• Title/Summary/Keyword: IP traffic

Search Result 635, Processing Time 0.032 seconds

QoS Control and Link-Level Performance Analysis for Mobile IP of Wireless Communication Networks (이동인터넷을 위한 QoS 제어 및 링크레벨 성능분석)

  • 조정호;김광현;이형옥
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.941-950
    • /
    • 2001
  • In this paper, we present the integrated network architecture for supporting mobile IP in third generation mobile communication networks, and propose the end-to-end QoS control mechanisms of DiffServ and QoS control functions of each network element in the proposed network. First, the QoS supporting schemes of IMT-2000 are described. Second, the necessities of integrating the networks are discussed and the integrated architecture are proposed. Third, the mapping between wireless channels and DiffServ classes are presented. Finally, the end-to-end QoS control mechanisms are proposed. We also analyze the link level protocols with QoS provisioning for mobile multimedia assuming that the system support voice and data traffic simultaneously. In case of data traffic, the delay and throughput of SREJ ARQ and Type-1 Hybrid ARQ scheme are compared, and In case of voice traffic, the packet loss rate of BCH coding is analyzed according to the varying data traffic loads. The results indicate that the adaptive link level protocols are efficient to meet the QoS requirements while the complexities are increased.

  • PDF

A Scheme to Support QoS based-on Differentiated Services in MPLS Network (MPLS망에서 Differentiated Services 기반 QoS 지원 방안)

  • 박천관;정원일
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.87-100
    • /
    • 2001
  • IETF has proposed integrated services model(Int-Serv) and differentiated service(Diff-Serv) to supply IP QoS in Internet[1][2]. Int-Serv model uses state information of each IP flow, so satisfies QoS according to traffic characteristics, but increases the amount of flow state information with increasing flow number. Diff-Serv uses PHP(Per Hop Behaviour) and there are well-defined classes to provide differentiated traffics with different services according to delay and loss sensitivity. Diff-Serv model can provide diverse services in Internet because of having no the state and signal information of each flow. As MPLS uses the packet forwarding technology based on label, it implements the forwarding engine of high performance easily. The MPLS can set up the path having different and variable bandwidth and assign each path to particular CoS (Class of Service). Therefore it is possible to support the Diff-Serv model of well- defined classes that can provide the differentiated traffic with different services according to delay and loss sensitivity in IP QoS models of IETF. In this paper we propose a scheme that can accommodate Diff-Serv model to provide QoS. The system performance has been estimated by scheduling plan according to traffic classes.

  • PDF

A Study on Performance Improvement of VoIP service using QoS-Support Techniques in High-speed Internet (초고속 인터넷에서 QoS 제공 기술을 사용한 VoIP 성능 향상 연구)

  • Jung, You-Chul;Woo, Mi-Ae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1525-1528
    • /
    • 2005
  • 본 논문에서는 초고속인터넷 망에서 VoIP 서비스 제공시 적용할수 있는 망별 QoS 제공기술을 소개하고 이러한 QoS 기술들을 이용하여 통화품질을 개선할수 있는 방안을 제시하였다 . 초고속인터넷망의 QoS 기술은 적용방법에 따라 다양한데 본 논문에서는 IEEE 802.1P, IP TOS 기술, DIFFFSERV 기술, Traffic classification & Queuing, ATM QoS 기술 등을 소개하고 이러한 기술을 사용하여 초고속인터넷망중 Metro EtherNet 망, ADSL 망을 중심으로 VoIP 서비스시 성능을 향상 할 수 있는 방안을 제시하였다

  • PDF

Analysis of Network Traffic Patterns in IP Storage Environment (IP 스토리지 환경에서 네트워크 트래픽 패턴분석)

  • Ryu, Junkil;Nam, Young Jin;Park, Chanik;Ahn, Jong Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1659-1662
    • /
    • 2004
  • 본 논문에서는 스토리지만을 위한 전용 네트워크인 파이버 채널대신, 최근 대중화되고 있는 IP 네트워크를 사용하는 IP 네트워크 스토리지에 QoS를 제공하기위한 연구의 일환으로 스토리지 입출력 트래픽에 의해서 발생되는 네트워크 트래픽의 변화를 분석하였다. iSCSI 프로토콜을 사용하여 구성한 IP 네트워크 스토리지 환경하에서, 스토리지 트래픽에 따른 네트워크 트래픽은 패턴에 있어 거의 동일한 양상을 보이지만 iSCSI 프로토콜의 영향으로 호스트 스토리지의 트래픽보다 네트워크 트래픽에 burstiness가 더해진다는 것을 알 수 있다.

