• 제목/요약/키워드: IP traffic

Search Result 635, Processing Time 0.037 seconds

Improvement of IEEE 802.11e to decrease the packet drop when happens handoff in Cellular IP network (Cellular IP network 망에서 handoff 성능 향상을 위한 IEEE 802.11e의 개선방안)

  • Yang Soon Yeal;Kim Ki Chun;Yoo Seung Wha;Roh Byeong Bee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.765-768
    • /
    • 2004
  • IEEE 802.110e는 실시간 트래픽의 QoS를 보장하기 위해 제안되었으나 cellular ip network 망에서 발생하는 route update packet과 같은 signaling traffic에 대해서는 아무런 언급을 하고 있지 않다. 따라서 본 논문에서는 IEEE 802.11e draft가 제안하고 있는 4가지의 AC(Access Category)에 따라 signaling traffic 에 대해서도 높은 우선 순위를 할당 함으로서 handoff시 발생하는 packet drop 이 얼마 만큼 줄어드는지를 분석하였다.

  • PDF

A Policy-based Network Control Methodology for Large-scale IP Network (대규모 IP 네트워크에서 정책기반의 네트워크 제어방법 연구)

  • Oh, Jun-Suk;Son, Choon-Ho;Kim, Ki-Eung;Lee, Jae-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.364-367
    • /
    • 2008
  • Many different types of network equipments are deployed in a large-scale IP network. In this operating environment, network service providers suffer from difficulty in controlling various equipments simultaneously in case network faults happen in their overall or regional network due to physical link failure or abnormal traffic. This paper presents a policy-based methodology to control many different types of network equipments at the same time in abnormal cases. The key idea is that NMS(Network Management System) keeps vendor-neutral control policies in normal times and that when an abnormal case occurs in network, NMS transforms the selected policy into vendor-specific control commands and enforces them to various equipments simultaneously.

  • PDF

An Efficient Buffer Management Scheme for TCP Traffic Transmission in ATM Networks (ATM망에서 TCP 트래픽 전송을 위한 효율적 버퍼관리 기법)

  • Kim, Byun-Gon;Kim, Nam-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1099-1107
    • /
    • 2005
  • The Guaranteed Frame Rate(GFR) service has been designed to accomodate non-real-time applications, such as TCP/IP based traffic in ATM networks. The GFR service not only guarantees a minimum throughput at the frame level, but also supports a fair share of available resources. In this paper, we propose a cell scheduling scheme which can improve the fairness and the goodput through the traffic control in GFR service. For the evaluation of the proposed scheme, we compare the proposed scheme with the existing scheme in the fairness and the goodput. Simulation results show that proposed scheme can improve the fairness and goodput comparing with the existing buffer management scheme.

  • PDF

MPLS Internet Traffic Engineering in IP Network (MPLS 인터넷 트래픽 엔지니어링 기술)

  • Jang Hee-Seon;Shi Hyun-Cheul
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.155-164
    • /
    • 2002
  • MPLS is a integrated technology by using routing function and label swapping in the network layer. Based on the previous forwarding equivalence classes, it adds the fixed length label in ingress of the MPLS domain. For the routing, without the packet header information, it uses label for the forwarding decisions. In this paper, traffic engineering requirements in the MPLS internet will be setup. The traffic engineering function have to be performed previously with the network topology. In addition to, we presents the IP network topology and main function with MPLS signaling protocol.

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

Study of the Simulation of VoIP Traffic Generation with Considering Self-Similiarity (자기유사성을 고려한 VoIP 트래픽 생성 시뮬레이션 방법의 연구)

  • Lee, Gye-Sin;Kim, Jae-Beom;Lee, Chang-Heon;Kim, Yun-Bae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.540-543
    • /
    • 2004
  • VoIP는 인터넷 프로토콜(IP)를 이용하여 음성을 데이터 packet처럼 전송하는 것을 의미한다. 최근 VoIP 기술의 도입으로 기존 망 성능 관리에 대한 관심이 높아지고 있다. 보다 원활한 기술 구현을 위해서는 VoIP 트래픽에 대한 체계적인 분석과 위험성 검증을 할 수 있는 도구가 필요하다. 또한 기존의 트래픽 시뮬레이션 기법에서 실제 망에서의 자기유사성을 적용한 사례가 적다는 것 또한 본 연구가 행하여진 동기이다. 본 연구에서는 자기유사성을 반영하여 소량의 샘플을 갖고 전체 VoIP 망 트래픽을 생성 할 수 있는 방법론을 개발하고자 시도하였다.

  • PDF

A Study on Guaranteeing Technique for Internet Service over ATM Transmission (ATM 전송에서 인터넷 서비스 방안)

  • Min, Jae-Hong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3199-3208
    • /
    • 1999
  • Recently the number of Internet users have been drastically increased with the introduction of WWW browsers, which requires accommodation study of TCP/IP on ATM networks. There are a number of problems in operating IP-over-ATM efficiently because of limited functions and overhead of IP. According to recent research, the alternatives to TCP/IP efficiently because of limited functions and overhead of IP. According to recent research, the alternatives to TCP/IP over ABR or UBR have been suggested, and the required capacity of switch buffer and problems in TCP/IP over ABR have been researched. In this paper, we address problems caused by the features of HTTP traffic and suggest a solution for TCP over ABR. The performance of the methods suggested in this paper is verified through simulation under limited conditions.

  • PDF

An Experimental study on the Method of Detection and Blocking against SIP Flooding (SIP 플러딩 탐지 차단 실험방법에 대한 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

Design and Performance Evaluation of the QoS based Multimedia Services under Wibro Network Environment (휴대 인터넷 환경에서 QoS 기반 멀티미디어 서비스 제공 방안 및 성능 평가)

  • Yoe, Hyun;Eom, Ki-Bok;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.306-312
    • /
    • 2007
  • Present TCP/IP networks have some service quality problems. They delay various kinds of traffic, while increased traffic bottle necks, a phenomena experienced by too many internet users. Therefore, as use of the network increases, building up a stable network service is needed. Thus, network managers desperately need the best, most effective traffic control and wide-band services. Until now there has been no other way of increasing wide-band use of lines, particularly because of the expenses a limit solutions of solving continuously to increasing traffic problems. This study suggests a problem solving method under the base of 802.16e(Wibro) which will be widely used in the future.

  • PDF