• Title/Summary/Keyword: 주기적 트래픽

Search Result 166, Processing Time 0.023 seconds

Traffic Performance Analysis using Asymmetry Wireless Link Network in Transmission Rate Controlled Channels (전송률 제어 채널에서 비대칭 무선 링크 네트워크를 이용한 트래픽 성능 분석)

  • Jeong, You-Sun;Youn, Young-Ji;Shin, Bo-Kyoung;Kim, Hye-Min;Park, Dong-Suk;Ra, Sang-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1434-1440
    • /
    • 2008
  • Performance of TCP/IP is studied on the wireless network using flow control and congestion control mechanism based on transmission rate. We discuss the elimination or the reduction of various phenomena of burst by flow controlling on transmission rate and verify that there are TCP ACK compression promblems on the queue by burst reaction while executing transmission rate controlled channels. Analyzing periodic burst reaction on the queue of source IP, the maximum value of queue is expected, which represents the applible expectation of throughput reduce and shows the improvement of performance by the reduce of throughput due to hi-directional traffic.

Application Study of FQ-CoDel Algorithm based on QoS-guaranteed Class in Tactical Network (전술환경에서 QoS 보장을 위한 클래스 기반 FQ-Codel 알고리즘 적용 연구)

  • Park, Juman
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.53-58
    • /
    • 2019
  • This paper proposes a class-based FQ-CoDel(Flow Queue-Control Delay) algorithm. A variety of application system services create bottlenecks in tactical communication network and the bottlenecks cause some problems such as traffic loss and delay. Therefore, more research on effective traffic processing is needed. The proposed class-based FQ-CoDel algorithm, suggests dynamic buffer management and scheduling, classifies specific packets in each queue according to service attribute and criticality and checks periodically latency of the packets in each queue. Also, it abandons the packets if some packets stay in queue above schedule time and manages the total amount of traffic stored in queue with certain level.

A Comparative Study of Consumer's Hype Cycles Using Web Search Traffic of Naver and Google (웹 검색트래픽을 활용한 소비자의 기대주기 비교 연구: 네이버와 구글 검색을 중심으로)

  • Jun, Seung-Pyo;Kim, You Eil;Yoo, Hyoung Sun
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.4
    • /
    • pp.1109-1133
    • /
    • 2013
  • In an effort to discover new technologies and to forecast social changes of technologies, a number of technology life-cycle models have been developed and employed. The hype cycle, a graphical tool developed by a consulting firm, Gartner, is one of the most widely used models for the purpose and it is recognised as a practical one. However, more research is needed on theoretical frames, relations and empirical practices of the model. In this study, hype cycle comparisons in Korean and global search websites were performed by means of web-search traffic which is proposed as an empirical measurement of public expectation, analysed in a specific product or country in previous researches. First, search traffic and market share for new cars were compared in Korea and the U.S. with a view to identifying differences between the hype cycles in the two countries about the same product. The results show the similarity between the two countries with the statistical significance. Next, comparative analysis between search traffic and supply rate for several products in Korea was conducted to check out their patterns. According to the analysis, all the products seem to be at the "Peak of inflated expectations" in the hype cycles and they are similar to one another in the hype cycle. This study is of significance in aspects of expanding the scope of hype cycle analysis with web-search traffic because it introduced domestic web-search traffic analysis from Naver to analyse consumers' expectations in Korea by comparison with that from Google in other countries. In addition, this research can help to explain social phenomina more persuasively with search traffic and to give scientific objectivity to the hype cycle model. Furthermore, it can contribute to developing strategies of companies, such as marketing strategy.

  • PDF

An Enhanced LPI Control Mechanism in Energy Efficient Ethernet (에너지 효율적인 이더넷에서 개선된 LPI 제어 메커니즘)

  • Lee, Sung-Keun;Jang, Yong-Jae;Yoo, Nam-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.983-989
    • /
    • 2012
  • IEEE 802.3az LPI mechanism allows an Ethernet link to reduce power consumption by entering a low-power sleeping mode and letting some components being powered off when there is no data to be transmitted through the link. However, if small amount of packets are being sent periodically, such a mechanism can not obtain energy efficiency due to a high overhead caused by excessive mode transitions. In this paper, we propose an enhanced LPI mechanism which can perform state transition adaptively based on the traffic characteristics on transport layer and network status. This simulation result shows that proposed mechanism improves energy efficiency than LPI mechanism with respect to energy consumption rate for various traffic loads.

