• Title/Summary/Keyword: 트래픽분석

Search Result 1,975, Processing Time 0.025 seconds

Performance Analysis of Differential Service Model using Feedback Control (피드백제어를 이용한 차등 서비스 모델의 성능 분석)

  • 백운송;양기원;최영진;김동일;오창석
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.51-59
    • /
    • 2001
  • In order to support various QoS, IETF has proposed the Differentiated Services Model which provides discrimination service according to t the user’s requirements and payment intention intention for each traffic characteristic. This model is an excellent mechanism, which is not too c complicated in terms of the management for service and network model. Also, it has scalability that satisfies the requirement of Differentiated Services. In this paper, We define the Differentiated Services Model using feedback control, propose its control procedure, and analyze its p performance. In conventional model, non-adaptive traffic, such as UDP traffic, is more occupied the network resource than adaptive traffic, such a as TCP traffic. On the other hand, the Differentiated Services Model using feedback control fairly utlizes the network resources and even p prevents congestion occurrence due to its ability of congestion expectation.

  • PDF

Adaptive Input Traffic Prediction Scheme for Proportional Delay Differentiation in Next-Generation Networks (차세대 네트워크에서 상대적 지연 차별화를 위한 적응형 입력 트래픽 예측 방식)

  • Paik, Jung-Hoon
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.17-25
    • /
    • 2007
  • In this paper, an algorithm that provisions proportional differentiation of packet delays is proposed with an objective for enhancing quality of service (QoS) in future packet networks. It features an adaptive scheme that adjusts the target delay every time slot to compensate the deviation from the target delay which is caused by the prediction error on the traffic to be arrived in the next time slot. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot. The difference between them is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the exponential rate traffic. It is demonstrated through simulations that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional non-adaptive mechanism. The algorithm is implemented with VHDL on a Xilinx Spartan XC3S1500 FPGA and the performance is verified under the test board based on the XPC860P CPU.

  • PDF

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

Analysis of Network Traffic with Urban Area Characteristics for Mobile Network Traffic Model (이동통신 네트워크 트래픽 모델을 위한 도시 지역 이동통신 트래픽 특성 분석)

  • Yoon, Young-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.471-478
    • /
    • 2003
  • Traditionally,, analysis, simulation and measurement have all been used to evaluate the performance of network protocols and functional entities that support mobile wireless service. Simulation methods are useful for testing the complex systems which have the very complicate interactions between components. To develop a mobile call simulator which is used to examine, validate, and predict the performance of mobile wireless call procedures must have the teletraffic model, which is to describe the mobile communication environments. Mobile teletraffic model is consists of 2 sub-models, traffic source and network traffic model. In this paper, we analyzed the network traffic data which are gathered from selected Base Stations (BSs) to define the mobile teletraffic model. We defined 4 types of cell location-Residential, Commercial, Industrial, and Afforest zone. We selected some Base Stations (BSs) which are represented cell location types in Seoul city, and gathered real data from them And then, we present the call rate per hour, cail distribution pattern per day, busy hours, loose hours, the maximum number of call, and the minimum number of calls based on defined cell location types. Those parameters are very important to test the mobile communication system´s performance and reliability and are very useful for defining the mobile network traffic model or for working the existed mobile simulation programs as input parameters.

Tracking the Source of Cascading Cyber Attack Traffic Using Network Traffic Analysis (네트워크 트래픽 분석을 이용한 연쇄적 사이버공격 트래픽의 발생원 추적 방법)

  • Goo, Young-Hoon;Choi, Sun-Oh;Lee, Su-Kang;Kim, Sung-Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1771-1779
    • /
    • 2016
  • In these days, the world is getting connected to the internet like a sophisticated net, such an environment gives a suitable environment for cyber attackers, so-called cyber-terrorists. As a result, a number of cyber attacks has significantly increased and researches to find cyber attack traffics in the field of network monitoring has also been proceeding. But cyber attack traffics have been appearing in new forms in every attack making it harder to monitor. This paper suggests a method of tracking down cyber attack traffic sources by defining relational information flow of traffic data from highest cascaded and grouped relational flow. The result of applying this cyber attack source tracking method to real cyber attack traffic, was found to be reliable with quality results.