  • PDF

Internet Traffic Analysis using Fixed IP-port (고정 IP-port를 이용한 인터넷 트래픽 분석)

  • Yoon, Sung-Ho;Park, Jin-Wan;Oh, Young-Seok;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1174-1177
    • /
    • 2009
  • 인터넷의 대중화로 인해 네트워크 트래픽이 급증하였다. 따라서 효과적인 네트워크 관리를 위한 트래픽 응용 별 분석의 중요성은 매우 커지고 있다. 효과적인 트래픽 응용 별 분석을 위하여 여러 방법론이 제안 되었지만, 아직 완벽하게 트래픽을 분석하는 방법론은 존재하지 않는다. 본 논문에서는 기존의 여러 트래픽 분석 방법론의 단점을 보완한 고정 IP-port을 이용한 인터넷 트래픽 분석 방법론을 제안한다. 하나의 서비스를 고정적으로 제공하는 고정 IP-port을 찾아 낸다면 효과적으로 트래픽을 분석 할 수 있다. 본 논문에서는 고정 IP-port를 효과적으로 추출하는 방법론을 제시하며, 실제 학내 트래픽에 적용한 결과를 보인다.

A Study on support QoS using Traffic Engineering in WDM Network (WDM에서 트래픽 엔지니어링을 이용한 QoS 보장에 관한 연구)

  • 김용성;김장복
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.41-44
    • /
    • 2000
  • Because of internet's growth, today's network has a serious bandwidth problem. WDM(Wavelength Division Multiplexing) is a solution of this problem. In the WDM networks, QoS(Quality of Service) is as important as bandwidth. And today's voice over IP technology makes a lot of delay-sensitive internet traffic. De]ay-sensitive internet traffic is growing up, so more QoS is needed. We proposed effective solution to assign QoS.

  • PDF

Loadbalancing for WDM Network using Dynamic Watermarks (WDM 네트워크에서 동적 워터마크 결정을 이용한 로드벨런싱)

  • Nahm, Jung-Joo;Kim, Sung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.2
    • /
    • pp.1-5
    • /
    • 2007
  • Wavelength-division multiplexed (WDM) networks are emerging to be the right choice for the future transport networks. In WDM networks, the optical layer provides circuit-switched lightpath services to the client layer such as IP, SONET and ATM. The set of lightpaths in the optical layer defines the virtual topology. Since the optical switches are reconfigurable, the virtual topology can be reconfigured in accordance with the changing traffic demand pattern at theclient layer in order to optimize the network performance. We present a new approach to the virtual topology reconfiguration and loadbalancing problem for wavelength-routed, optical wide-area networks under dynamic traffic demand. By utilizing the measured Internet backbone traffic characteristics, our approach follows the changes in traffic without assuming that the future traffic pattern is known. For the simulation traffic modeling, we collected the data from real backbone traffic. Experiments show that the standard deviation compared to previous technique is reduced.

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

Design and Implementation of Multipoint VoIP using End-point Mixing Model (단말혼합 방법을 이용하는 다자간 VoIP의 설계 및 구현)

  • Lee, Sung-Min;Lee, Keon-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.335-347
    • /
    • 2007
  • VoIP (Voice over IP) is a technology to transport video and voice traffic over IP networks such as Internet. Today, the VoIP technology is viewed as the right choice for providing voice, video, and data communication among various terminals over the next generation network. This paper discusses a multipoint VoIP implementation with end-point mixing model which can support multipoint conference without a conference bridge. The multipoint VoIP is implemented with SIP (Session Initiation Protocol), and supports STUN (Simple Traversal of UDP Through NATs) since it works in an asymmetric NAT (Network Address Translator) environment. The characteristics of this paper are as follows. It is possible that all terminals in the hierarchical conference don't receive the duplicated media information because we use the end-point mixing model with the new media processing module. And, the paper solves the problem that the hierarchical conference session should be separated into several sessions when a mixing terminal terminates the hierarchical conference session.

  • PDF