• Title/Summary/Keyword: 주기적 트래픽

Search Result 166, Processing Time 0.022 seconds

A Data-Centric Clustering Algorithm for Reducing Network Traffic in Wireless Sensor Networks (무선 센서 네트워크에서 네트워크 트래픽 감소를 위한 데이타 중심 클러스터링 알고리즘)

  • Yeo, Myung-Ho;Lee, Mi-Sook;Park, Jong-Guk;Lee, Seok-Jae;Yoo, Jae-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.139-148
    • /
    • 2008
  • Many types of sensor data exhibit strong correlation in both space and time. Suppression, both temporal and spatial, provides opportunities for reducing the energy cost of sensor data collection. Unfortunately, existing clustering algorithms are difficult to utilize the spatial or temporal opportunities, because they just organize clusters based on the distribution of sensor nodes or the network topology but not correlation of sensor data. In this paper, we propose a novel clustering algorithm with suppression techniques. To guarantee independent communication among clusters, we allocate multiple channels based on sensor data. Also, we propose a spatio-temporal suppression technique to reduce the network traffic. In order to show the superiority of our clustering algorithm, we compare it with the existing suppression algorithms in terms of the lifetime of the sensor network and the site of data which have been collected in the base-station. As a result, our experimental results show that the size of data was reduced by $4{\sim}40%$, and whole network lifetime was prolonged by $20{\sim}30%$.

Systematic Transmission Method of Industrial IEEE 802.15.4 for Real-time Mixed Traffic (실시간 혼합 트래픽 전송을 위한 산업용 IEEE 802.15.4 망의 체계적 전송 기법)

  • Kim, Dong-Sung;Lee, Jung-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.18-26
    • /
    • 2008
  • In this paper, dynamic GTS scheduling method based on IEEE 802.15.4 is proposed for wireless control system considering reliability and real-time property. The proposed methods can guarantee a transmission of real-time periodic and sporadic data within the limited time frame in factory environment. The superframe of IEEE 802.15.4 is used for the dynamic transmission method of real-time mixed traffic (periodic data, sporadic data, and non real-time message). By separating CFP and CAP properly, the periodic, sporadic, and non real-time messages are transmitted effectively and guarantee real-time transmission within a deadline. The simulation results show the improvement of real-time performance of periodic and sporadic data at the same time.

A Study on OSPF for Active Routing in Wireless Tactical Communication Network (전술통신망에서 능동적 라우팅을 위한 OSPF에 대한 연구)

  • Lee, Seung-Hwan;Lee, Jong-Heon;Lee, Hoon-Seop;Rhee, Seung-Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1211-1218
    • /
    • 2010
  • OSPF is the optimized routing protocol in wired network and considered as a tactical routing protocol in wireless tactical communication network. However because it is designed basically based on wired environment, it runs inadequately in wireless tactical environment: noise and jamming signal. So, we proposed new OSPF cost function to develop active routing protocol in wireless tactical communication network. In redefined cost function, there are four parameters that are relative transmission speed, link weight, router utilization, link average BER(Bit Error Rate). These parameters reflect wireless tactical characters. Also, we remodel the option field in Hello packet. It can help user to periodically check the link state. From the simulation result, it is shown that proposed OSPF is better than OSPF in jamming situation and has accumulative delay gain with dispersion of traffic load in entire network.

An Update Triggering Policy To Improve QoS Routing Performance (QoS 라우팅에서 새로운 갱신 유발 정책에 따른 성능 개선에 관한 연구)