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

A Study on Performance Analysis of Short Term Internet Traffic Forecasting Models (단기 측정 인터넷 트래픽 예측을 위한 모형 성능 비교 연구)

  • Ha, M.H.;Son, H.G.;Kim, S.
    • Communications for Statistical Applications and Methods
    • /
    • v.19 no.3
    • /
    • pp.415-422
    • /
    • 2012
  • In this paper, we first the compare the performance of Holt-Winters, FSARIMA, AR-GARCH and Seasonal AR-GARCH models with in the short term based data. The results of the compared data show that the Holt-Winters model outperformed other models in terms of forecasting accuracy.

OnExpo HOT&COOL / HOT COMPANY 스콥정보통신

  • O, Suk-Hyeon
    • Digital Contents
    • /
    • no.12 s.127
    • /
    • pp.76-77
    • /
    • 2003
  • 최근 생활과 비즈니스가 IT인프라에 의존하는 경향이 갈수록 증가함에 따라 IT인프라 관리의 성공 여부는 조직 전체의 업무 효율은 물론 비즈니스의 흥망을 좌우하는 주요시안으로 등장했다.네트워크 트래픽은 사람의 혈관을 흐르는 피와 같아 한곳에 몰리거나 폭주하게 되면 전체 네트워크에 치명적인 장애를 일으키고 나아가 비즈니스 퍼포먼스 저하를 초래하게 된다. 따라서 전산관리자가 트래픽을 과학적으로 분석, 진단해 적극적인 제어를 할 수 있는 필요성이 날이 갈수록 부각되고 있다.국내 최초 네트워크 트래픽 관리 솔루션 개발 범세계적으로 트래픽 관리 솔루션 시장이 인식되기도 전인 1998년 12월, 이미 인터넷 비즈니스에 꼭 필요한 핵심 엔진을 개발한 기업이 있다. TOP/IP 기반의 네트워크를 효율적으로 제어 및 관리 할 수 있는 다양한 제품을 출시, 트래픽 관리 분야에서 세계적인 기술력을 선보인 전문 IT 기업 스콥정보통신(대표 김찬우)이 바로 그 주인공이다.

  • PDF

Time Series Models for Performance Evaluation of Network Traffic Forecasting (시계열 모형을 이용한 통신망 트래픽 예측 기법연구)

  • Kim, S.
    • The Korean Journal of Applied Statistics
    • /
    • v.20 no.2
    • /
    • pp.219-227
    • /
    • 2007
  • The time series models have been used to analyze and predict the network traffic. In this paper, we compare the performance of the time series models for prediction of network traffic. The feasibility study showed that a class of nonlinear time series models can be outperformed than the linear time series models to predict the network traffic.

Requirements Analysis of a TestBed for Mobile Data Networks Security Threats Response System verification (이동통신 데이터망 보안위협 대응 시스템 검증을 위한 테스트베드 요구사항 분석)

  • Kim, Sung-Ho;Lee, Kevin;Im, Chea-Teae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.337-339
    • /
    • 2012
  • 스마트폰 사용자의 증가와 함께 이동통신망의 데이터 트래픽이 폭증하고 있다. 유입되는 트래픽 중 비정상적, 악의적인 트래픽이 발생하고 있지만, 이동통신 데이터망의 보안 시스템은 미비한 실정이다. 이 논문에서는 이동통신 데이터망으로 유입되는 악의적인 트래픽 및 비정상 트래픽에 대응하기 위하여 이동통신 데이터망의 구성과 발생 가능한 위협을 정리하였다. 그리고 대응 시스템을 마련하기 위해 필요한 테스트베드가 갖춰야 할 요구사항을 정리하였다. 이 요구사항을 준수하여 테스트베드를 구축하면 이동통신 데이터망의 위협에 대응하는 시스템의 설계 및 실험에 많은 도움을 줄 수 있을 것이다.