• Title/Summary/Keyword: Network Traffic Analysis

Search Result 1,114, Processing Time 0.033 seconds

Analysis of the DRR with Improved Latency (개선된 Latency의 DRR 분석)

  • Joung, Ji-Noo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.847-854
    • /
    • 2005
  • Many of scheduling algorithms that provide a pre-defined bandwidth to a traffic flow fall into a category of Latency-rate (LR) server, the delay of whose network can be simply calculated by adding up individual 'latencies' of each LR servers. Deficit Round Robin (DRR) is one of such LR servers and the simplest one to implement, so that it is adopted in many real systems. In this research we suggest an improved version of DRR, the DRR with Instant Service (DRR-IS), and analyze it. We have proved that the DRR-IS is still an LR sewer and have obtained its latency. The DRR-IS, compared with DRR, turns out to have the same complexity while provide about $30\%$ better latency.

Dynamic Control of Timer for Receiving Beacon in Low Power Wireless Interface (저전력 무선접속에서 비콘 수신을 위한 타이머의 동적 제어)

  • Song, Myong-Lyol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1303-1310
    • /
    • 2007
  • In IEEE 802.11b wireless network, stations synchronize themselves to the beacons periodically sent by the access point (AP) when they are running in low power mode. Stations stay awake for enough time to receive beacon because it is delayed in AP if the wireless channel has been being used by other traffic at each scheduled instant. In this paper, we propose a method that measures the delay of received beacons and calculates wake-up interval of station to receive the next one. Beacon transmission delay at the AP is analyzed. The proposed method is simulated and its characteristics are described in the analysis. The result measured in terms of station's wake-up interval shows some enhancement in energy consumption.

Transmission Performance of Voice Traffic on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 음성 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1411-1416
    • /
    • 2015
  • Grayhole attack, one of attack to MANET routing function, is very severe in point of view of causing results which disturbs normal transmission function of network with uneasy finding of attacks. In this paper, effects of grayhole attack to application service on MANET is analyzed. Based on this analysis, some conditions is suggested for anti-intrusion to operate an application service on MANET under grayhole attack. This study is done with computer simulation based on NS-2 be added grayhole attack function which is implemented in this paper.

Analysis of the Percentage Articulation and Voice Packet Loss over the Internet (인터넷상의 음성 패킷손실과 명료도 분석)

  • 고대식;박준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2090-2095
    • /
    • 1998
  • In this paper, we measured voice packet loss over the Korean Internet and analyzed percentage articulation by variation of the packet loss. To do this, we reviewed real-time transmission service based on RTP/UDP/IP and test method of the transmission quality. and implemented the real-time speech transmission system using GSM and UDP/IP. Monosyllable list has been chosen for the percentage articulation test, each voice packet has been coded and compressed by GSM and it has sequence number to measured packet loss and to recover out-of-order packets. In transmission results using seven router over the Korean Internet, we have show that loss rates reached 1.6% (unload), 22.5%(load) and loss rates after packet recovery by resequencing and FEC are from 9% to 35%. Finally, we have shown that percentage articulations by variation of the network traffic are Table 4.

  • PDF

A New Route Guidance Method Considering Pedestrian Level of Service using Multi-Criteria Decision Making Technique

  • Joo, Yong-Jin;Kim, Soo-Ho
    • Spatial Information Research
    • /
    • v.19 no.1
    • /
    • pp.83-91
    • /
    • 2011
  • The route finding analysis is an essential geo-related decision support tool in a LBS(Location based Services) and previous researches related to route guidance have been mainly focused on route guidances for vehicles. However, due to the recent spread of personal computing devices such as PDA, PMP and smart phone, route guidance for pedestrians have been increasingly in demand. The pedestrian route guidance is different from vehicle route guidance because pedestrians are affected more surrounding environment than vehicles. Therefore, pedestrian path finding needs considerations of factors affecting walking. This paper aimed to extract factors affecting walking and charting the factors for application factors affecting walking to pedestrian path finding. In this paper, we found various factors about environment of road for pedestrian and extract the factors affecting walking. Factors affecting walking consist of 4 categories traffic, sidewalk, network, safety facility. We calculated weights about each factor using analytic hierarchy process (AHP). Based on weights we calculated scores about each factor's attribute. The weight is maximum score of factor. These scores of factor are used to optimal pedestrian path finding as path finding cost with distance, accessibility.

