• Title/Summary/Keyword: 인터넷 QoS

Search Result 891, Processing Time 0.021 seconds

System Architecture Design and Policy Implications on the e-Marketplace for Telecom Bandwidth Trading (Telecom Bandwidth Trading을 위한 시스템 아키텍처 설계와 거래시장 모형)

  • Kim, Do-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.257-267
    • /
    • 2007
  • Bandwidth Trading(BT) represents a potential market with over 1 trillion USD across the world and high growth potential. BT is also likely to accelerate globalization of the telecommunications industry and massive restructuring driven by unbundling rush. However, systematic researches on BT remain at an infant stage. This study starts with structure analysis of the Internet industry, and discusses significance of Internet interconnection with respect to BT issues. We also describe the bandwidth commoditization trends and review technical requirements for effective Internet interconnection with BT capability. Taking a step further, this study explores the possibility of improving efficiency of network providers and increasing user convenience by developing an architectural prototype of Hub-&-Spoke interconnection model required to facilitate BT. The BT market provides an innovative base to ease rigidity of two-party contract and increase service efficiency. However, as fair, efficient operation by third party is required, this research finally proposes an exchanging hub named NIBX(New Internet Business eXchange).

  • PDF

Performance of an Interworking on the VLC (VLC에서 이동망간 연동성 성능분석)

  • Wang, Ye;Zhang, Xiao-Lei;Chen, Weiwei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.9-16
    • /
    • 2011
  • This paper represents an interworking architecture for keeping the VLC audio quality between Worldwide Interoperability for Microwave Access (WiMAX) and IEEE 802.11 Mobile Ad hoc Network (MANET) where both mobile routers and mobile nodes are moving dynamically. Systematic performance analysis on the interworking architecture has been conducted by using OPNET simulator to show the results such as Packet Delivery Ratio (PDR) and throughput. Based on simulation results, when the number of MANET nodes is small, PDR remains relatively stable even though data packets increase. However, with the many MANET nodes, PDR decreases as data traffic increases. Throughput is affected by the number of MANET nodes. Especially when the MANET node density has increased further, throughput is much higher, but it is not affected by the mobility speed. However, FTP download and upload response time is not affected much by both the number of MANET nodes and the mobility speed.

The Effect of Compressed Video Traffic over ABR on Satellite ATM Networks (위성 ATM 망에서 압축된 비디오 트래픽의 ABR 서비스에 미치는 영향)

  • 김성철;이상은
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1285-1294
    • /
    • 1999
  • In this paper we consider the performance of TCP video traffic over ABR with Long-Range Dependent VBR traffic. As compressed coded video traffics are increasing rapidly over Internet, lots of studies are being done for transmitting those traffics efficiently using limited network resources. We consider here the transmitting video service over ABR service in ATM networks, especially satellite networks. CBR or VBR services are suggested in transmitting the video traffic in ATM Forum TM 4.0. But ABR service connection, which is considered as appropriate service for data traffic, can be established with a small amount of bandwidth, MCR (Minimum cell rate). Furthermore ABR service can control the source's transmitting rate using feedback mechanism. Using this feature ABR service can be used in some applications which can control their quality of services corresponding to network loads. Compressed video sources with MPEG-2 are used for Long-Range Dependent VBR traffic here. We model the compressed video source to resemble the MPEG-2 transport streams. These compressed video traffic streams are consisted of three different frames, I-frame, P-frame, and B-frame. So when a network are overloaded, we can control the quality of service using this traffic features. TCP Traffics over ABR need large buffers in ATM switch to satisfy their QoS with background VBR traffics, which have high deviations in bandwidth. Furthermore satellite ATM networks with large feedback delay need large buffers corresponding RTT delay. The performance comparisons among EFCI and ER switch (ERICA+) switches in the network circumstances described above were shown in this paper. We also considered the case with ON-OFF VBR traffics.

  • PDF

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

A Proposal for Zoom-in/out View Streaming based on Object Information of Free Viewpoint Video

  • Seo, Minjae;Paik, Jong-Ho;Park, Gooman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.929-946
    • /
    • 2022
  • Free viewpoint video (FVV) service is an immersive media service that allows a user to watch it from a desired location or viewpoint. It is composed of various forms according to the direction of the viewpoint of the provided video, and includes zoom in/out in the service. As consumers' demand for active watching is increasing, the importance of FVV services is expected to grow gradually. However, additional considerations are needed to seamlessly stream FVV service. FVV includes a plurality of videos, video changes may occur frequently due to movement of the viewpoint. Frequent occurrence of video switching or re-request another video can cause service delay and it also can lower user's quality of service (QoS). In this case, we assumed that if a video showing an object that the user wants to watch is selected and provided, it is highly likely to meet the needs of the viewer. In particular, it is important to provide an object-oriented FVV service when zooming in. When video zooming in in the usual way, it cannot be guaranteed to zoom in around the object. Zoom function does not consider about video viewing. It only considers the viewing screen size and it crop the video view as fixed screen location. To solve this problem, we propose a zoom in/out method of object-centered dynamic adaptive streaming of FVV in this paper. Through the method proposed in this paper, users can enjoy the optimal video service because they are provided with the desired object-based video.

