• Title/Summary/Keyword: Generated traffic

Search Result 442, Processing Time 0.024 seconds

On Visualization of Trajectory Data for Traffic Flow Simulation of Urban-scale (도시 스케일의 교통 흐름 시뮬레이션을 위한 궤적 데이터 시각화)

  • Choi, Namshik;Onuean, Athita;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.582-585
    • /
    • 2018
  • As traffic volume increases and road networks become more complicated, identifying for accurate traffic flow and driving smooth traffic flow are a concern of many countries. There are various analytical techniques and studies which desire to study about effective traffic flow. However, the necessary activity is finding the traffic flow pattern through data visualization including location information. In this paper aim to study a real-world urban traffic trajectory and visualize a pattern of traffic flow with a simulation tool. Our experiment is installing the sensor module in 40 taxis and our dataset is generated along 24 hours and unscheduled routes. After pre-processing data, we improved an open source traffic visualize tools to suitable for our experiment. Then we simulate our vehicle trajectory data with a dots animation over a period of time, which allows clearly view a traffic flow simulation and a understand the direction of movement of the vehicle or route pattern. In addition we further propose some novel timelines to show spatial-temporal features to improve an urban environment due to the traffic flow.

  • PDF

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

Development of Real-time Traffic Information Generation Technology Using Traffic Infrastructure Sensor Fusion Technology (교통인프라 센서융합 기술을 활용한 실시간 교통정보 생성 기술 개발)

  • Sung Jin Kim;Su Ho Han;Gi Hoan Kim;Jung Rae Kim
    • Journal of Information Technology Services
    • /
    • v.22 no.2
    • /
    • pp.57-70
    • /
    • 2023
  • In order to establish an autonomous driving environment, it is necessary to study traffic safety and demand prediction by analyzing information generated from the transportation infrastructure beyond relying on sensors by the vehicle itself. In this paper, we propose a real-time traffic information generation method using sensor convergence technology of transportation infrastructure. The proposed method uses sensors such as cameras and radars installed in the transportation infrastructure to generate information such as crosswalk pedestrian presence or absence, crosswalk pause judgment, distance to stop line, queue, head distance, and car distance according to each characteristic. create information An experiment was conducted by comparing the proposed method with the drone measurement result by establishing a demonstration environment. As a result of the experiment, it was confirmed that it was possible to recognize pedestrians at crosswalks and the judgment of a pause in front of a crosswalk, and most data such as distance to the stop line and queues showed more than 95% accuracy, so it was judged to be usable.

Analysis of Roadside Soil Characteristics and Tire Wear Particles(TWPs) According to Traffic Volume (교통량별 가로변 토양특성 및 타이어 마모 입자(TWPs) 분석)

  • Sun Yeong Lee;Jin Hee Ju;Yong Han Yoon
    • Journal of Environmental Science International
    • /
    • v.32 no.9
    • /
    • pp.627-634
    • /
    • 2023
  • Tire wear particles(TWPs), regarded as a microplastic, is generated in significant quantities each year and exist in various spaces and have a negative impact on the surrounding environment. Particularly, roadside environments fall within the direct influence of TWPs, necessitating proactive investigation for contamination management and response. Therefore, this study aimed to investigate the soil acidity and electrical conductivity(EC) and TWPs in the roadside soil of six sites based on traffic volume. The analysis revealed that the soil in all sites exhibited subacidity, and there were no significant differences in EC. Microscopic and FT-IR analysis revealed the presence of microscopic particles in soil samples that exhibited common visual characteristics of TWPs. In the road with the highest traffic volume, 48,300 TWPs were detected per unit area. Furthermore, a proportional relationship between traffic volume and TWPs particles was established. However, influences other than traffic volume on TWPs particle count within the soil were observed. Therefore, for the management of TWPs contaminated roadside soil, a proactive response is necessary in areas with high traffic volumes. However, in order to effectively address the factors contributing to the generation and dispersion of TWPs, further research is required with a multidimensional approach.

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.

Performance Analysis for ABR Congestion Control Algorithm of ATM Switch using Self-Similar Traffic (자기 유사한 트래픽을 이용한 ATM 스위치의 ABR 혼잡제어 알고리즘의 성능분석)

  • Jin, Sung-Ho;Yim, Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.51-60
    • /
    • 2003
  • One of the most important matters in designing network and realizing service, is to grip on the traffic characteristics. Conventional traffic prediction and analysis used the models which based on the Poisson or Markovian. Recently, experimental research on the LAN, WAN and VBR traffic properties have been pointed rut that they weren't able to display actual real traffic specificities because the models based on the Poisson assumption had been underestimated the long range dependency of network traffic and self-similar peculiarities, it has been lately presented that the new approach method using self-similarity characteristics as similar as the real traffic models. Therefore, in this paper, we generated self-similar data traffic like real traffic as background load. On the existing ABR congestion control algorithm, we analyzed by classify into ACR, buffer utilization. cell drop rate, transmission throughput with the representative EFCI, ERICA, EPRCA and NIST twitch algorithm to show the efficient reaction about the burst traffic.

