• Title/Summary/Keyword: 패킷 통계

Search Result 60, Processing Time 0.031 seconds

The Study of End-to-end Internet Service Quality Evaluation in Convergence ICT Service Environment (ICT 융합서비스 환경에서의 종단간 인터넷 서비스 품질 평가에 관한 연구)

  • Park, Kyun;Kang, Sang-Ug
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.127-137
    • /
    • 2015
  • Various services such as IPTV(Internet Protocol TV), Internet Telephony are provided through multiple ISPs(Internet Service Providers) as ICT technologies are evolving. This paper suggests that the end-to-end Internet service quality evaluation method, which is optimized for domestic environment based on international standards. The end-to-end service quality determines the quality of IPTV and Internet Telephony services and is critical factor for subjective quality as well. As a result, time delay, jitter and packet loss rate are three elements for the quality evaluation. It is also shown that these factors can be predicted with traditional statistical method by sharing minimum amount of information between ISPs.

Mobile Business Model의 진화방향에 관한 연구

  • 오재인;장창범;김태완
    • Proceedings of the Korea Database Society Conference
    • /
    • 2001.11a
    • /
    • pp.567-581
    • /
    • 2001
  • 인터넷이 일반화된 지 불과 10년이 못되었지만, 기업뿐만 아니라 우리 사회 전반에 걸친 패러다임을 변화시키고 있다. 이와 같이 무선인터넷을 기반으로 한 모바일 비즈니스에 대한 관심은 높지만, 기존의 문헌들은 무선인터넷 서비스 수요, 사용자 만족도 등에 관한 연구가 주를 이루고 있다. 즉 모바일 비즈니스 모델을 통한 무선인터넷 서비스의 향후 진화방향에 관한 연구는 전무한 실정이다. 본 연구의 목적은 문헌고찰을 통하여 모바일 비즈니스의 모델들을 정리하고, 오재인(2000)의 The 2$\times$2 Matrix를 분석 툴을 활용하여 모바일 서비스별 현재 수요와 향후 수요를 분석함으로써 모바일 비즈니스의 진화방향을 실증적으로 규명하는 것이다. 1540명의 회수된 설문지 중 유효표본 786개를 대상으로 통계분석을 실시하여 분석된 주요 연구결과는 다음과 같다. 첫째, 모바일 서비스들을 The 2$\times$2 Matrix상에 매핑한 결과 예측에는 별다른 차이가 없는 것으로 나타났다. 둘째, 전체응답자, 사용자, 비사용자들의 모바일 서비스에 대한 순위는 The 2$\times$2 Matrix에서 Mobile Hub, Mobile Trade, Mobile Care, Mobile Support 순으로 나타났다. 셋째, 현재와 향후 각 서비스들 간에는 차이가 있고, 현재 모바일 서비스들 각각과 향후 모바일 서비스들 각각에 대하여 서비스들 순위에는 차이가 없는 것으로 나타났다. 넷째, 무선인터넷의 전반적인 만족도에 영향을 미치는 요인은 우수하고 독특한 컨텐츠, 패킷 과금으로 저렴한 서비스를 제공하는 Cost전략 등으로 나타났다.

  • PDF

Prediction-Based Reliable Data Forwarding Method in VANET (차량 네트워크에서 예측 기반의 안정적 데이터 포워딩 기법)

  • Kim, Minho;Joo, Changhee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.128-139
    • /
    • 2017
  • Vehicular Ad hoc Network (VANET) is one of technologies to realize various ITS services for safe driving and efficient traffic control. However, data delivery in VANETs is complicated due to high mobility and unreliable wireless transmission. In this paper, we develop a novel forwarding scheme to deliver packets in a reliable and timely manner. The proposed forwarding scheme uses traffic statistics to predict the encounter of two vehicles, and optimize its forwarding decision by taking into consideration the probability of successful transmission between them at the encounter place. We evaluate our scheme through simulations and show that our proposed scheme provides reliable data delivery in VANETs.

Wireless Measurement based TFRC for QoS Provisioning over IEEE 802.11 (IEEE 802.11에서 멀티미디어 QoS 보장을 위한 무선 측정 기반 TFRC 기법)

  • Pyun Jae young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.202-209
    • /
    • 2005
  • In this paper, a dynamic TCP-friendly rate control (TFRC) is proposed to adjust the coding rates according to the channel characteristics of the wireless-to-wired network consisting of wireless first-hop channel. To avoid the throughput degradation of multimedia flows traveling through wireless lint the proposed rate control system employs a new wireless loss differentiation algorithm (LDA) using packet loss statistics. This method can produce the TCP-friendly rates while sharing the backbone bandwidth with TCP flows over the wireless-to-wired network. Experimental results show that the proposed rate control system can eliminate the effect of wireless losses in flow control of TFRC and substantially reduce the abrupt quality degradation of the video streaming caused by the unreliable wireless link status.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

The analysis of the impact of the wireless channel quality on the quality of experience (QoE) through statistical analysis (통계적 분석을 통한 무선 채널 품질이 사용자 체감 품질에 미치는 영향 분석)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.491-498
    • /
    • 2014
  • As internet services are being provided through a wireless access, the importance of quality of experience (QoE) is stressed that is defined as the quality that indicates user's actual feeling when a service is provided. Unlike quality of service (QoS) that can be expressed as a numerical value, it is difficult to represent QoE in an objective way. If an internet service is serviced over a wireless channel, its QoE can be affected by a number of factors such as fading, mobility and so on. This paper, therefore, attempts to specify the relationship between QoE and QoS by conducting practical measurements for the voice service through 3G high speed packet access (HSPA) access network. Analysing the measured results, it has been shown that received signal strength indicator (RSSI) has a great influence on mean opinion score (MOS) through transmission delay.

Network Topology Discovery with Load Balancing for IoT Environment (IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색)

  • Park, Hyunsu;Kim, Jinsoo;Park, Moosung;Jeon, Youngbae;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1071-1080
    • /
    • 2017
  • With today's complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor's resource usage.

Opportunistic Beamforming with Link Anaptation Robust to Imperfect Channel Estimation (기회적 빔포밍 시스템에서 채널 추정에 강인한 링크 적응 기법)

  • Kim, Yo-Han;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.617-626
    • /
    • 2008
  • Opportunistic Beamforming (OBF) offers a way to provide the multiuser diversity even in slow fading channel by using randomly generated beam weights, leading to the substantially reduced feedback in the form of the instantaneous SNR from users. In spite of the advantage of the reduced feedback, the imperfect channel estimation might influence the quality of the estimated SNR and channel scheduler so bad that the selected AMC level would be higher than the achievable rate of the actual channel, resulting the corruption of transmitted packet. In this paper, we propose a conservative link adaptation, where the estimated SNR is scaled down by a conservative factor which minimizes the variance of the maximum difference between the actual channel SNR and the resultant SNR. To support the proposed scheme, we analyze the statistics of the difference of the channel SNR and the estimated SNR. Simulation results show that the introduction of conservative factor achieves more than two-fold performance improvement in the presence of channel estimation error and the fairness of PF scheduler is maintained when the least squared channel estimator is applied.