  • 김지혜;이미정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.357-359
    • /
    • 2000
  • 최근 들어 디지털(digital) 비디오나 오디오 같은 멀티미디어 응용 프로그램이 수요와 공급이 폭발적으로 늘어남에 따라, 이를 지원할 수 있는 새로운 프로토콜 아티텍쳐(architecture)들이 개발되고 있다. QoS(Quality-of-Service) 라우팅은 이러한 응용 프로그램들이 요구하는 QoS 요구사항을 기반으로 하는 라우팅(routing) 기법이다. QoS 라우팅은 네트워크의 동적인 상태를 반영하여 플로우(flow)가 요구하는 QoS를 만족시킬 수 있는 라우트를 찾아줌으로써 라우팅 성능을 향상시켰지만, 네트워크의 동적인 상태 정보를 모든 라우터가 가지고 있어야 함은 물론 적절한 시기에 네트워크 정보를 갱신시켜야만 한다. 이와 같이 네트워크 정보의 적절한 갱신 시기를 결정하는 것은 갱신 유발 정책이라 한다. 기존에는 라우팅 성능을 높이기 위해 네트워크 변화에 민감한 갱신 유발 정책을 사용하였으나, 이로 인해 발생하는 갱신 메시지는 또 하나의 트래픽(traffic)을 발생시켜 프로토콜 오버헤드(protocol overhead)를 초래하였다. 또한, 최근에는 이러한 프로토콜 오버헤드를 줄이기 위한 갱신 주기 정책이 제시되었지만 라우팅 성능 저하를 감수해야 하는 한계점이 발견되었다. 본 논문에서는 기존에 제시된 갱신 유발 정책에 비하여 프로토콜 오버헤드를 좀더 줄임과 동시에 라우팅 성능을 개선시킨 새로운 갱신 유발 정책을 제시하였다. 그리고, 이에 관한 시뮬레이션을 구현하여 프로토콜 오버헤드와 라우팅 성능을 비교한 결과, 기존 정책보다 더 효율적임을 발견하였다.

  • PDF

The Management Technology of Dynamic Server Clustering Using JMX (JMX를 이용한 동적 서버 클러스터링의 관리)

  • Chae, Hee-Sung;Youn, Su-Hyeoun;Song, Ha-Yoon;Kim, Han-Gyoo;Lee, Kee-Cheol;Park, Joong-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1309-1312
    • /
    • 2002
  • 인터넷 서비스 환경은 모바일 단말기들을 지원하는 비즈니스 및 서비스 환경으로 급변하고 있다. 이러한 변화에 따라 기존 유선 인터넷 뿐 아니라 모바일 환경의 서비스에서도 쉽게 사용할 수 있는 모바일 응용서버에 관한 연구가 필요하다. 서버 환경에서는 시스템 접근 요구가 많은 대규모 서비스를 위해 상시 가동을 기본적으로 필요로 하며, 큰 트래픽의 효과적인 분산을 통해 부하분산, 확장성, 가용성 등의 기능을 제공해 주기 위해서 클러스터링 기법을 이용한다. 이 논문에서는 클러스터링의 효과적인 관리를 위해 JMX(Java Management Extensions) 프레임웍을 이용하여 서버의 동적 클러스터링을 관리하는 새로운 기법을 제시한다.

  • PDF

Anomaly Detection System of Worm Using Randomness Check (랜덤성을 이용한 알려지지 않은 신종 웜에 대한 탐지 기법)

  • Park, Hyun-Do;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.133-135
    • /
    • 2005
  • 인터넷에서 일어나는 침해사고 중에서 웜에 의한 피해가 가장 심각하다. 2001 년 Code Red 웜의 출현과 2003 년 SQL Slammer 웜의 출현 이후로 웜에 감염된 이후에 행동 양상을 탐지하여 대응하는 것은 웜의 피해를 최소화 하기에는 역부족이다. 웜에 의해서 감염이 되기 이전에 웜을 탐지하여 조기에 대처하는 것이 무엇보다 중요하다. 또한 이미 알려져 있는 웜에 대한 행동양상을 이용한 웜의 탐지는 신종 웜의 출현 주기가 급격히 짧아지는 현실에 능동적으로 대처할 수 없다. 현재까지 발생한 인터넷 웜은 감염시킬 대상을 선택함에 있어서 랜덤 생성기를 사용하였으며 향후 나타날 웜도 빠른 확산과 자신의 위치를 드러내지 않기 위해 랜덤 스케닝 방식을 사용할 것이다. 본 연구는 네트워크의 연결들을 행렬로 표현하고, 이 행렬의 랭크(rank)값을 구하여 랜덤성 체크를 하는 방식으로, 웜으로 인한 트래픽에서 발생하는 랜덤성을 탐지할 수 있도록 하였다. 이 방법은 네트워크에서 알려지지 않은 신종 웜을 탐지하도록 하므로, 웜에의한 확산을 조기 탐지할 수 있게 하고, 더불어 웜의 피해를 최소화 하는 것을 목적으로 한다.

