• Title/Summary/Keyword: 트래픽 측정

Search Result 385, Processing Time 0.024 seconds

Effect of Energy Saving and Delay on Burst Assemble and Traffic Pattern in OBS Networks with Sleeping Mode (수면 모드를 사용하는 OBS 망에서 트래픽 패턴 및 버스트 어셈블이 에너지 절감과 지연시간에 미치는 영향 분석)

  • Kang, Dong-Ki;Yang, Won-Hyuk;Lee, Jae-Young;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.111-119
    • /
    • 2011
  • As Green-IT has attracted a lot of attention in recent years, many researches have been interested in reducing the energy consumption of network equipments. In this paper, we analyze the energy saving ratio and delay performance according to various traffic patterns and burst assemble algorithms in OBS network with sleeping mode. To do this, we design the traffic generators, which are based on exponential distribution and Pareto distribution, and the router model, which has the time based and length based burst assemble algorithms by using OPNET modeler. Through OPNET simulator, we evaluate the energy saving performance in terms of the sleeping time, the number of transitions and packet delay.

A Study on the World Wide Web Traffic Source Modeling with Self-Similarity (자기 유사성을 갖는 World Wide Web 트래픽 소스 모델링에 관한 연구)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.416-420
    • /
    • 2002
  • Traditional queueing analyses are very useful for designing a network's capacity and predicting there performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN and VBR traffic characteristics have indicated that the models used in the traditional Poisson assumption can't properly predict the real traffic properties due to under estimation of the long range dependence of network traffic and self-similarity In this parer self-similar characteristics over statistical approaches and real time network traffic measurements are estimated It is also shown that the self- similar traffic reflects network traffic characteristics by comparing source model.

Performance Analysis of an ATM Multiplexer Loaded by CBR and Bursty Traffic Sources (CBR과 버스티 트래픽원이 가해진 ATM 다중화기의 성능 분석)

  • 김승환;박진수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.4
    • /
    • pp.633-638
    • /
    • 1994
  • Asynchronous Transfer Model(ATM) has a fixed-length packet transport scheme. It is one of promising proposals in Broadband ISDN(B-ISDN). Since the packet length is fixed, it can be potentially to perform the various service to user. In this paper, a queueing model for an ATM Multiplexer loaded by the Continuous Bit Rate(CBR) traffic and the bursty traffic sources is analyzed. The queueing system has a finite buffer size. The cell loss probabilities with the simple and recurcive form for a performance measures of ATM multiplexer are derived, and are also evaluated through numerical examples. The results of this study may be used as guidelines in buffer design problems and performance analysis of ATM multiplexing system.

  • PDF

A Performance Analysis for Bandwidth Allocation Algorithm Using Available Bandwidth Information in ATM Networks (ATM 네트워크에서 가용 대역폭 정보를 이용한 대역폭 할당 알고리즘에 대한 성능분석)

  • 한상옥;박광채
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.89-96
    • /
    • 2000
  • ABR service is defined by ATM Forum and ITU for the efficient use of link bandwidth, and 2-pass service policing is proposed for this service. 2-pass service policing is effective by the real-time measurement of the used bandwidth, and this scheme obtains multiplexing gam and control efficiently ABR traffic as dynamically allocating rate by residual bandwidth information. In this study, we propose the real-time bandwidth prediction scheme for ABR traffic control, as using dynamic rate allocation by available bandwidth information. This study can obtain the simple hardware structure by means of as predicting available bandwidth by the total link bandwidth and the sum of transmission rate on the backlogged state connections.

  • PDF

Traffic Analysis Monitoring System for Web Server Load Balancing (웹서버의 부하균형을 위한 트래픽상황분석 모니터링 시스템)

  • Choi E-Jung;Lee Eun-Seok;Kim Seok-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.79-85
    • /
    • 2005
  • In order to handle client's requests while multiple servers seamlessly work in the web server cluster environment, it is vital to implement a router that execute a routing using TCP information and requested target content. The implemented package software measured packet volume that was generated from data generator, virtual server, and server 1, 2, 3, and could find out traffic distribution toward Server 1, 2, 3. As the result of the study shows, Round Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some partial cases, they were eventually alleviated by repeated tests for a longer time.

