• Title/Summary/Keyword: 트래픽 측정

Search Result 384, Processing Time 0.024 seconds

A Study on the Usage Behavior of Public Library Website through an Analysis of Web Traffic (웹 트래픽 분석을 통한 공공도서관 웹사이트 이용행태에 관한 연구)

  • Kang, Munsil;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.189-212
    • /
    • 2021
  • The purpose of this study is to analyze an usage behavior for the public library website through web traffic. For this purpose, using Google Analytics and growth hacking technique, the data of A public library website log was analyzed for three months from August 1, 2021 to October 31, 2021. As a result of the study, the young age group of 18-24 years old and 25-34 years old recorded a high rate of new member registration, & it was found that the inflow rate through SNS was high for external inflows. As a result of analysis for the access rate by time, it was found that the time with the highest inflow rate was between 10 am and 11 am both on Wednesday and Friday. As a access channel, the access rate using mobile (64.90%) was quite high, but at the same time, the bounce rate (27.20%) was higher than the average (24.93%), & the rate of duration time (4 minutes 33 seconds) was lower than thee average (5 minutes 22 seconds). Finally, it was found that the utilization rate of reading program events and online book curation service, which the library focuses on producing and promoting, is very low. These research results can be used as basic data for future improvement of public library websites.

A Network Performance Analysis System based on Network Monitoring for Analyzing Abnormal Traffic (비정상 트래픽 분석을 위한 네트워크 모니터링 기반의 네트워크 성능 분석 시스템)

  • Kim, So-Hung;Koo, Ja-Hwan;Kim, Sung Hae;Choi, Jang-Won;An, Sung-Jin
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.1-8
    • /
    • 2004
  • Large distributed systems such as computational and data grids require that a substantial amount of monitoring data be collected for various tasks such as fault detection, performance analysis, performance tuning, performance prediction, security analysis and scheduling. to cope with this problem, they are needed network monitoring architecture which can collect various network characteristic and analyze network security state. In this paper, we suggest network performance and security analysis system based on network monitoring. The System suggest that users can see distance network state with tuning network parameters.

  • PDF

Performance Measurement of Residential Broadband Network with Monarch (Monarch를 이용한 주택내 초고속 인터넷망의 성능 측정)

  • Choi, Soon-Byoung;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.369-375
    • /
    • 2009
  • Residential broadband networks (RBN) are quickly evolving from xDSL/Cable networks to FTTH services with lOOMbps bandwidth. With the high-speed Internet services, subscribers tend to use web, multimedia, game or file sharing applications. Therefore, performance of RBN is important to the quality of services for users. Typically, Internet service providers (ISPs) are providing their RBN performance results that are measured by subscribers with the dedicated measurement tools. However, they do not make their results public to people. In order to obtain the performance results measured by users, we have to induce a lot of subscribers, which will take a lot of cost and time. Monarch, that is used in this paper, could provide the 3rd party measurement method without the help of ISPs and subscribers. With the extensive experiments through Monarch, we have shown that 3rd party measurement results are not much different from those of user-initiated measurement. In addition, we have observed that bandwidth is around $80{\sim}90Mbps$ and RTT is less than 30ms in FTTH services provided by three major Korean ISPs.

Experiments on An Network Processor-based Intrusion Detection (네트워크 프로세서 기반의 침입탐지 시스템 구현)

  • Kim, Hyeong-Ju;Kim, Ik-Kyun;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.319-326
    • /
    • 2004
  • To help network intrusion detection systems(NIDSs) keep up with the demands of today's networks, that we the increasing network throughput and amount of attacks, a radical new approach in hardware and software system architecture is required. In this paper, we propose a Network Processor(NP) based In-Line mode NIDS that supports the packet payload inspection detecting the malicious behaviors, as well as the packet filtering and the traffic metering. In particular, we separate the filtering and metering functions from the deep packet inspection function using two-level searching scheme, thus the complicated and time-consuming operation of the deep packet inspection function does not hinder or flop the basic operations of the In-line mode system. From a proto-type NP-based NIDS implemented at a PC platform with an x86 processor running Linux, two Gigabit Ethernet ports, and 2.5Gbps Agere PayloadPlus(APP) NP solution, the experiment results show that our proposed scheme can reliably filter and meter the full traffic of two gigabit ports at the first level even though it can inspect the packet payload up to 320 Mbps in real-time at the second level, which can be compared to the performance of general-purpose processor based Inspection. However, the simulation results show that the deep packet searching is also possible up to 2Gbps in wire speed when we adopt 10Gbps APP solution.

