• Title/Summary/Keyword: 네트워크 트래픽 데이터

Search Result 786, Processing Time 0.025 seconds

3GPP 기반 5G 이동통신 기술 발전 전망

  • An, Jae-Yeong;Song, Pyeong-Jung
    • Information and Communications Magazine
    • /
    • v.30 no.12
    • /
    • pp.37-50
    • /
    • 2013
  • 아이폰을 비롯한 새로운 스마트 기기의 도입으로 촉발된 폭발적인 데이터 트래픽의 증가는 사회.경제적으로 큰 변화를 가져 왔으며, 앞으로도 그 추세가 계속될 것으로 예측되고 있다. 국내의 경우 증가하는 데이터 트래픽을 수용하기 위해 10MHz의 LTE 시스템을 도입하여 상용 서비스를 시작한 바 있으며, 올해 하반기부터는 20MHz의 광대역 LTE 서비스와 함께 2개의 반송파를 집성하는 CA(Carrier Aggregation) 기술이 적용된 LTE-Advanced, 즉 4G 상용 서비스를 이미 개시하였다. LTE 상용 서비스가 본격화 되기 시작하면서 제조업체와 대학, 연구소 등을 중심으로 다음 세대 이동통신 기술에 대한 관심이 보다 높아졌으며, 최근 LTE-Advanced 상용 서비스 개시를 계기로 5G 이동통신에 대한 논의가 본격적으로 시작되고 있다. ITU-R WP(Working Party) 5D는 2012년 7월에 개최된 제13차 회의에서 2020년 및 그 이후의 미래 IMT 시스템을 위한 비전(Vision) 및 기술동향 연구를 수행하기로 결정하였으며, 2013년부터 본격적인 연구에 착수하여 미래 IMT 기술동향 보고서와 미래 IMT 비전 권고를 각각 2014년과 2015년까지 개발할 계획이다. 이와 관련하여 3GPP와 IEEE 802도 현재 표준화가 진행되거나 진행 예정인 최신 기술들을 중심으로 미래 IMT 기술동향 보고서에 대한 기고를 제출하였다. 향후 ITU-R WP 5D는 전례로 볼 때 현재 진행 중인 2020년 및 그 이후의 미래 IMT 시스템을 위한 비전 및 기술동향 연구 작업이 마무리하면, 4G인 IMT-Advanced의 경우와 마찬가지로 5G의 기술적 요구사항을 정의하고, 5G 후보 기술규격을 외부 표준화 기구들로부터 제안 받아 5G 기술로 승인하는 과정을 밟게 될 것이며, 이후 이 요구사항을 만족하는 시스템을 5G 이동통신 시스템이라고 명명하게 될 것이다. 5G 이동통신 시스템에 대한 요구사항은 다양한 의견 교류를 통해 큰 틀에서 컨센서스를 이루어가는 중이며, 이러한 내용이 ITU-R WP 5D의 기술적 요구사항에 반영되어 보다 구체화 될 것이다. 반면 5G에 대한 기술적 접근방법에 대해서는 여러 시각들이 존재하는 것이 사실이나, 현재 이에 대한 논의가 활발히 진행되고 있으며, 결국은 관련 표준화 기구들에서의 논의를 통해 그 접근방법이 최종적으로 결정될 것으로 보인다. 본 고에서는 먼저 5G 이동통신 요구사항과 4G 이후의 표준화 기술에 대해 살펴 본 후, 향후 이동통신 기술이 어떤 시나리오에 따라 발전할 것인지, 5G 네트워크는 어떤 구조를 갖게 될지, 그리고 어떤 기술이 적용될 지 등에 대해 개인적인 시각에서 전망해보고자 한다.

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

Congestion Control for Burst Loss Reduction in Labeled OBS Network (Labeled OBS 망에서의 버스트 손실 감소를 위한 혼잡 제어)

  • Park Jonghun;Yoo Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.331-337
    • /
    • 2005
  • The optical Internet is considered as a feasible solution for transporting huge amount of traffic volume in the future Internet. Among optical switching technology for the optical Internet, OBS becomes one of the most promoting solution. Recently, a lebeled OBS(LOBS) architecture is considered for an efficient control on OBS network. Given that a data burst may contain few thousands of IP packets, a single loss of data burst results in a serious throughput degradation in LOBS network. In this paper, we improve the performance of LOBS network by introducing the burst congestion control mechanism. More specifically, the OBS router at the network core detects the network congestion by measuring the loss probability of burst control packet. The OBS router at the network edge reduces the burst generation according to the network condition repored by the OBS router at the network core. Through the simulations, it is shown that the proposed congestion control mechanism can reduce the burst loss probability and improve the LOBS network throughput.

