• Title/Summary/Keyword: Traffic Generator

Search Result 61, Processing Time 0.026 seconds

Active Network Management System with Automatic Generation of Network Management Program using Triggers (트리거를 이용한 네트워크관리프로그램 자동생성 기능을 가진 능동적인 네트워크 관리 시스템)

  • Shin, Moon-Sun;Lee, Myong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.19-31
    • /
    • 2009
  • Network management involves configuring and operating various network elements in a suitable manner. Generally, a network management system can perform basic functionalities such as configuration management, performance management, and fault management. Due to the open structure of the Internet, the volume of network traffic and the network equipment used have increased in size and complexity. Therefore, it is expensive and time consuming to develop a network management program for heterogeneous network equipment in an SNMP.based network. In order to facilitate the management of network environments and the control of heterogeneous devices in an efficient manner, we propose an Active Network Management System (ANMS) comprising an automatic generator that uses triggers to generate a network management program. The concept of triggers can be represented through event condition action rules performed in response to a change in the status of a network environment. The proposed ANMS comprises basic components for real time network management and also includes an automatic generator (AG). When the ANMS is monitoring network elements that are newly added or changed, a trigger rule is activated and these components are then able to collaborate and automatically generate a new network management program by using the information provided along with the SNMP libraries. Our method is useful for expanding the network structure and replacing network equipment. Through experiments, we have proved that our ANMS is useful when new network objects are added or changed in the network environment to expand the network structure. Further, we have verified that our ANMS system reduces the time and cost required to develop a network management program as compared to the manual method used in existing network management systems.

  • PDF

Packet Data Performance Evaluation in TETRA Wireless Back-bone Network (TETRA 무선 기간망에서 Packet Data 성능 평가)

  • Song, Byeong-Kwon;Kim, Sai-Byuck;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.379-381
    • /
    • 2008
  • TETRA(Terrestrial Trunked Radio) is a digital trunked radio standard developed by the ETSI(European Telecommunications Standards Institute). Currently, TETRA was set Digital TRS in electric power If wireless backbone network. In this time, we use many company's TETRA modem. So, TETRA modem performance evaluation is very important. TETRA modem use two type of Data transfer mode. One is Packet Data using UDP/IP. and the other is SDS(Short Data Service). In this paper, We generate Packet Data using Traffic Generator module. Packet Data transfer 1000 times each 10 bytes to 400 bytes. We analyze transmission delay time, success rate and standard deviation.

  • PDF

Test & Analyze Switching System Using Virtual Call Generator (가상 호 발생기를 이용한 Switching System 분석 및 시험)

  • 유현상
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.04a
    • /
    • pp.65-69
    • /
    • 1999
  • Switching System(이하 교환 시스템)이 QoS(Quality of Service)를 유지하면서 처리 가능한 최대 동시 호처리 능력을 검증하기 위하여, 수학적 분석을 이용한 해석적 방법, 실제 호를 사용한 통계적 방법 등이 제안되었다. 해석적 방법을 이용해 산출한 교환 시스템의 최번시 동시 호 처리능력(BHCA, Busy Hour Call Attempt)은 단지 수학적인 예측일 뿐이므로 이를 검증하기 위해서 가상 호 발생기가 제안되었다. 이 가상호 발생기는 가입자의 행동을 시스템 하위 프로세서(가입자 정합 Device 제어 프로세서)에서 Simulation하여 가상의 호를 발생시키고, 이를 통해 교환기 최대 동시 호 처리 용량을 시험하기 위한 SW이다. 이 가상호 발생기는 동일한 형태의 호를 동시에 다량으로 발생시킴으로써 교환 시스템의 주 프로세서(Main Processor, MP)의 동시 호 처리 용량을 시험하기 위한 SW이다. ITU-T 권고에 의하면 시스템부하가 90~95%를 넘어 서는 경우는 예외적인 처리(과부하 제어 등)를 권고하고 있으므로 MP 부하 90~95%에서 BHCA를 계산하면 최대 호 처리 용량이라 할 수 있다. 가상 호 발생기는 시스템 개발 초기에 실제 가입자 정합 Device 와 호 발생기 없이도 MP 과부하 지점까지 호를 발생시킴으로써 개발의 시간 및 비용을 절약할 수 있도록 하고, 계획된 시스템 용량을 만족하기 위해 필요한 조치를 교환 시스템 개발 초기에 취할수 있도록 한다. 또한, 과부하 지점에서 MP가 정상 동작하는지 검증하는 도구로 사용 가능하다. 앞으로 이를 더 발전시키면 가상호 발생기를 이용한 다양한 시스템 검증 및 분석에 이용할 수 있을 것이다. 본 논문은 가상호 발생기의 구조와 최대 용량 시험 방법을 소개하고, 더 나아가 호 Traffic에 대한 최대 용량 시험뿐 아니라 QoS를 향상시키기 위한 교환 시스템의 제반 성능 시험 및 분석에 이를 이용하기 위해 개선이 필요함을 서술하고자 한다.