  • PDF

A Document Collection Method for More Accurate Search Engine (정확도 높은 검색 엔진을 위한 문서 수집 방법)

  • Ha, Eun-Yong;Gwon, Hui-Yong;Hwang, Ho-Yeong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.469-478
    • /
    • 2003
  • Internet information search engines using web robots visit servers conneted to the Internet periodically or non-periodically. They extract and classify data collected according to their own method and construct their database, which are the basis of web information search engines. There procedure are repeated very frequently on the Web. Many search engine sites operate this processing strategically to become popular interneet portal sites which provede users ways how to information on the web. Web search engine contacts to thousands of thousands web servers and maintains its existed databases and navigates to get data about newly connected web servers. But these jobs are decided and conducted by search engines. They run web robots to collect data from web servers without knowledge on the states of web servers. Each search engine issues lots of requests and receives responses from web servers. This is one cause to increase internet traffic on the web. If each web server notify web robots about summary on its public documents and then each web robot runs collecting operations using this summary to the corresponding documents on the web servers, the unnecessary internet traffic is eliminated and also the accuracy of data on search engines will become higher. And the processing overhead concerned with web related jobs on web servers and search engines will become lower. In this paper, a monitoring system on the web server is designed and implemented, which monitors states of documents on the web server and summarizes changes of modified documents and sends the summary information to web robots which want to get documents from the web server. And an efficient web robot on the web search engine is also designed and implemented, which uses the notified summary and gets corresponding documents from the web servers and extracts index and updates its databases.

Performance Evaluation of ISA100.11a Superframe Using Deadline Monotonic Scheduling (마감 단조 스케줄링을 사용한 ISA100.11a 슈퍼프레임 성능평가)

  • Saputra, Oka Danil;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1338-1345
    • /
    • 2014
  • Recently, wireless technology gains attention for industrial networks due to low cost, flexibility, relatively easy installation and most importantly, solving the rouring issue. ISA100.11a is one of promising standard for wireless industrial networks (WINs). Data traffic in industrial networks are known to be periodic and must satisfy the real-time property namely deadline. Therefore, in this paper, we proposed to apply deadline monotonic scheduling to periodic tasks in ISA100.11a networks and to evaluate the performance of ISA100.11a by checking the schedulability and beacon frame overhead. Simulation results showns, that our proposed scheme can reduces the network overhead while maintaining schedulability as compared to the previous algorithm. In addition, by reducing the network overhead, our proposed scheme can send more data without degrading the overall performance of WINs.

Performance Analysis of Multiple Access Protocol for Maritime VHF Data Exchange System (VDES) (해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구)

  • Yun, Changho;Cho, A-Ra;Kim, Seung-Geun;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2839-2846
    • /
    • 2014
  • New VHF band for use in VDE is determined by WRC-12 due to the overload of AIS VDL, and the system characteristics of the VDE is recommended as ITU-R M. 1842-1. CS-TDMA, a multiple access method of AIS class B, is recommended as that of the VDE. It is inefficient for CS-TDMA just applying the report interval used in AIS class B to transmit high speed data with higher payload in the aspect of efficiency. In this paper, a simulation is executed in order to determine adequate report interval according to the number of active ships that affects directly network traffic. To this end, the performance of CS-TDMA, which includes the number of received packets, reception success rate, channel utilization, and collision rate, is investigated via a simulation.

A Study of Password Management System for Improves the Availability and Efficiency (효율성과 가용성을 향상시킨 패스워드 관리시스템 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.150-153
    • /
    • 2013
  • By the development of IT, most business has been processed on the IT solution-based servers has increased Therefore, the importance of security of the server is highlighted. And the need for password management server efficient and safe is raised. There is a need to change at least 8 characters to mix the numbers and letters and password change passwords on a regular basis, you need a password for each system account is set in a different way, but the continuation of the system there is a tendency to password problems occur problems caused by the limits of the introduction of human resources and introduction basis occurs. The password management feature, though it is expensive is partially providing integrated access control solutions at home and abroad, there is a drawback that stresses the traffic on the server. Future, we conducted a study of password management solutions for the server of the server is determined IT transformation trend of non-IT field to accelerate, is continuously increasing it accordingly.

  • PDF