  • PDF

Behavior Based Signature Extraction Method for Internet Application Traffic Identification (인터넷 응용 트래픽 분석을 위한 행위기반 시그니쳐 추출 방법)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.368-376
    • /
    • 2013
  • The importance of application traffic identification is emphasized for the efficient network management with recent rapid development of internet. In this paper, we present the application traffic identification method using the behavior based signature to improve the previous limitations. The behavior based signature is made by combining the existing various traffic features, and uses the Inter-Flow unit that is combination of the first request packet of each flow. All signatures have 100% precision when measured the accuracy of 5 applications using at home and abroad to prove the feasibility of the proposed signature.

A Study on the World Wide Web Traffic Source Modeling with Self-Similarity (자기 유사성을 갖는 World Wide Web 트래픽 소스 모델링에 관한 연구)

  • 김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.104-107
    • /
    • 2002
  • Traditional queueing analyses are very useful for designing a network's capacity and predicting there performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN and VBR traffic characteristics have indicated that the models used in the traditional Poisson assumption can't properly predict the real traffic properties due to under estimation of the long range dependence of network traffic and self-similarity. In this paper self-similar characteristics over statistical approaches and real time network traffic measurements are estimated. It is also shown that the self-similar traffic reflects network traffic characteristics by comparing source model.

  • PDF

Capacity Analysis of Base Stations in CDMA Mobile Communications Systems in the Subway Environment (지하철 환경에서 CDMA 이동통신시스템의 기지국 용량 분석)

  • Yang, Won-Seok;Yang, Eun-Saem;Park, Hyun-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.789-794
    • /
    • 2011
  • We analyze the capacity of CDMA base stations in the subway environment. We investigate the characteristics of multipath fading, cell structures, and propagation environment in the subway, analyze signal to noise ratio, sectorization gain, path-loss exponent, frequency reuse factor, and obtain the link capacity of a base station in the subway. We measure the peakedness factor and reveal that base stations in the subway have peaked traffic. We use Neal-Wilkinson model to obtain the Erlang capacity instead of Erlang-B model based on Poisson traffic.

Implementation of Absolute Delay Differentiation Scheme in Next-Generation Networks (차세대 네트워크에서의 절대적 지연 차별화 기능 구현)

  • Paik, Jung-Hoon;Kim, Dae-Ub;Joo, Bheom-Soon
    • 전자공학회논문지 IE
    • /
    • v.45 no.1
    • /
    • pp.15-23
    • /
    • 2008
  • In this paper, an algorithm, that provisions absolute differentiation of packet delays is proposed, simulated, and implemented with VHDL on XPC 860 CPU based test board with an objective for enhancing quality of service (QoS) in future packet networks. It features a scheme that compensates the deviation for prediction on the traffic to be arrived continuously. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot and derives the difference between them. The deviation is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the exponential traffic. It is demonstrated through both simulation and the real traffic test on the board that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional non-adaptive mechanism.

GENESIS: An Automatic Signature-generating Method for Detecting Internet Disk P2P Application Traffic (GENESIS: Internet Disk P2P 트래픽 탐지를 위한 시그너춰 자동 생성 방안)

  • Lee, Byung-Joon;Yoon, Seung-Hyun;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.246-255
    • /
    • 2007
  • Due to the bandwidth-consuming characteristics of the heavy-hitter P2P applications, it has become critical to have the capability of pinpointing and mitigating P2P traffic. Traditional port-based classification scheme is no more adequate for this purpose because of newer P2P applications, which incorporating port-hopping techniques or disguising themselves as HTTP-based Internet disk services. Alternatively, packet filtering scheme based on payload signatures suggests more practical and accurate solution for this problem. Moreover, it can be easily deployed on existing IDSes. However, it is significantly difficult to maintain up-to-date signatures of P2P applications. Hence, the automatic signature generation method is essential and will be useful for successful signature-based traffic identification. In this paper, we suggest an automatic signature generation method for Internet disk P2P applications and provide an experimental results on CNU campus network.