Improving the Competitiveness of Korean Exhibition Industry - Comparison of Korean Exhibition Industry with German Exhibition Industry - (한국전시산업의 경쟁력 강화 방안을 위한 독일과 한국의 전시산업 비교)

  • Yoo, Hwa-Sook;Park, Kwang-Hee;Kim, Mun-Young
    • Fashion & Textile Research Journal
    • /
    • v.11 no.1
    • /
    • pp.84-92
    • /
    • 2009
  • The purpose of this study was to examine the facilities, the current status, and the problems of Korean Exhibition Industry and to provide its future direction based on analysis of the characteristics and the recent trend of German Exhibition Industry. Data were obtained from previous research papers, periodicals, magazines, and newspapers. Also, statistical data provided by AUMA(Ausstellungs- und Messe- Ausschuss der Deutschen Wirtschaft e.V.), Association of Korean Exhibition Industries, and Global Exhibition Portal were used. In the result part of this study, various issues such as similarities and differences between Korean and German Exhibition Industry and problems of Korean Exhibition Industry were discussed. The strategies to improve the competitiveness of Korean Exhibition Industry were suggested. They are as follows ; development of global and specialized exhibitions, training of professional human resources for exhibition, formulating of aggressive and powerful oversee marketing, formation of oversee network, improving of laws, regulation and system in such a way to meet the realistic needs of exhibition, building of infrastructure such as roads, traffic networks and accomodations, raise of the Korea image and strengthen of quality of exhibition service.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

Adaptive Duty Cycling MAC Protocols Using Closed-Loop Control for Wireless Sensor Networks

  • Kim, Jae-Hyun;Kim, Seog-Gyu;Lee, Jai-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.105-122
    • /
    • 2011
  • The fundamental design goal of wireless sensor MAC protocols is to minimize unnecessary power consumption of the sensor nodes, because of its stringent resource constraints and ultra-power limitation. In existing MAC protocols in wireless sensor networks (WSNs), duty cycling, in which each node periodically cycles between the active and sleep states, has been introduced to reduce unnecessary energy consumption. Existing MAC schemes, however, use a fixed duty cycling regardless of multi-hop communication and traffic fluctuations. On the other hand, there is a tradeoff between energy efficiency and delay caused by duty cycling mechanism in multi-hop communication and existing MAC approaches only tend to improve energy efficiency with sacrificing data delivery delay. In this paper, we propose two different MAC schemes (ADS-MAC and ELA-MAC) using closed-loop control in order to achieve both energy savings and minimal delay in wireless sensor networks. The two proposed MAC schemes, which are synchronous and asynchronous approaches, respectively, utilize an adaptive timer and a successive preload frame with closed-loop control for adaptive duty cycling. As a result, the analysis and the simulation results show that our schemes outperform existing schemes in terms of energy efficiency and delivery delay.

A Traffic Analysis When Using Motion Images In The Secondary School Network (중등학교 학내망에서 동영상 활용시 트래픽 분석)

  • Yang, Kyung Mi;Baeg, Hwajeong;Kim, Seong Baeg
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.943-946
    • /
    • 2004
  • 최근에 중등학교 학내 전산망에서 동영상 위주의 멀티미디어 학습 자료를 이용한 학습이 많아짐에 따라, 실제 수업 시간이나 자율 학습 시간에 동영상 학습 자료를 활용했을 때 트래픽 특성이 구체적으로 어떻게 나타나는 지를 정량적으로 규명하는 것이 요구된다. 이에 본 논문에서는 고등학교 1개교와 중학교 1개교에 대해 동영상 학습 자료를 이용한 학습 시 학내 전산망에서 나타나는 트래픽 특성을 트래픽 분석 도구를 이용하여 분석하였다. 특히, 학교 내에 자체 웹 서버의 유무, 컴퓨터 접속 대수 등을 주요 변인으로 하여 동영상 실행 시 나타나는 현상들에 대한 측정 결과들을 제시하였다. 측정 결과로부터 다음과 같은 특성들을 얻어낼 수 있었다. 첫째, 학교 내에 자체 웹 서버의 유무가 전송 트래픽 량에 상당한 영향을 주었다. 둘째, 동시 컴퓨터 접속 대수의 증가가 끊김 현상과 같은 트래픽 특성에 영향을 주었다. 이러한 측정 및 분석 결과를 볼 때, 적게는 수십 명 많게는 수백 명의 학생이 동시에 인터넷을 통해 학습을 한다면 학내 전산망의 구성 형태나 동시 접속자 수에 따라 원활한 학습을 가져오지 못하고 많은 문제를 가져 올 것으로 예상되었다.

  • PDF

Automatic Malware Detection Rule Generation and Verification System (악성코드 침입탐지시스템 탐지규칙 자동생성 및 검증시스템)

  • Kim, Sungho;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.9-19
    • /
    • 2019
  • Service and users over the Internet are increasing rapidly. Cyber attacks are also increasing. As a result, information leakage and financial damage are occurring. Government, public agencies, and companies are using security systems that use signature-based detection rules to respond to known malicious codes. However, it takes a long time to generate and validate signature-based detection rules. In this paper, we propose and develop signature based detection rule generation and verification systems using the signature extraction scheme developed based on the LDA(latent Dirichlet allocation) algorithm and the traffic analysis technique. Experimental results show that detection rules are generated and verified much more quickly than before.