-21 Digital Item Transmission (MPEG-21 디지털 아이템 전송을 위한 네트워크 구조 및 프로토콜)

  • 송영주;김만배;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.427-436
    • /
    • 2003
  • Many applications that are transport multimedia data through the networks should put existing network structure to practical use. Because the existing network structure and protocols are designed for static data transmission, multimedia applications with timing concept have limitations for using existence. In this paper, we present limitations of existing network structure for multimedia delivery, survey network element's characteristics in side view of multimedia application, present the streaming protocol for realtime multimedia traffic. Lastly, we consider a protocol stack for MPEG-21 Digital Item transmission using these existing protocols.