• Title/Summary/Keyword: 다양한 트래픽

Search Result 1,086, Processing Time 0.024 seconds

Network Slicing Automatic Tuning System Considering Traffic Characteristics (트래픽 특성을 고려한 네트워크 슬라이싱 자동 조정 시스템)

  • Lee, Pil-Won;Jeong, Ji-Su;Shin, Yong-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.549-550
    • /
    • 2020
  • 최근 등장한 자율주행, 스마트팩토리 및 IoT 등 다양한 기술은 기존 4G 네트워크를 활용하기에 부적합한 사항이 많았다. 따라서 5G 네트워크가 등장하였으며 네트워크 슬라이싱 기술을 통해 다양한 서비스에 각각의 네트워크 환경을 구성하여 제공하였다. 그러나 같은 네트워크 환경인 슬라이스 내에서도 특징이 다른 트래픽이 발생할 수 있으며 서비스의 종류로 고정된 슬라이스의 네트워크 환경은 트래픽 처리시간 증가 및 응답시간 증가를 유발할 수 있다. 따라서 본 논문에서는 트래픽의 특성을 고려하여 클러스터링을 시행하여 자동으로 네트워크 슬라이스를 관리하는 시스템을 제안한다.

  • PDF

A Traffic-Classification Method Using the Correlation of the Network Flow (네트워크 플로우의 연관성 모델을 이용한 트래픽 분류 방법)

  • Goo, YoungHoon;Lee, Sungho;Shim, Kyuseok;Sija, Baraka D.;Kim, MyungSup
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.433-438
    • /
    • 2017
  • Presently, the ubiquitous emergence of high-speed-network environments has led to a rapid increase of various applications, leading to constantly complicated network traffic. To manage networks efficiently, the traffic classification of specific units is essential. While various traffic-classification methods have been studied, a methods for the complete classification of network traffic has not yet been developed. In this paper, a correlation model of the network flow is defined, and a traffic-classification method for which this model is used is proposed. The proposed network-correlation model for traffic classification consists of a similarity model and a connectivity model. Suggestion for the effectiveness of the proposed method is demonstrated in terms of accuracy and completeness through experiments.

A study on the performance improvement of an adaptive, real-time traffic assignment scheduler using the TP coefficient (TP 계수를 이용한 적응적 실시간 트래픽 할당 스케듈러의 성능 향상에 관한 연구)

  • Park, Nho-Kyung;Jin, Hyun-Joon;Yun, Eui-Jung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.1-10
    • /
    • 2010
  • As recent fusion industry and ubiquitous technology have grown fast, network contents, which require high load, are provided in various infrastructures and facilities such as u-city and smart phones. Therefore, it is anticipated that the playback quality of multimedia compared to network loads degrades dramatically due to the drastic increment of real-time reference of conventional high load contents (eg. multimedia data). In this paper, we improved the method of the traffic assignment based on MPP which elevated the playback quality of multimedia by assigning discriminately the possible traffic of MMS with TP coefficients. When the TP coefficient which combines content preference with media preference was applied to a real-time traffic assignment scheduler, the simulation results showed that the multimedia playback stream was assigned within the possible traffic of a server. The real-time scheduling algorithm was improved by using the TP coefficient that combines the time-dependent image contents and the weighted value of media preference. It was observed from the experiment that the loss of the possible traffic decreases to 3.91% and 3.88% for three and four clients respectively.

Classification of Traffic Classes for Application Services in Military Communication Networks (군 통신망 응용서비스를 위한 트래픽 클래스 분류 방법)

  • Choi, Geun-Kyung;Kim, Bo-Sung;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.76-88
    • /
    • 2012
  • Traffic classification for application services in military communication networks is one of the core requirements to provide efficient resource management for NCW operations. Though several standards and organizations provided their own traffic classification methods, the methods have been mainly focused on commercial services, but not reflected military specifics. In addition, though various military application services have been emerged, some of those services have been classified into different traffic classes due to implicit criteria for the classification among organizations. In this paper, we propose a methodology to classify traffic classes and to determine delivery requirements for military application services based on various standards by DoD as well as several commercial standards based on Y.1541. The validation of the proposed methodology was carried out by comparing the results by proposed one with the traffic classification suggestions by existing commercial standards, DoD and FCS. We expect that the proposed methodology can contribute to achieve efficient operations of limited military network resources, since the proposed method can provide systematic and consistent way to assign traffic classes for new and existing military applications services.

