• Title/Summary/Keyword: 트래픽 비용

Search Result 295, Processing Time 0.023 seconds

Traffic Prediction based Multi-Stage Virtual Topology Reconfiguration Policy in Multi-wavelength Routed Optical Networks (다중 파장 광 네트워크 상에서 트래픽 예상 기법 기반 다단계 가상망 재구성 정책)

  • Lin Zhang;Lee, Kyung-hee;Youn, Chan-Hyun;Shim, Eun-Bo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.729-740
    • /
    • 2002
  • This paper studies the issues arising in the virtual topology reconfiguration phase of Multi-wavelength Routed Optical Networks. This reconfiguration process means to change the virtual topology in response to the changing traffic patterns in the higher layer. We formulate the optimal reconfiguration policy as a multi-stage decision-making problem to maximize the expected reward and cost function over an infinite horizon. Then we propose a new heuristic algorithm based on node-exchange to reconfigure the virtual topology to meet the traffic requirement. To counter the continual approximation problem brought by heuristic approach, we take the traffic prediction into consideration. We further propose a new heuristic reconfiguration algorithm called Prediction based Multi-stage Reconfiguration approach to realize the optimal reconfiguration policy based on predicted traffic. Simulation results show that our reconfiguration policy significantly outperforms the conventional one, while the required physical resources are limited.

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

A Cost-effective SFC Monitoring Approach with Minimum Agent Deployment (최소한의 에이전트 배치를 통한 비용 효율적인 SFC 모니터링 방식)

  • Lee, Jisoo;Yeoum, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.122-125
    • /
    • 2018
  • 최근 다양한 네트워크 서비스에 대한 수요가 증가함에 따라 Service Function (SF)의 동적 구성을 위한 유연한 모델이 요구된다. Service Function Chaining (SFC)은 일련의 SF로 구성된 새로운 네트워크 서비스 배포 모델을 정의한다. Software Defined Networking (SDN)은 제어 평면을 중앙 집중화함으로써 네트워크 트래픽 제어를 단순화하여 SFC동작에 중요한 역할을 한다. SDN 기반 SFC(SD_SFC)는 SF 장애를 감지하기 위한 모니터링 시스템이 필요하다. 그러나 기존의 모니터링 방식은 모든 SF에 Monitoring Agent(MA)를 배치하기 때문에 높은 시그널링 비용을 가진다. 본 논문에서는 최소한의 SF에 MA를 배치함으로써 시그널링 비용을 줄이는 SFC모니터링 방식을 제안한다. 제안하는 SF selection 알고리즘은 최적화된 SF 집합을 사용하여 오버로드된 SF를 반환하여 MA를 배치한다. 우리는 제안 시스템의 효율성을 평가하기 위해 테스트베드 구현을 통해 실험하였다. 실험 결과에 따르면 우리는 기존 방식에 비해서 시그널링 비용을 59.2% 절감하였다.

사물인터넷 기반의 스마트홈

  • Lee, Hak-Jun
    • Information and Communications Magazine
    • /
    • v.32 no.4
    • /
    • pp.44-49
    • /
    • 2015
  • 본고에서는 최근 사물인터넷시대를 맞이하여 센서와 컨트롤기술, 모바일 어플리케이션, 네트워크 트래픽, 빅데이터의 관리와 분석, 클라우드 컴퓨팅의 성장에 따라 새롭게 급성장하고 있는 스마트홈 분야를 중심으로 시장현황, 업체동향 및 기술동향을 분석하고자 한다. 또한, 사용자에게 보다 안전하고, 편리하고, 쾌적하고, 비용 절감이 되는 스마트홈 서비스 및 솔루션에 대하여 알아보기로 한다.

A Location Management Scheme Using Gateway in PCN (PCN에서 VLR 게이트웨이를 이용한 위치관리 기법)

  • 박남식;유영철;남궁한;진성일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1444-1455
    • /
    • 1999
  • In the standard location strategy such as IS-41 and GSM, Home Location Register(HLR) and Visitor Location Register(VLR) databases are used to manage the location of mobile terminals. The primary goal that location management schemes investigate is to reduce the cost of database access and the traffic for signaling network. When mobile terminals move frequently, one of problems in the standard location management scheme is that HLR database is highly updated and the traffic in signaling network can be occurred significantly due to high message transfer rate between HRL and VLR. As a solution to these problems, this paper proposes the location management scheme using VLR Gateway(VG) to reduce the both traffics of HLR update and signaling network which are resulted from location registration requirements of mobile terminals whenever they cross their registration area boundary. VG is a kind of database that is placed between HLR and VLR. It integrates one or more registration area defined in a system into one group and plays a role on behalf of HLR in a integrated registration scope so that the call delivery and the movement of mobile terminals are possible without HLR access in the scope. In order to evaluate performance of IS-41 and proposed scheme, we simulate two schemes based on wide range of call to mobility ratio. Its experiment result shows that in the proposed scheme total database cost increased slightly whereas HLR and signaling traffic decreased remarkably.

  • PDF

An Algorithm for Design of a Multiple Ring Network Using ROADM in WDM Mesh Networks (WDM Mesh 네트워크에서 ROADM을 이용한 멀티플-링 네트워크 설계 방안)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lim, Tae-Hyung;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.663-672
    • /
    • 2007
  • This paper proposes an algorithm for design of a multiple ring network that can be applied to an arbitrary topology in the WDM optical transport networks. Especially, we suggest an integer linear program(ILP) formulation with the objective of minimizing the total cost of nodes based on the reconfigurable OADM(ROADM) architecture and propose a heuristic algorithm to reduce computational complexity of the exact problem formulation. To evaluate the performance and validity of this scheme, we applied it to an NSFnet topology assuming the dynamic or static traffic condition and compared it with a mesh methodology about capacity of connection requests and the total cost of the nodes.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Two Phase Heuristic Algorithm for Mean Delay constrained Capacitated Minimum Spanning Tree Problem (평균 지연 시간과 트래픽 용량이 제한되는 스패닝 트리 문제의 2단계 휴리스틱 알고리즘)

  • Lee, Yong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.367-376
    • /
    • 2003
  • This study deals with the DCMST (Delay constrained Capacitated Minimum Spanning Tree) problem applied in the topological design of local networks or finding several communication paths from root node. While the traditional CMST problem has only the traffic capacity constraint served by a port of root node, the DCMST problem has the additional mean delay constraint of network. The DCMST problem consists of finding a set of spanning trees to link end-nodes to the root node satisfying the traffic requirements at end-nodes and the required mean delay of network. The objective function of problem is to minimize the total link cost. This paper presents two-phased heuristic algorithm, which consists of node exchange, and node shift algorithm based on the trade-off criterions, and mean delay algorithm. Actual computational experience and performance analysis show that the proposed algorithm can produce better solution than the existing algorithm for the CMST problem to consider the mean delay constraint in terms of cost.

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.