• Title/Summary/Keyword: 트래픽분석

Search Result 1,975, Processing Time 0.025 seconds

Performance Analysis of a Dynamic Bandwidth Allocation Scheme for improving the delay of the real time traffic in an EPON (EPON에서 실시간 트래픽의 지연성능 향상을 위한 동적 대역할당방안의 성능분석)

  • Park, Chul-Geun;Lee, Yu-Tae;Chung, Hae;You, Geon-Il;Kim, Jong-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11B
    • /
    • pp.1023-1030
    • /
    • 2003
  • In this paper, we deal with an effective dynamic bandwidth allocation(DBA) scheme in order to support the qualify of services (QoS) in the customer access network which supports various applications with own service requirements. we discuss the DBA scheme for upstream traffic in the EPON which support both the delay sensitive traffic such as voice and real-time video and non-real time traffic such as data and BE. We propose the new DBA scheme which guarantee the delay performance of the real time traffic and utilize the upstream bandwidth effectively in the limited resource environment. We analize the delay performance of the proposed scheme by simulation.

Queuing Analysis of IEEE 802.15.4 GTS Scheme for Bursty Traffic (Bursty Traffic을 위한 IEEE 802.15.4 GTS 기법의 대기 해석)

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.87-91
    • /
    • 2010
  • The IEEE 802.15.4 and IEEE 802.15.7 standard are the typical of low rate wireless and Visible Light Wireless personal area networks. Its Medium Access Control protocol can support the QoS traffic flows for real-time application through guaranteed time slots (GTS) in beacon mode. However, how to achieve a best allocation scheme is not solved clearly. The current analytical models of IEEE 802.15.4 MAC reported in the literature have been mainly developed under the assumption of saturated traffic or non-bursty unsaturated traffic conditions. These assumptions don't capture the characteristics of bursty multimedia traffic. In this paper, we propose a new analytical model for GTS allocation with burst Markov modulated ON-OFF arrival traffic.

Development of the Wireless Sensor S/W for Wireless Traffic Intrusion Detection/Protection on a Campus N/W (캠퍼스 망에서의 무선 트래픽 침입 탐지/차단을 위한 Wireless Sensor S/W 개발)

  • Choi, Chang-Won;Lee, Hyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.211-219
    • /
    • 2006
  • As the wireless network is popular and expanded, it is necessary to development the IDS(Intrusion Detection System)/Filtering System from the malicious wireless traffic. We propose the W-Sensor SW which detects the malicious wireless traffic and the W-TMS system which filters the malicious traffic by W-Sensor log in this paper. It is efficient to detect the malicious traffic and adaptive to change the security rules rapidly by the proposed W-Sensor SW. The designed W-Sensor by installing on a notebook supports the mobility of IDS in compare with the existed AP based Sensor.

  • PDF

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

A Study of Protocol comparison Analysis for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 프로토콜 비교 분석에 관한 연구)

  • Ha Yun-sik;Kim Dong-il;Choi Sam-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.772-776
    • /
    • 2005
  • To support abruptly increasing data traffic in these days, network management is needed. And also to maintain the steady infra, there is MPLS need which can support traffic engineering. It's necessary that MPLS doesn't only manage network to support recently booming data traffic, but has capacity to support traffic engineering to keep static infrastructure. Traffic engineering, method that a large-scale user shifts traffic to the beforehand designated routes that pass through specific nodes on network, is operation that is mapping traffic flow to the physical network topology. In this paper, we supplement the defect of the traditional RSVP traffic engineering and to construct far more steady infra, we suggest the way of its development of ERSVP signaling protocol.

Traffic Generation Method of Sampled Values for Smart Grid (스마트 그리드를 위한 샘플 값들의 트래픽 발생 방안)

  • Hwang, Sung-Ho;Park, Kyung-Won;Park, Jeong-Do;Song, Han-Chun;Park, Jae-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.225-230
    • /
    • 2015
  • This study presents a method for generating IEC 61850 Sampled Values(SV) traffic by combining the emulation function of network simulator ns-3 with the actual communication equipment. For the SV traffic generation and reception, the emulation function of the network simulator ns-3 is used, while as a communication network, the actual communication equipment, switches are used. In addition, the SV traffic frames generated are analyzed, using Wireshark, and it is confirmed that the SV traffic frames are generated accurately. The method for the SV traffic generation proposed in the present study will be very useful when various SV traffics are generated under the environment of an actual substation.

A Marking Algorithm for QoS Provisioning in WMSN (WMSN에서 QoS 보장을 위한 마킹 알고리즘)

  • Kim, Jeonghue;Lee, Sungkeun;Koh, Jingwang;Jung, Changryul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.2
    • /
    • pp.193-204
    • /
    • 2010
  • Since Wireless Multimedia Sensor Network(WMSN) needs to process various multimedia data such as audio, image and video data as well as scalar data, it requires a mechanism that can support Quality of Service(QoS) to handle efficiently. This paper classifies traffic in WMSN as periodic monitoring traffic, event traffic, multimedia traffic and query-based traffic, proposes marking algorithm and queue management mechanism that guarantee differentiated QoS in terms of delay, energy efficiency and credibility on each traffic and conduct performance analysis with simulation.

A Study of Protocol comparison Analysis for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 프로토콜 비교 분석에 관한 연구)

  • Ha, Yun-Sik;Kim, Dong-Il;Choi, Sam-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.105-108
    • /
    • 2005
  • To support abruptly increasing data traffic in these days. network management is needed. And also to maintain the steady infra, there is MPLS need which can support traffic engineering. It's necessary that MPLS doesn't only manage network to support recently booming data traffic, but has capacity to support traffic engineering to keep static infrastructure. Traffic engineering, method that a large-scale user shifts traffic to the beforehand designated routes that pass through specific nodes on network, is operation that is mapping traffic flow to the physical network topology. In this paper, we supplement the defect of the traditional RSVP traffic engineering and to construct far more steady infra, we suggest the way of its development of ERSVP signaling protocol.

  • PDF

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.