ATM망에서 프레임 릴레이망을 근간으로한 기업통신망의 수용기술

  • Jeong, Jung-Su;Nam, Taek-Yong;Jeong, Tae-Su
    • The Magazine of the IEIE
    • /
    • v.25 no.6
    • /
    • pp.69-78
    • /
    • 1998
  • 프레임 릴레이망을 백본으로 한 LAN과 LAN접속으로 형성되는 기업통신망이 현재 활발히 전개되면서 인터넷을 통한 광고, 전자거래가 중요한 서비스로 진행되고 있다. 국내의 프레임 릴레이 서비스 현황을 살펴보면 KT, 데이콤, 일부기업등에서 프레임 릴레이 교환기를 수입하여 주고객인 기업에 서비스를 제공하고 있다. 이들은 사용자 요구에 의해 주로 LAN과 LAN에 접속된 라우터 등의 종단 시스템간 PVC(영구가상회선: Permanant Virtual Circuit)접속을 통하여 다양한 서비스를 제공하면서 독자적인 기업통신체계를 구축하고 있는 실정이다. 이와같이 사용자 요구로 PVC등록시 프레임 릴레이망과 LAN을 연결하는 링크의 QoS(서비스 질: Quality of Service), 트래픽 파라메터는 수동적으로 설정된다. 현재 국내에서는 프레임 릴레이 교환기 개발은 전무하고 단지 그들을 수입하여 운용하는 수준이며 향후 ATM(비동기 전달모드: Asynchronous Transfer Mode)망의 중요 서비스 연동이 될 프레임 릴레이 기술은 심도있게 연구되고 있다. 향후 고속통신을 제공하는 백본망은 기존의 프레임 릴레이망과 ATM망이 공존할 추세이며 점진적으로 프레임 릴레이망은 사라질 것이다. 이때 ATM 망이 기존의 프레임 릴레이망을 백본으로 한 기업통신망 수용시 원할한 서비스 제공을 위해서는 프레임 릴레이망을 백본으로 채택한 기존의 기업통신망을 ATM망에서 수용시 야기되는 문제점의 제시와 이의 해결은 매우 중요하다고 생각된다. FR/ATM(Frame Relay/ATM)연동시 기업통신망 입장에서는 PVC뿐만 아니라 SVC(교환가상회선: Switched Virtual Circuit)호처리가 수용되어야 한다. 이와같이 PVC와 SVC 수용으로 기업통신망은 통신망의 구성 및 관리가 복잡, 다양해지며, 또 그 기업은 관련된 다양하고 수많은 고객과 접속될 수 있어야 한다. 이때 ATM망을 백본으로 한 공중망이 관련 기업의 사설 정보를 관리하도록 한다는 것은 그 서비스의 이용자에게 보안문제를 제기함은 물론 서비스 이용자가 자신의 망에서 동작하는 여러 서비스를 고객 스스로가 관리하는 것이 바람직하다. CNN(고객망관리 : Customer Network Management)은 이러한 고객에 의한 통신망, 공중망에 대한 부분적 관리 및 서비스에 대한 관리가 이루어 질수 있도록 수행하는 기능이다. 본 논문에서는 ATM망이나 프레임 릴레이망과 ATM 망이 공존시 기업통신망관점에서 야기되는 문제점의 제시와 이의 해결 방안을 살펴보았다. 우선 FR/ATM 연동에서 PVC설정뿐만 아니라 SVC 설정 방법의 연구, 이때 고려된 QoS,트래픽 처리과정을 살펴보았다. 또한 망관리 입장에서 기업통신망 관리자와 ATM망 관리자와의 온-라인 서비스를 제공하기 위해서는 변화된 통신망 차원서의 확장된 Managed Object(MO)를 근간으로한 체계적인 CNN-NMS(CNM-Network management System)연동을 살펴본후 결론에서는 추후 계속연구 및 조사 되어야 할 항목을 기업통신망 입장에서 서술하여 보았다.