Selective On-demand Zone Routing Protocol for Large Scale Mobile Ad-hoc Networks (대규모 Ad-hoc 네트워크 환경에서 트래픽 감소를 위한 선택적 on-demand 라우팅 기법에 관한 연구)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.443-452
    • /
    • 2012
  • In Mobile Ad-hoc Networks, previous routing protocols classified into proactive and reactive approach respectively have pros and cons under the use of applications and environment. Moreover, to integrate their advantages in case by case, hybrid approach is consistently researched, and Zone Routing Protocol (ZRP) was motivating many recent hybrid protocols. ZRP uses proactive routing to the node located within the zone defined by the specific number of hops, while it uses reactive routing to other nodes. However, in ZRP, because proactive routing is applied only within the zone defined by the number of hops, the zone is formed regardless of whether real data communication occurred frequently or not. In this paper, we propose a new hybrid routing scheme which employs the zone method but forms customized zone considering traffic load and number of hops, by a new decision method named Dynamic Zone Decision (DZD). Additionally, we analyze the performance of the proposed scheme, comparing with the previous proactive, reactive, and hybrid routings.

Classification Performance Improvement of UNSW-NB15 Dataset Based on Feature Selection (특징선택 기법에 기반한 UNSW-NB15 데이터셋의 분류 성능 개선)

  • Lee, Dae-Bum;Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.35-42
    • /
    • 2019
  • Recently, as the Internet and various wearable devices have appeared, Internet technology has contributed to obtaining more convenient information and doing business. However, as the internet is used in various parts, the attack surface points that are exposed to attacks are increasing, Attempts to invade networks aimed at taking unfair advantage, such as cyber terrorism, are also increasing. In this paper, we propose a feature selection method to improve the classification performance of the class to classify the abnormal behavior in the network traffic. The UNSW-NB15 dataset has a rare class imbalance problem with relatively few instances compared to other classes, and an undersampling method is used to eliminate it. We use the SVM, k-NN, and decision tree algorithms and extract a subset of combinations with superior detection accuracy and RMSE through training and verification. The subset has recall values of more than 98% through the wrapper based experiments and the DT_PSO showed the best performance.

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

A Tree based Channel Assignment Protocol for Considering the Performance Anomaly in IEEE 802.11 Wireless Mesh Networks (IEEE 802.11 무선 메쉬 네트워크에서의 성능 이상 현상 고려를 위한 트리 기반 채널 할당 프로토콜)

  • Kim, Sok-Hyong;Kim, Dong-Wook;Suh, Young-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.341-345
    • /
    • 2010
  • WMN is one of efficient solutions to provide Internet services for users by forming wireless backbone networks with wireless links. The dominant technology for WMNs is the IEEE 802.11, which provides multi-channel and multi-rate capabilities. One of important issues in WMNs is the network capacity and it is essential to design a multi-channel protocol that leverages the network capacity. However, when wireless links that use different data rates operate on the common channel, the performance of high-rate links is severely degraded by the presence of the low-rate links, which is often referred as performance anomaly. In this paper, we propose a Tree-based Channel Assignment (TreeCA) protocol to mitigate the performance anomaly problem by distributing data rates over multiple channels. TreeCA performs channel assignments based on the tree WMN architecture to accommodate the Internet traffics efficiently. Parent nodes on the tree distribute their child nodes over multiple channels so that the performance anomaly is reduced. Through simulations, we observed that the proposed TreeCA outperforms the existing multi-channel protocols for WMNs.

Performance Analysis of Position Based Routing Protocol for UAV Networks (UAV 네트워크 환경에 적합한 위치기반 라우팅 프로토콜의 성능 분석)

  • Park, Young-Soo;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.188-195
    • /
    • 2012
  • Many systems are developing for the realization of NCW(Network Centric Warfare). UAV(Unmanned Aerial Vehicle) Network is attracting attention in a lot of military applications. In general, UAVs have the potential to create an ad-hoc network and greatly reduce the hops from source to destination. However, UAV networks exhibit unique properties such as high mobility, high data rate, and real time service. The routing protocols are required to design the multi-hop routing protocols that can dynamically adapt to the requirements of UAV network. In this paper we analyse Geographic Routing Protocol is based on geographical distance between source and destination for efficient and reliable transmission. Geographic Routing Protocol is evaluated in video service scenarios with TDMA model in our simulation. The simulation results show that the performance of Geographic Routing Protocol is better than the MANET Routing Protocol in terms of packet received ratio, end to end delay, and routing traffic sent.

Q+R Tree based Pub-Sub System for Mobile Users (모바일 사용자를 위한 Q+R 트리 기반 퍼브-서브 시스템)

  • Lee, Myung-Guk;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.9-15
    • /
    • 2015
  • A pub(lish)/sub(scribe) system is a data forwarding system which forwards only interesting data among the whole published data, which is related to the subscriptions registered by end users. Classical pub/sub systems are realized by constructing a network of brokers which are responsible for storing or forwarding data. Along with the substantial increase of the population mobile users, it is required that the pub/sub system handles the subscriptions of user locations which changes continuously and frequently. In this paper, a new broker network based pub/sub system which efficiently handles the frequent changes of subscriptions related to user locations is proposed. In consideration of moving patterns of users and geographical property, the proposed pub/sub system categorize the entire data space into Slow Moving Region and Normal Moving Region, and manages the brokers which are responsible for these regions by using Q+R tree in order to handle user requests more efficiently. Through the extensive simulation, it is presented that the proposed Q+R tree based pub/sub system can reduce unnecessary needs of brokers and network traffic and can support the dynamic subscription related to user location.