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

Evaluation on Effect of Message Overhead for Implementing a Scalable RSVP-TE Protocol in MPLS Networks (MPLS 망에서 확장성을 갖는 RSVP-TE 프로토콜 구현을 위한 메시지 부하의 영향 분석)

  • Lee Young-Woo;Park Jaehyung;Kim Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.815-820
    • /
    • 2004
  • For providing high quality-guaranteed service over Internet, traffic engineering based on an MPLS technology is being introduced. MPLS traffic engineering performs the computation on the path guaranteeing service`s quality and the reservation on network resources by an MPLS signaling protocol. As one of MPLS signaling protocol, RSVP-TE protocol transmits and receives periodic refresh messages for maintaining the path of a traffic flow. Such characteristic gives a heavy processing overhead to routers for maintaining states of large number of paths. In this paper, we propose a scalable implementation approach for RSVP-TE without dramatically increasing processing overhead. And we eval-uate the processing overhead on periodic messages by implementing the RSVP-TE protocol and the reduction mechanism of periodic messages.

An Adaptive Chord for Minimizing Network Traffic in a Mobile P2P Environment (모바일 P2P 환경에서 네트워크 트래픽을 최소화한 적응적인 Chord)

  • Yoon, Young-Hyo;Kwak, Hu-Keun;Kim, Cheong-Ghil;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.761-772
    • /
    • 2009
  • A DHT(Distributed Hash Table) based P2P is a method to overcome disadvantages of the existing unstructured P2P method. If a DHT algorithm is used, it can do a fast data search and maintain search efficiency independent of the number of peer. The peers in the DHT method send messages periodically to keep the routing table updated. In a mobile environment, the peers in the DHT method should send messages more frequently to keep the routing table updated and reduce the failure of a request. Therefore, this results in increase of network traffic. In our previous research, we proposed a method to reduce the update load of the routing table in the existing Chord by updating it in a reactive way, but the reactive method had a disadvantage to generate more traffic than the existing Chord if the number of requests per second becomes large. In this paper, we propose an adaptive method of routing table update to reduce the network traffic. In the proposed method, we apply different routing table update method according to the number of request message per second. If the number of request message per second is smaller than some threshold, we apply the reactive method. Otherwsie, we apply the existing Chord method. We perform experiments using Chord simulator (I3) made by UC Berkeley. The experimental results show the performance improvement of the proposed method compared to the existing methods.

Performance Evaluation of Priority Scheme of DMSA Protocol for Multimedia Traffic (멀티미디어 트래픽에 대한 DMSA 프로토콜의 성능평가)

  • Ju, Gi-Ho;An, Seong-Ok
    • The Journal of Engineering Research
    • /
    • v.1 no.1
    • /
    • pp.41-48
    • /
    • 1997
  • In this paper, we wxtend DMSA system to support multimedia traffic more efficiently by incorporating a priority scheme. we divide network stations into two types: asynchronous and isosynchronous stations, and we give a priority to the isosynchronous stations over the asynchronous stations by imposing a time-out constraint on the asynchronous stations . we derive the maximum number of isosynchronous stations the proposed priority scheme can support simultaneously and the maximum bandwidth that can be utilized by asynchronous stations in the presence of isosynchronous traffic. We also provide simulation results for the mixed voice and data traffic, and compare them to the analytic results.

  • PDF

Design of An Effective Resource Allocation System in the Satellite Network using MF-TDMA DAMA Method (MF-TDMA DAMA 방식 위성 망에서 효율적인 자원할당 시스템 설계)

  • Heo, Jun;Choi, Yong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.85-93
    • /
    • 2012
  • In this paper, I designed the satellite system, using the MF-TDMA (Multi Frequency-Time Division Multiple Access) DAMA (Demand-Assigned Multiple Access) method, that allocates the satellite resources more effectively to prevent a large quantity data discard when Earth Terminals (ETs) request their satellite network resource to Network Controller (NC) by using their history information, such as traffic pattern or traffic class which have been receiving, and the network controller allocates the satellite network resource and send to earth terminals by using his history information that earth terminals have been requested already. The U.S. Military Warfighter Information Network-Tactical (WIN-T) community has selected the L-3 Linkabit MF-TDMA DAMA Network Centric Waveform (NCW) as the networking standard for full-mesh IP over SHF satellite communications. In the MF-TDMA DAMA satellite network, network controller allocates the satellite network resources and enables maximum 255 earth terminals to communicate each other for periodic satellite network resource requests of earth terminals.

An Enhanced Adaptive Power Control Mechanism for Small Ethernet Switch (소규모 이더넷 스위치에서 개선된 적응적 전력 제어 메커니즘)

  • Kim, Young-Hyeon;Lee, Sung-Keun;Koh, Jin-Gwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.389-395
    • /
    • 2013
  • Ethernet is the most widely deployed access network protocol around the world. IEEE 802.3az WG released the EEE standard based on LPI mode to improve the energy efficiency of Ethernet. This paper proposes improved adaptive power control mechanism that can enhance energy-efficiency based on EEE from small Ethernet switch. The feature of this mechanism is that it predicts the traffic characteristic of next cycle by measuring the amount of traffic flowing in during certain period and adjusts the optimal threshold value to relevant traffic load. Performance evaluation results indicate that the proposed mechanism improves overall performance compared to traditional mechanism, since it significantly reduces energy consumption rate, even though average packet delay increases a little bit.