• Title/Summary/Keyword: 네트워크 트래픽 제어

Search Result 488, Processing Time 0.03 seconds

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

A Cell Loss Constraint Method of Bandwidth Renegotiation for Prioritized MPEG Video Data Transmission in ATM Networks (ATM망에서 우선 순위가 주어진 MPEG 비디오 데이터 전송시 대역폭 재협상을 통한 셀 손실 방지 기법)

  • Yun, Byoung-An;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1770-1780
    • /
    • 1997
  • Our problem is improvement of image quality because it is inevitable cell loss of image data when traffic congestion occurs. If cells are discarded indiscriminately in transmission of MPEG video data, it occurs severe degradation in quality of service(QOS). In this paper, to solve this problem, we propose two method. The first, we analyze the traffic characteristics of an MPEG encoder and generate high priority and low priority data stream. During network congestion, only the least low priority cells are dropped, and this ensures that the high priority cells are successfully transmitted, which, in turn, guarantees satisfactory QoS. In this case, the prioritization scheme for the encoder assigns components of the data stream to each priority level based on the value of a parameter ${\beta}$. The second, Number of high priority cells are increased when value of ${\beta}$ is large. It occurs the loss of high priority cell in the congestion. To prevent it, this paper is regulated to data stream rate as buffer occupancy with UPC controller. Therefore, encoder's bandwidth can be calculated renegotiation of the encoder and networks. In this paper, the encoder's bandwidth requirements are characterized by a usage parameter control (UPC) set consisting of peak rate, burstness, and sustained rate. An adaptive encoder rate control algorithm at the Networks Interface Card(NIC) computes the necessary UPC parameter to maintain the user specified quality of service. Simulation results are given for a rate-controlled VBR video encoder operating through an ATM network interface which supports dynamic UPC. These results show that dynamic bandwidth renegotiation of prioritized data stream could provided bandwidth saving and significant quality gains which guarantee high priority data stream.

  • PDF

Implementation of Efficient Mobile Monitoring System of the GreenHouse Environment Data (온실 환경 데이터의 효과적인 모바일 모니터링 시스템 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.572-579
    • /
    • 2009
  • A monitoring system needs many parameters to increase devices for monitoring data and to support various services. In particular, monitoring the status of a device in a wireless mobile environment has a difficulty in displaying multi data in a limited screen size, and transfer of the status data of a device into a network is largely related with network traffic. The research aims at designing a control board that collects data in order to effectively manage a greenhouse environment system. Also, the research tries to appropriately operate devices, environment data monitoring, and the control of each device by realizing a multiplexed interface based on a web. Thus, in the case in which a distributed client was a computer, monitoring and control were obtained with a web browser through the Lab VIEW web server of a server or local control module in order to effectively monitor and control according to the status of a user. In the case in which a client was a PDA, application of a wireless mobile considering the scale and data processing capacity of a displayer was connected. As a result of the research, we could confirm a satisfactory outcome from the viewpoint of a human-centered design by supplying adaptability and mobility according to the environment of a user.

Performance analysis of Hierarchical Mobile IPv6 depending on the paging size (페이징 영역크기에 따른 계층적 이동 IPv6 의 성능분석)

  • 정계갑;이상욱;김준년
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12A
    • /
    • pp.964-974
    • /
    • 2003
  • With increasing use of a personal mobile computer. the Mobile IPv6 is one of the main protocols that support mobility and complies with IPv6 specification. Similar to the mobile IPv6, the mobile IPv6 also has limitations on fast moving condition. The Hierarchical Mobile IPv6 is a solution that overcomes these limitations. The Hierarchical Mobile IPv6 is a micro mobility protocol that supports fast mobile IP handover and reduces signaling overhead with Mobility Anchor Point(MAP). But until now no paging method is applied to the Hierarchical Mobile IPv6 to reduce unnecessary signaling overhead and power consumption of mobile nodes. So, the paging mechanism for the Hierarchical Mobile IPv6 is proposed in this paper. the mechanism is implemented by making use of the destination option header and extension function and the last location algorithm. The results show that the Hierarchical Mobile IPv6 with the paging ability reduces the traffic of mobile networks by removing unnecessary binding update packet generated whenever handover takes place. Also, the larger the paging size is. the less the number of BU(Binding Update) massage generated.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

(A New Queue Management Algorithm Improving Fairness of the Internet Congestion Control) (인터넷 혼잡제어에서 공정성 향상을 위한 새로운 큐 관리 알고리즘)

  • 구자헌;최웅철;정광수
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.437-447
    • /
    • 2003
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF(Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED(Random Early Detection) algorithm. However, RED algorithm simple but does not protect traffic from high-bandwidth flows, which include not only flows that fail to use end-to-end congestion control such as UDP flow, but also short round-trip time TCP flows. In this paper, in order to solve this problem, we propose a simple fairness queue management scheme, called AFQM(Approximate Fair Queue Management) algorithm, that discriminate against the flows which submit more packets/sec than is allowed by their fair share. By doing this, the scheme aims to approximate the fair queueing policy Since it is a small overhead and easy to implement, AFQM algorithm controls unresponsive or misbehaving flows with a minimum overhead.

A Study on the Reduction of Impulse Noise from a High Voltage Cutout Switch Fuse (고전압 COS 퓨즈로 부터 방사된 충격성 소음의 저감에 관한 연구)

  • Cho, Hyun-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.70-74
    • /
    • 2008
  • We are using COS to purpose blocking the excess current and to protect the transformer. But the fuse of COS is melt due to the overload if the excess current flows and it destroy an air severing relations to clear as strong arc happens. Such phenomenon induces an impact ambient noise and it gives the circumstance area resident or pedestrian the fear. Thus, We are the actual circumstances which an ambient noise countermeasure establishment have desired urgently. In this study, we grasp the characteristic of an impact ambient noise which a COS fuse happens the melting and study the method to reduce an impact ambient noise.

A Ring-based Multicast Routing Architecture for Mobile Ad Hoc Networks (모바일 애드혹 네트워크를 위한 링 기반 멀티캐스트 라우팅 구조)

  • Heo Joon;Hong Choong Seon;Yang Yubai
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.895-904
    • /
    • 2004
  • Due to the frequent and unpredictable topology changes, multicast still remains as challenge and no one-size-fits-all protocol could serve all kinds of needs in mobile ad hoc network. In this paper, we propose a novel scheme of Hierarchical Eulerian Ring Oriented Multicast Architecture (HEROMA) over mobile ad hoc network. It has features that concentrate on efficiency and robustness simultaneously. It is also an application-driven proposal for hazard detection. Architectures including Eulerian ring, hierarchy and multicast agent are investigated in detail Simulation results different level of improvements on control traffic, end-to-end delay and packet delivery ratio by comparing with tree-based and mesh-based multicast protocols.