The Network Designs And Traffic Grooming Algorithm to Maximize the Throughput in WDM Ring Networks (WDM 링에서 트래픽 전송효율을 최대화하기 위한 네크워크 설계방법 및 트래픽 그루밍 알고리즘)

  • Yoon, Seung-Jin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.200-207
    • /
    • 2009
  • In this paper, novel traffic gromming algorithms are proposed with a primary goal of maximize the throughput in WDM(Wavelength Division Multiplexing) ring networks. To achieve this goal, we analyze two network designs that are Lightpath Designs and Virtual Topology Designs and simulate the throughput in various traffic environments. From this methods, we propose novel traffic gromming algorithms to maximize the throughput.

  • PDF

Traffic Estimation Method for Visual Sensor Networks (비쥬얼 센서 네트워크에서 트래픽 예측 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1069-1076
    • /
    • 2016
  • Recent development in visual sensor technologies has encouraged various researches on adding imaging capabilities to sensor networks. Video data are bigger than other sensor data, so it is essential to manage the amount of image data efficiently. In this paper, a new method of video traffic estimation is proposed for efficient traffic management of visual sensor networks. In the proposed method, a first order autoregressive model is used for modeling the traffic with the consideration of the characteristics of video traffics acquired from visual sensors, and a Kalman filter algorithm is used to estimate the amount of video traffics. The proposed method is computationally simple, so it is proper to be applied to sensor nodes. It is shown by experimental results that the proposed method is simple but estimate the video traffics exactly by less than 1% of the average.

IPFIX-based IPv6 Anomaly Traffic Monitoring (IPFIX 표준을 이용한 IPv6 이상트래픽 모니터링)

  • Kim, J.;Shin, S.;Choi, S.;Lee, Y.;Kim, K.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.128-131
    • /
    • 2006
  • IPv6 프로토콜은 현재 인터넷 프로토콜로 사용되고 있는 IPv4 프로토콜이 가지고 있는 주소 부족 문제, 미흡한 QoS의 제공, 다양한 보안 문제 등을 해결하도록 설계된 차세대 인터넷 표준이다. IPv4에서 IPv6로의 전환이 이루어지고 있는 과정이지만, 아직까지 IPv6가 많이 사용되고 있지는 않고 있어 IPv6 트래픽 모니터링 도구 및 침입대응 장비도 많이 나와 있지 않다. 그러나, IPv6 네트워크가 점진적으로 등장하고 전환이 됨에 따라 IPv6에서 발생할 수 있는 각종 인터넷 침해사고에 대한 대비가 필요하다. 이미 IPv6 프로토콜의 허점을 이용한 서비스 거부공격, 디폴트 라우터 위장공격 등 IPv4에서 발생했던 이상트래픽, IPv6 확장헤더를 이용한 이상트래픽 및 IPv6-over-IPv4 터널링 등의 이상트래픽 발생이 보고되고 있다. 이에 본 논문은 IPv6 프로토콜에서 발생할 수 있는 이상트래픽에 대해 살펴보고, 이러한 이상트래픽의 탐지를 위해 IETF 표준인 IPFIX 템플릿을 이상 트래픽 탐지가 가능하게 제안한다. 제안된 IPFIX 플로우 메시지를 이용하여 간단하게 IPv6 이상 트래픽을 분류하는 방법도 제시하였다.

  • PDF

Detection of Traffic Flooding Attack using SNMP (SNMP를 이용한 트래픽 폭주 공격 검출)

  • 김선영;박원주;유대성;서동일;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.48-54
    • /
    • 2003
  • Recently it frequently occur that remote host or network device breaks down because of various traffic flooding attacks. This kind of attack is classified an one of the most serious attacks of it can be used to a need of other hackings. This research is gathering system's informations for detecting a traffic flooding attack using the SNMP MIB. We analyze the traffic characteristic applying the critical value commonly used in analytical procedure of traffic flooding attacks. As a result or this analysis, traffic flooding attacks have a special character of its on. The proposed algorithm in this paper would be more available to a previous detecting method and a previous protecting method.

  • PDF

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

A Study on the IoT Network Traffic Shaping Scheme (IoT 네트워크의 트래픽 쉐이핑 기법 연구)

  • Changwon Choi
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.75-81
    • /
    • 2023
  • This study propose the traffic shaping scheme on IoT Network. The proposed scheme can be operated on the gateway which called sink node and control the IoT traffic with considering the traffic type(real-time based or non real-time based). It is proved that the proposed scheme shows a efficient and compatible result by the numerical analysis and the simulation on the proposed model. And the efficient of the proposed scheme by the numerical analysis has a approximate result of the simulation.