• Title/Summary/Keyword: IP traffic

Search Result 636, Processing Time 0.04 seconds

A Research on The Real Time Video Traffic Transmission Mechanism in IP Based Mobile Networks (IP기반 이동네트워크에서 실시간 비디오 트래픽 전송 메카니즘에 관한 연구)

  • 강문식;이준호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.879-888
    • /
    • 2004
  • In this paper, we propose a real time QoS(Quality of Service) guaranteed transmission mechanism for MPEG video traffic at the congested node in IP based networks. Recent spread of the Internet has increased the demands of a real time multimedia service of the quality, Because the type of Internet services can, however, offer the best effort delivery strategies, it is difficult to treat all the types of traffic with differential COS (Class of Service). Most of all, the hierarchical coding method of MPEG data utilizes the reference frame for the motion prediction. The loss of the reference frames makes QoS of the video traffic degraded because the reference frame bit error causes the consecutive packet loss. Therefore we have studied the real time QoS guaranteed mechanism for video traffic by analyzing the previous methods. Computer simulation results show that the proposed scheme has better performance than the previous one.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

A Study for Effect of Access-Control List to MPLS GE Performance (Access-Control List 가 MPLS GE 성능에 미치는 영향에 대한 연구)

  • Kim, Kwang-Hyun;Park, Seung-Seob
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.1397-1400
    • /
    • 2005
  • Multiprotocol Label Switching is an initiating IETF that integrated Layer2 information network links(bandwidth, latency, utilization) to Layer 3(IP) with a particular autonomous system(or ISP) in order to simplify and improve IP-packet exchange. MPLS gives network operators a grate deal of flexibility to divert and route traffic around link failures, congestion, and bottlenecks. The MPLS has advantages that will be able to solve existing problem of Network that ISP have had IP, QoS, Gigabit forwarding and traffic engineering. The purpose of this study is to measure Access-list and the capacities of PE Router that would operate as MPLS. Many ISP using MPLS service to handle high-speed internet traffic with apply to firewall in future.

  • PDF

The Evolution Strategies of the DACOM Metro IP Backbone Networks (데이콤 Metro IP 백본망의 구성방안)

  • 이승민;강현서;백승환;이동열
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.429-432
    • /
    • 2000
  • With the unprecedented growth in internet traffic, demand for larger, more scaleable IP backbone networks is seemingly limitless. This critical requirement is leading the DACOM to investigate architectural alternatives for cost effective, scaleable and flexible IP backbones. In this paper, we present three alternatives for IP backbones using DWDM systems and multi-gigabit IP Routers in the DACOM metro networks, and then compare them by performing an economic analysis.

  • PDF

Performance Analysis of Mobile IP with Self-Similar Traffic (Self-Similar 트래픽을 갖는 Mobile IP의 성능분석)

  • 김기완;김두용
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.127-131
    • /
    • 2001
  • 휴대용 단말기와 이동통신 기술의 발달로 무선 네트워크의 사용이 급증하면서 호스트가 이동중에도 지속적인 네트워킹이 가능한 프로토콜들이 개발되고 있다. Mobile IP는 이동 노드(mobile node)가 인터넷상의 임의의 다른 위치에 접속하여 IP 주소를 변경하지 않고, 홈 주소를 이용하여 통신하며 위치에 따른 care-of address에 의해 데이타를 터널링하여 전달받는다. 본 논문에서는 컴퓨터 시뮬레이션을 통해 self-similar 트래픽을 갖는 mobile IP의 성능을 분석한다. 일반적으로 데이타 트래픽, 바인딩 갱신시간, 버퍼관리 방법 등은 핸드오프 동안 mobile LP의 성능에 많은 영향을 비친다. 따라서 시뮬레이션 모델을 이용하여 self-similar 트래픽 환경에서 위에 언급된 성능 파라미터들의 영향을 분석한다.

  • PDF

QoS Resource management scheme for supporting VoIP Services in All IP Networks (All IP망에서 VoIP서비스를 위한 QoS Resource Management 제공 방안)

  • 윤재구;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.97-100
    • /
    • 2002
  • In this paper, we analyze All IP network architecture and VoIP Service procedure using U Multimedia domain. And, we propose QoS Resource management scheme using with statistical measurement based admission control 8l rate based borrow bandwidth to improve real-time traffic QoS guarantee.

  • PDF

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

MAC Scheduling Scheme for VoIP Traffic Service in 3G LTE (3G LTE VoIP 트래픽 서비스를 위한 MAC 스케줄링 기법)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.558-564
    • /
    • 2007
  • 3G Long Term Evolution, which aims for various mobile multimedia service provision by enhanced wireless interface, proposes VoIP-based voice service through a Packet Switching (PS) domain. As delay and loss-sensitive VoIP traffic flows through the PS domain, more challenging technical difficulties are expected than in Circuit Switching (CS) domain based VoIP services. Moreover, since 3G LTE, which adopts the OFDM as its physical layer, introduces Physical Resource Block (PRB) as a unit for transmission resources, new types of resource management schemes are needed. This paper proposes a PRB scheduling algorithm of MAC layer for VoIP service in 3G LTE and shows the simulation results. The proposed algorithm has two key parts; dynamic activation of VoIP priority mode to satisfy VoIP QoS requirements and adaptive adjustment of the priority mode duration in order to minimize the degradation of resource utilization.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

Design and Implementation of DHCP with Minimized Broadcasting Traffic (브로드캐스팅 트래픽을 최소화한 DHCP의 설계 및 구현)

  • An, Seong-Jin;Jeong, Jin-Uk;Lee, Sang-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.709-719
    • /
    • 1996
  • DHCP(Dynamic Host Configuration Protocol)is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. But because this protocol uses broadcasting for message exchange, it causes heavy traffic and overload on the network. By avoiding unnecessary broadcasting and using a simple and efficient implementation model, we can reduce such heavy traffic and overload. We have studied on characteristics of the broadcasting the traffic caused by DHCP, and implement the model which can reduce traffic by improving algorithm and unicasting messages.

  • PDF