• Title/Summary/Keyword: 트래픽 패턴

Search Result 208, Processing Time 0.031 seconds

Effect of Energy Saving and Delay on Burst Assemble and Traffic Pattern in OBS Networks with Sleeping Mode (수면 모드를 사용하는 OBS 망에서 트래픽 패턴 및 버스트 어셈블이 에너지 절감과 지연시간에 미치는 영향 분석)

  • Kang, Dong-Ki;Yang, Won-Hyuk;Lee, Jae-Young;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.111-119
    • /
    • 2011
  • As Green-IT has attracted a lot of attention in recent years, many researches have been interested in reducing the energy consumption of network equipments. In this paper, we analyze the energy saving ratio and delay performance according to various traffic patterns and burst assemble algorithms in OBS network with sleeping mode. To do this, we design the traffic generators, which are based on exponential distribution and Pareto distribution, and the router model, which has the time based and length based burst assemble algorithms by using OPNET modeler. Through OPNET simulator, we evaluate the energy saving performance in terms of the sleeping time, the number of transitions and packet delay.

Self-Similarity Characteristic in Data traffic (데이터 트래픽에서의 Self-Similar 특성)

  • 김창호;황인수;최삼길;김동일;이동철;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.146-151
    • /
    • 1999
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Network Security Situational Awareness using Traffic Pattern-Map (트래픽 패턴-맵을 이용한 네트워크 보안 상황 인지 기술)

  • Chang Beom-Hwan;Na Jung-Chan;Jang Jong-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.34-39
    • /
    • 2006
  • This paper introduces a network security situation awareness tool using a traffic pattern map which facilitates recognizing a current network status by extracting and analyzing predetermined traffic features and displaying an abnormal or harmful traffic which deteriorates network performance. The traffic pattern-map consists of $26{\times}26$ intersections, on which the occupancy rate of the port having maximum occupancy is displayed as a bar graph. In general, in case of the Internet worm, the source address section on the traffic pattern map is activated. In case of DDoS the destination address section is activated.

  • PDF

A Study on the Queue Structure for the Enhancement of the Cell Loss QoS (셀 손실 QoS향상을 위한 큐 구조에 관한 연구)

  • 이영교;안정희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.19-26
    • /
    • 2002
  • This paper propose the queue structure of cell buffering in the output buffer of ATM switch for the traffic with the different QoS. The proposed queue structure can minimize the cell loss ratio of bursty traffic, maximize the queue utilization through the sharing of real-time queue and non-real-time queue. To evaluate the proposed queue structure, we compare the CLP and cell average delay of the proposed queue and fixed queue using the bursty traffic patterns.

  • PDF

Firewall System based on Network Traffic State (네트워크 트래픽 상태 기반의 방화벽 시스템)

  • Song, Byung-Wook;Kim, Hong-Chul;Park, In-Sung;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1077-1080
    • /
    • 2001
  • 본 논문에서는 트래픽 상태를 기반으로 네트워크 패킷의 상호관계에 따라 트래픽을 제어하는 방화벽 모델을 제시한다. 기존의 방화벽은 단순한 필터링 메커니즘과 보안 정책으로 복잡하고 다양해진 네트워크 트래픽 패턴에 효과적으로 대응할 수 없었다. 그러나, 본 논문에서는 네트워크 트래픽의 정보를 정적인 상태 정보와 동적인 상태 정보로 구분하여 수집하고 이러한 정보를 보안 정책에 의하여 생성된 상태 그래프의 의사 결정에 반영함으로서 트래픽의 미세한 변화에도 효과적이고 다양한 대응을 할 수 있도록 하였다. 그리고, 트래픽 분석기, 네트워크 에이전트, 관리자 인터페이스로 구분함으로서 관리자 인터페이스의 형태와 위치의 독립성을 높임으로서 보다 효과적인 사용환경을 제공하도록 하였다.

  • PDF

Study on the Network Architecture and the Wavelength Assignment Algorithm for All-Optical Transport Network (완전 광전달망에 적합한 망 구조와 파장 할당 알고리즘 연구)

  • 강안구;최한규;양근수;조규섭;박창수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1048-1058
    • /
    • 1999
  • This paper compares some architectures to achieve the optimized WDM architecture for all optical transport network, the comparison is presented in terms of the number of required wavelength and LT. These architecture types are PPWDM, SHWDM, DHWDM and fully optical WDM. Topology is a static ring network where the routing pattern is fixed and traffic pattern has uniform demand. This paper also proposes an algorithm for the wavelength assignment for a folly optical WDM ring network which has full mesh traffic pattern. The algorithm is based on heuristic algorithm which assigns traffic connections according to their respective shortest path. Traffic described here that is to be passed through can be routed directly within the optical layer instead of having the higher layer to handle it.