Design of Interrogator for Airspace Surveillance in Multilateration Systems (항공용 다변측정 감시시스템 적용을 위한 질문기 설계)

  • Koh, Young-Mok;Kim, Su-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.108-115
    • /
    • 2015
  • Multilateration systems are used to provide the position of aircraft in flight or on airport runways. In the multilateration systems, the interrogator is an important transmitter that used to interrogate the airplanes with appropriately scenario in surveillance airspace. Whisper-Shout interrogation sequence, which is one of the key functions of the interrogator, can control airport traffic density when intruder airplanes are coming into the surveillance airspace. Therefore collision chance between airplanes could be reduced and also get highly accurate location of incoming airplane in multilateration systems. In this paper, we developed the interrogator that allows it to transmit Mode A/C and Mode S interrogations which is similar to existing secondary surveillance radar. With appropriately controlled Whisper-Shout sequence in the interrogator, the multilateration systems can avoid synchronous garbling and FRUIT phenomenons caused by receiving multiple responses from a number of airplanes.

Measurement and Analysis of 433 MHz Radio Wave for Drone Operation (드론 운용을 위한 433 MHz 전파 측정 및 분석)

  • Seong-Real Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.209-213
    • /
    • 2023
  • Currently, 2.4 GHz and 5 GHz bands are used as frequencies for drone operation. In December 2019, the Ministry of Science and ICT newly allocated the 433 MHz band for the invisible long-distance operation of drones. However, since the 433 MHz band is the same as the previously allocated frequency band for amateur radio communication, interference cannot be avoided. Therefore, as a prerequisite for the development of a drone operation system based on the 433 MHz band, interference avoidance technology for this frequency band must be developed and applied. In this paper, we report the results of measurement and analysis of 433 MHz band signals necessary for the development of interference avoidance and reduction technologies for 433 MHz signals. The measurement and analysis of the 433 MHz band signal are performed through the spectrum measured at 5-minute intervals at three locations. Since the measurements and analyzes performed in this study considered spatial characteristics, temporal characteristics, and traffic characteristics, it is considered to be the basic data necessary for the development of interference avoidance technology in the 433 MHz band.

End-to-end Transmission Performance of VoIP Traffics based on Mobility Pattern over MANET with IDS (IDS가 있는 MANET에서 이동패턴에 기반한 VoIP 트래픽의 종단간 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.773-778
    • /
    • 2014
  • IDS(Intrusion Detection System) can be used as a countermeasure for blackhole attacks which cause degrade of transmission performance by causing of malicious intrusion to routing function of networks. In this paper, effects of IDS for transmission performance based on mobility patterns is analyzed for MANET(Mobile Ad-hoc Networks), a suggestion for effective countermeasure is considered. Computer simulation based on NS-2 is used in performance analysis, VoIP(Voice over Internet Protocol) as an application service is chosen for performance measure. MOS(Mean Opinion Score), call connection ratio and end-to-end delay is used as performance parameter.

Infrared Temperature Monitoring System based CAN for USN (USN를 위한 CAN 기반 적외선 온도감시 시스템)

  • Kim, Young-Dong;Oh, Guem-Kon;Jeong, Won-Tae;Kang, Won-Chan
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.3
    • /
    • pp.11-17
    • /
    • 2007
  • RWe have developed an infrared temperature monitoring system to measure the temperature of hot iron plate in very harsh environmental conditions as iron making equipment. We performed extensive field test for 3 months at the front side of iron plate rolling process of POSCO in Gwang-Yang. From the experimental test, we have confirmed the reliability of the developed system. We adjust the curve fit method to solve the non-linearity equations of A2TPMI sensor, and establish the under $1[^{\circ}C]$precision ratio and 25[msec] process speed each range. As experimental, we have confirmed the reliability of an infrared temperature monitoring system as POSCO test result and CAN network traffic monitoring of polling method.

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

Analysis of the Percentage Articulation and Voice Packet Loss over the Internet (인터넷상의 음성 패킷손실과 명료도 분석)

  • 고대식;박준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2090-2095
    • /
    • 1998
  • In this paper, we measured voice packet loss over the Korean Internet and analyzed percentage articulation by variation of the packet loss. To do this, we reviewed real-time transmission service based on RTP/UDP/IP and test method of the transmission quality. and implemented the real-time speech transmission system using GSM and UDP/IP. Monosyllable list has been chosen for the percentage articulation test, each voice packet has been coded and compressed by GSM and it has sequence number to measured packet loss and to recover out-of-order packets. In transmission results using seven router over the Korean Internet, we have show that loss rates reached 1.6% (unload), 22.5%(load) and loss rates after packet recovery by resequencing and FEC are from 9% to 35%. Finally, we have shown that percentage articulations by variation of the network traffic are Table 4.

  • PDF