• Title/Summary/Keyword: Self-similarity 망

Search Result 32, Processing Time 0.024 seconds

An Analysis of Data Traffic Considering the Delay and Cell Loss Probability (지연시간과 손실율을 고려한 데이터 트래픽 분석)

  • Lim Seog -Ku
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2004
  • There are many problems that must solve to construct next generation high-speed communication network. Among these, item that must consider basically is characteristics analysis of traffic that nows to network Traffic characteristics of many Internet services that is offered present have shown that network traffic exhibits at a wide range of scals-self-similarity. Self-similarity is expressed by long term dependency, this is contradictory concept with Poisson model that have relativity short term dependency. Therefore, first of all, for design and dimensioning of next generation communication network, traffic model that are reflected burstiness and self-similarity is required. Here self-similarity can be characterized by Hurst parameter. In this paper, the calculation equation is derived considering queueing delay and self-similarity of data traffic art compared with simulation results.

  • PDF

Cyclic Polling-Based Dynamic Bandwidth Allocation for Differentiated Classes of Service in Ethernet Passive Optical Networks (EPON망에서 차등 CoS 제공을 위한 주기적 폴링 기반의 동적 대역 할당 방법)

  • 최수일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.620-627
    • /
    • 2003
  • Ethernet passive optical networks (EPONs) are an emerging access network technology that provide a low-cost method of deploying optical access lines between a carrier's central office and customer sites. Dynamic bandwidth allocation (DBA) provides statistical multiplexing between the optical network units for efficient upstream channel utilization. To support dynamic bandwidth distribution, 1 propose an cyclic polling-based DBA algorithm for differentiated classes of service in EPONs. And, I show that an interleaved polling scheme severely decreases downstream channel capacity for user traffics when the upstream network load is low. To obtain realistic simulation results, I used synthetic traffic that exhibits the properties of self-similarity and long-range dependence I then analyzed the network performance under various loads, specifically focusing on packet delays for different classes of traffic.

Implementation and Performance Evaluation of Self-Similar Traffic Generator Using OPNET (OPNET을 이용한 자기유사성 트래픽 발생기 설계 및 성능 평가)

  • Han Kyeong-Eun;Jung Kwang-Bon;Lee Seung-Hyun;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5A
    • /
    • pp.441-450
    • /
    • 2006
  • Recently, with the exponential growth of the number of Internet users, IP traffic which occupies more than 90 percent of the entire Internet traffic affects significantly to the performance of networks. Therefore, the design of the self-similar traffic generator reflected the feature of IP traffic is very important to design the networks efficiently and evaluate the performance of it correctly. In this paper, we design the self-similar traffic generator using OPNET. In order to implement the self-similar characteristics, ON-OFF sources with Pateto distribution are employed and aggregated. The designed self-similarity traffic generator is evaluated and verified with R/S plot, variance time(VT) plot under the various offered loads and the number of sources. It is expected that the designed self-similar traffic generator can be put to practical use when wire or wireless networks is designed and verified as well as it can be useful to decide the specific parameter value for Internet traffic modeling.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

A Neural Net System Self-organizing the Distributed Concepts for Speech Recognition (음성인식을 위한 분산개념을 자율조직하는 신경회로망시스템)

  • Kim, Sung-Suk;Lee, Tai-Ho
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.5
    • /
    • pp.85-91
    • /
    • 1989
  • In this paper, we propose a neural net system for speech recognition, which is composed of two neural networks. Firstly the self-supervised BP(Back Propagation) network generates the distributed concept corresponding to the activity pattern in the hidden units. And then the self-organizing neural network forms a concept map which directly displays the similarity relations between concepts. By doing the above, the difficulty in learning the conventional BP network is solved and the weak side of BP falling into a pattern matcher is gone, while the strong point of generating the various internal representations is used. And we have obtained the concept map which is more orderly than the Kohonen's SOFM. The proposed neural net system needs not any special preprocessing and has a self-learning ability.

  • PDF

Congestion Control of Self-Similar Traffic in Two-way Network (양방향 네트워크에서 자기유사성 트래픽 혼잡 제어)

  • 석경휴;송선희;김철영;나상동
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.295-303
    • /
    • 2004
  • In this Paper, we discuss an active TCP link of unsynchronized transmission mode network in two-way traffic and the Improvement of its traffic patron thorough the network pathway of protocol is shown. This is because the traffic pattern is performed on the basis of existing windows which are distributing information in several periods of time in the way of interfacing LTS control module, which is controlling by an information of exceeding the time limit of feedback loop determined by RTP, with TCP. The simulation to utilize this efficiently is performed with the circumstance of bench mark based on physical modeling of the self-similarity traffic in the performance of TCP. In this paper, we use a methodology to understand and evaluate the effect of change of transmitting protocol in sticks under the condition of the self-similar traffic in two-way network and it is shown that an improvement of congestion control by self-similarity under a heavy condition.

Data Traffic Characteristics Analysis based on 3GPP2 using OPNET (OPNET을 이용한 3GPP2 기반의 데이터 트래픽 특성분석)

  • Lim, Seog-Ku
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.174-177
    • /
    • 2007
  • 이동통신망의 규모나 서비스 등이 기하급수적으로 증가하기 때문에 데이터 트래픽에 대한 정확한 특성분석은 매우 어렵지만, 트래픽 특성분석이 망 설계나 운용에 상당한 영향을 미친다는 점을 고려하면, 데이터 트래픽 모델링에 대한 연구는 가장 기본적으로 이루어져야 할 사항이라 할 수 있다. 따라서 본 논문에서는 데이터 트래픽에 대한 특성을 분석하기 위해 cdma2000 시스템의 국제적인 표준화 단체인 3GPP2에서 언급한 HTTP, FTP, WAP, Near Real Time Video 트래픽에 대한 트래픽 특성을 분석하여 자기 유사성(Self-similarity)을 가짐을 입증하였다.

  • PDF

Analysis for Data Traffic Characteristics in 3G Mokile Communication Systems (3G 이동통신시스템에서의 데이터 트래픽 특성분석)

  • 구혜련;임석구
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.421-424
    • /
    • 2004
  • 음성 중심의 기존 2G CDMA/PCS 시스템과 달리 CDMA2000 및 1xEV-DO와 같은 차세대 이동통신 시스템에서 패킷 데이터 서비스가 부각됨에 따라 효율적인 망의 설계 및 디멘져닝을 위해서는 무엇보다도 데이터 트래픽의 주요 특성인 버스트(Burst)와 자기유사성(Self-similarity)이 반영된 모델이 요구된다. 본 논문에서는 차세대 이동통신 시스템에서 자기유사 특성을 갖는 트래픽의 큐잉 성능을 시뮬레이션 하였고, 그 결과를 해석적 모델과 비교하였다. 또한 Crossover point의 변화와 출력링크의 변화도 분석하였다.

  • PDF

Detection of Personal Information Leakage using the Network Traffic Characteristics (네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법)

  • Park, Jung-Min;Kim, Eun-Kyung;Jung, Yu-Kyung;Chae, Ki-Joon;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.199-208
    • /
    • 2007
  • In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.