  • PDF

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Big-Data Traffic Analysis for the Campus Network Resource Efficiency (학내 망 자원 효율화를 위한 빅 데이터 트래픽 분석)

  • An, Hyun-Min;Lee, Su-Kang;Sim, Kyu-Seok;Kim, Ik-Han;Jin, Seo-Hoon;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.541-550
    • /
    • 2015
  • The importance of efficient enterprise network management has been emphasized continuously because of the rapid utilization of Internet in a limited resource environment. For the efficient network management, the management policy that reflects the characteristics of a specific network extracted from long-term traffic analysis is essential. However, the long-term traffic data could not be handled in the past and there was only simple analysis with the shot-term traffic data. However, as the big data analytics platforms are developed, the long-term traffic data can be analyzed easily. Recently, enterprise network resource efficiency through the long-term traffic analysis is required. In this paper, we propose the methods of collecting, storing and managing the long-term enterprise traffic data. We define several classification categories, and propose a novel network resource efficiency through the multidirectional statistical analysis of classified long-term traffic. The proposed method adopted to the campus network for the evaluation. The analysis results shows that, for the efficient enterprise network management, the QoS policy must be adopted in different rules that is tuned by time, space, and the purpose.

A Multi-Attribute Intuitionistic Fuzzy Group Decision Method For Network Selection In Heterogeneous Wireless Networks Using TOPSIS

  • Prakash, Sanjeev;Patel, R.B.;Jain, V.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5229-5252
    • /
    • 2016
  • With proliferation of diverse network access technologies, users demands are also increasing and service providers are offering a Quality of Service (QoS) to satisfy their customers. In roaming, a mobile node (MN) traverses number of available networks in the heterogeneous wireless networks environment and a single operator is not capable to fulfill the demands of user. It is crucial task for MN for selecting a best network from the list of networks at any time anywhere. A MN undergoes a network selection situation frequently when it is becoming away from the home network. Multiple Attribute Group Decision (MAGD) method will be one of the best ways for selecting target network in heterogeneous wireless networks (4G). MAGD network selection process is predominantly dependent on two steps, i.e., attribute weight, decision maker's (DM's) weight and aggregation of opinion of DMs. This paper proposes Multi-Attribute Intuitionistic Fuzzy Group Decision Method (MAIFGDM) using TOPSIS for the selection of the suitable candidate network. It is scalable and is able to handle any number of networks with large set of attributes. This is a method of lower complexity and is useful for real time applications. It gives more accurate result because it uses Intuitionistic Fuzzy Sets (IFS) with an additional parameter intuitionistic fuzzy index or hesitant degree. MAIFGDM is simulated in MATLAB for its evaluation. A comparative study of MAIFDGM is also made with TOPSIS and Fuzzy-TOPSIS in respect to decision delay. It is observed that MAIFDGM have low values of decision time in comparison to TOPSIS and Fuzzy-TOPSIS methods.

A Dynamical Hybrid CAC Scheme and Its Performance Analysis for Mobile Cellular Network with Multi-Service

  • Li, Jiping;Wu, Shixun;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1522-1545
    • /
    • 2012
  • Call admission control (CAC) plays an important role in mobile cellular network to guarantee the quality of service (QoS). In this paper, a dynamic hybrid CAC scheme with integrated cutoff priority and handoff queue for mobile cellular network is proposed and some performance metrics are derived. The unique characteristic of the proposed CAC scheme is that it can support any number of service types and that the cutoff thresholds for handoff calls are dynamically adjusted according to the number of service types and service priority index. Moreover, timeouts of handoff calls in queues are also considered in our scheme. By modeling the proposed CAC scheme with a one-dimensional Markov chain (1DMC), some performance metrics are derived, which include new call blocking probability ($P_{nb}$), forced termination probability (PF), average queue length, average waiting time in queue, offered traffic utilization, wireless channel utilization and system performance which is defined as the ratio of channel utilization to Grade of Service (GoS) cost function. In order to validate the correctness of the derived analytical performance metrics, simulation is performed. It is shown that simulation results match closely with the derived analytic results in terms of $P_{nb}$ and PF. And then, to show the advantage of 1DMC modeling for the performance analysis of our proposed CAC scheme, the computing complexity of multi-dimensional Markov chain (MDMC) modeling in performance analysis is analyzed in detail. It is indicated that state-space cardinality, which reflects the computing complexity of MDMC, increases exponentially with the number of service types and total channels in a cell. However, the state-space cardinality of our 1DMC model for performance analysis is unrelated to the number of service types and is determined by total number of channels and queue capacity of the highest priority service in a cell. At last, the performance comparison between our CAC scheme and Mahmoud ASH's scheme is carried out. The results show that our CAC scheme performs well to some extend.