  • PDF

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

A Study on the Real-Time Communication Service using Bit Sream Control Algorithms (비트 스트림 제어 알고리즘을 이용한 실시간 통신 서비스에 관한 연구)

  • 박종선;나상동
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.152-155
    • /
    • 1999
  • ATM은 다양한 종류의 실시간 및 비실시간 트래픽을 지원할 수 있도록 기존의 회선 교환망과 패킷 교환망의 장점을 수용하여 셀이라는 일정한 크기의 패킷을 비동기식 시분할 방식으로 전송하는 방식이다. 이와 같은 ATM은 STM가 달리 대역폭의 효율적인 할당이 가능하므로 기존의 망에서 다루고 있는 데이터 통신 서비스 외에도 고화질의 화상이나 동영상, 멀티미디어 트래픽 제어는 실시간 접속에 대한 서비스 품질(QoS)의 보장이 요구되므로 본 논문은 망내에서 트래픽 왜곡과 CBR/VBR 접속에 대한 트래픽의 일반적 패턴과 셀 큐잉 지연 범위를 획득하여 최악의 규잉 분석을 모델링할 수 있는 비트 스트림 트래픽 모델에 기반을 둔 트래픽 제어 기법이 비트 스트림 제어 알고리즘을 제안한다. 제안된 알고리즘은 정적 우선순위스케줄링과 FIFO 큐잉 스위치를 갖는 ATM 망에서 엄격한 실시간 통신 서비스를 제공할 수 있다.

  • PDF

ATM Connection Admission Control Using Traffic Parameters Compression (트래픽 파라메타 압축을 이용한 ATM 연결수락제어)

  • Lee, Jin-Lee
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.311-318
    • /
    • 2001
  • 본 논문에서는 연결수락 제어시 사용자가 전송하는 트래픽 파라메타(샐 개수의 분산값과 평균값)를 압축하여 망에 신고하는 방법을 제안하고, 압축방법에 의한 연결수락제어의 성능을 분석 비교한다. 트래픽 파라메타 압축방법은 K-means, CL(Competitive Learning), Fuzzy ISODATA,FNC(Fuzzy Neural Clustering)를 사용한다. 제안한 트래픽 파라메타의 압축에 의한 연결수락제어는 퍼지 매핑함수(Fuzzy Mapping Funciton)fp 의해 신고한 트래픽 패턴을 추정하고, 전방향 구조의 신경망을 사용하여 연결의 수락/거절을 결정한다. ON-OFF 트래픽 모델 환경에서 컴퓨터 실험을 통하여 여러 가지 압축방법들을 사용한 연결수락제어의 성능을 Fuzziness 값에 따라 비교하였고, 그 결과 FNC 방법이 우수함을 알 수 있었다. EH한 연결수락제어의 성능을 높히기 위해서 관측 프레임의 셀 분산값이 크면 Fuzziness 값을 작게 선정하고, 작으면 상대적으로 크게 선정해야 함을 알 수 있었다.

  • PDF

An Algorithm to Detect P2P Heavy Traffic based on Flow Transport Characteristics (플로우 전달 특성 기반의 P2P 헤비 트래픽 검출 알고리즘)

  • Choi, Byeong-Geol;Lee, Si-Young;Seo, Yeong-Il;Yu, Zhibin;Jun, Jae-Hyun;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.317-326
    • /
    • 2010
  • Nowadays, transmission bandwidth for network traffic is increasing and the type is varied such as peer-to-peer (PZP), real-time video, and so on, because distributed computing environment is spread and various network-based applications are developed. However, as PZP traffic occupies much volume among Internet backbone traffics, transmission bandwidth and quality of service(QoS) of other network applications such as web, ftp, and real-time video cannot be guaranteed. In previous research, the port-based technique which checks well-known port number and the Deep Packet Inspection(DPI) technique which checks the payload of packets were suggested for solving the problem of the P2P traffics, however there were difficulties to apply those methods to detection of P2P traffics because P2P applications are not used well-known port number and payload of packets may be encrypted. A proposed algorithm for identifying P2P heavy traffics based on flow transport parameters and behavioral characteristics can solve the problem of the port-based technique and the DPI technique. The focus of this paper is to identify P2P heavy traffic flows rather than all P2P traffics. P2P traffics are consist of two steps i)searching the opposite peer which have some contents ii) downloading the contents from one or more peers. We define P2P flow patterns on these P2P applications' features and then implement the system to classify P2P heavy traffics.