Performance Evaluation of Service-Aware Optical Transport System

  • Youn, Ji-Wook;Yu, Jea-Hoon;Yoo, Tae-Whan
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.241-247
    • /
    • 2010
  • We propose and experimentally demonstrate a service-aware optical transport system. The proposed service-aware optical transport system makes a flow based on service type and priority of traffic. The generated flow is mapped to a corresponding sub-${\lambda}$ for transport over an optical network. Using sub-${\lambda}$ provided by the centralized control plane, we could effectively provide quality-of-service guaranteed Ethernet service and best-effort service simultaneously in a single link. The committed information rate (CIR) traffic and best-effort traffic are assigned to different sub-${\lambda}s$. The bandwidth of the CIR traffic is guaranteed without being affected by violation traffic because the bandwidth is managed per each sub-${\lambda}$. The failure detection time and restoration time from a link failure is measured to be about 60 ${\mu}s$ and 22 ms, respectively, in the ring network. The measured restoration time is much smaller than the 50 ms industry requirement for real-time services. The fast restoration time allows the proposed service-aware optical transport system to offer high availability and reliability which is a requirement for transport networks.

A Probabilistic Sampling Method for Efficient Flow-based Analysis

  • Jadidi, Zahra;Muthukkumarasamy, Vallipuram;Sithirasenan, Elankayer;Singh, Kalvinder
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.818-825
    • /
    • 2016
  • Network management and anomaly detection are challenges in high-speed networks due to the high volume of packets that has to be analysed. Flow-based analysis is a scalable method which reduces the high volume of network traffic by dividing it into flows. As sampling methods are extensively used in flow generators such as NetFlow, the impact of sampling on the performance of flow-based analysis needs to be investigated. Monitoring using sampled traffic is a well-studied research area, however, the impact of sampling on flow-based anomaly detection is a poorly researched area. This paper investigates flow sampling methods and shows that these methods have negative impact on flow-based anomaly detection. Therefore, we propose an efficient probabilistic flow sampling method that can preserve flow traffic distribution. The proposed sampling method takes into account two flow features: Destination IP address and octet. The destination IP addresses are sampled based on the number of received bytes. Our method provides efficient sampled traffic which has the required traffic features for both flow-based anomaly detection and monitoring. The proposed sampling method is evaluated using a number of generated flow-based datasets. The results show improvement in preserved malicious flows.

Management and control of fieldbus network traffic by bandwidth allocation scheme (대역폭 할당 기법에 의한 필드버스 네트워크의 트래픽 관리 및 제어)

  • Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.1
    • /
    • pp.77-88
    • /
    • 1997
  • Fieldbus is the lowest level communication network in factory automation and process control systems. Performance of factory automation and process control systems is directly affected by the data delay induced by network traffic. Data generated from several distributed field devices can be largely divided into three categories: sporadic real-time, periodic real-time and non real-time data. Since these data share one fieldbus network medium, the limited bandwidth of a fieldbus network must be appropriately allocated to the sporadic real-time, periodic real-time and non real-time traffic. This paper introduces a new fieldbus design scheme which allocates the limited bandwidth of fieldbus network to several different kinds of traffic. The design scheme introduced in this study not only satisfies the performance requirements of application systems interconnected into the fieldbus but also fully utilizes the network resources. The design scheme introduced in this study can be applicable to cyclic service protocols operated under single-service discipline. The bandwidth allocation scheme introduced in this study is verified using a discrete-event/continuous-time simulation experiment.

  • PDF

Self-similarity of SMS Traffic (SMS 트래픽의 Self-similarity)

  • Ha, Jun;Shin, Woo-Cheol;Park, Jin-Kyung;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.353-356
    • /
    • 2003
  • As the wireless mobile telecommunication system has been developed with astonishment, its offering service has also widely been expanded including various data service. Currently, the wireless mobile telecommunication network presents voice service that covers for the most part of the whole service areas. For this reason, the availability of the switching capacity in the mobile switching center(MSC) is manipulated by the required volume of voice service. However, considering the increase of data service, it is desirable for the current switching method to be modified for more efficiency. In this Paper, we analyze the data traffic caused by providing data service in the wireless mobile telecommunication network. For this, we are firstly going to review the result of the analysis in the feature of the data traffic. Secondly, based on the review, we are also going to perform analyzing the other feature of the data traffic normally generated in the wireless mobile telecommunication network. We expect that this paper would be utilized as an elementary source for the feature of the SMS data .traffic and it will be an honour for ourselves to work on it.

  • PDF