  • PDF

A Study on the Development of Automatic Detection and Warning system while Drowsy Driving (졸음운전의 자동 검출 및 각성 시스템 개발에 관한 연구)

  • Kim, Nam-Gyun;Jeong, Gyeong-Ho;Kim, Beop-Jung
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.3
    • /
    • pp.315-323
    • /
    • 1997
  • Driving is a complex vigilance task that includes improper lookout, excessive speed and inattention. The primary objective of this research is to detect driver drowsiness so that the driver can be alerted to an impending traffic accident in performance. We developed the automatic detection and warning system during drowsy driving. A drowsiness detection system must be able to monitor driver status and detect the detrimental changes of a driver performance. Eyeblink has been found to be a reliable factor of drowsiness detection in earlier studies. As an additional parameter, we also considered the yawning which often occurs in a low vigilance state and predicts the drowsy state. We used a computer vision method to extract the eyeblink and yawning in the face image sequences. When the drowsy state was detected, the driver was refreshed by alarming device and menthol scent generator after deciding the warning level by fuzzy logic. For the evaluation of our system, we measured the physiological parameters such as EOG and EEG. The results indicated that it is possible to detect and alert the driver drowsiness temporarily or continuously by using our system.

  • PDF

A Study on the Development of Drowsiness Warning System for a Drowsy Driver (졸음 운전자를 위한 졸음 각성 시스템의 개발에 관한 연구)

  • Chong, K.H.;Kim, H.S.;Lee, J.S.;Kim, B.J.;Kim, D.W.;Kim, N.G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.11
    • /
    • pp.90-94
    • /
    • 1996
  • We studied the problem of driver's low vigilance state which is related to the one reason of traffic accidents. In this paper, we developed the drowsiness warning system for a drowsy driver. To extract the eyes and mouth from the driver's facial image in real time, a computer vision method was used. The eye blink duration and yawning were used as measurement parameters of drowsiness detection. When the drowsy state of a driver was detected, the driver was refreshed by the scent generator and the alarm. Also, the driver's bio-signal was acquired and analyzed to measure the vigilance state.

  • PDF

A method based on Multi-Convolution layers Joint and Generative Adversarial Networks for Vehicle Detection

  • Han, Guang;Su, Jinpeng;Zhang, Chengwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1795-1811
    • /
    • 2019
  • In order to achieve rapid and accurate detection of vehicle objects in complex traffic conditions, we propose a novel vehicle detection method. Firstly, more contextual and small-object vehicle information can be obtained by our Joint Feature Network (JFN). Secondly, our Evolved Region Proposal Network (EPRN) generates initial anchor boxes by adding an improved version of the region proposal network in this network, and at the same time filters out a large number of false vehicle boxes by soft-Non Maximum Suppression (NMS). Then, our Mask Network (MaskN) generates an example that includes the vehicle occlusion, the generator and discriminator can learn from each other in order to further improve the vehicle object detection capability. Finally, these candidate vehicle detection boxes are optimized to obtain the final vehicle detection boxes by the Fine-Tuning Network(FTN). Through the evaluation experiment on the DETRAC benchmark dataset, we find that in terms of mAP, our method exceeds Faster-RCNN by 11.15%, YOLO by 11.88%, and EB by 1.64%. Besides, our algorithm also has achieved top2 comaring with MS-CNN, YOLO-v3, RefineNet, RetinaNet, Faster-rcnn, DSSD and YOLO-v2 of vehicle category in KITTI dataset.

The ETCS Convergence Terminal for Eco-driving and Vehicle Diagnostics (에코-드라이빙과 차량 진단 겸용 ETCS 융합 단말기)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.29-34
    • /
    • 2012
  • Nowadays, the problem of ETCS terminal in becoming popular gradually is that there is no services except for ETC. Therefore, we need new system that provide many type of additional services at one-terminal. In this paper, we study the additory function of ETCS terminal to afford many type of the vehicle administration beside collection and provider of traffic information. We descrived the method of Eco-driving function beside to save fuel signing instant and mean fuel-efficiency, measurement of section fuel-efficiency on OLED and then brings out the best driving habit in people and to prevent dangerous at the wheel as diagnosing engine oil, cooling water, fan belt, the point of changing consumables, diagnoses to an overheated engine, charges on generator through ECU. The multi-services terminal consist of the vehicle diagnosis module base on OBD-II and ETCS terminal.

A Design and Implementation of WML Compiler for WAP Gateway for Wireless Internet Services (무선 인터넷 서비스를 위한 WAP 게이트웨이용 WML 컴파일러의 설계 및 구현)

  • Choi, Eun-Jeong;Han, Dong-Won;Lim, Kyung-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.165-182
    • /
    • 2001
  • In this paper, we describe a design and implementation of the Wireless Markup Language(WML) compiler to deploy wireless Internet services effectively. The WML compiler translates textual WML decks into binary ones in order to reduce the traffic on wireless links that have relatively low bandwidth to wireline links and mitigate the processing overhead of WML decks on, wireless terminals that have relatively low processing power to fixed workstations. In addition, it takes over the overhead of eXtensible Markup Language(XML) well-formedness and validation processes. The WML compiler consists of the lexical analyzer and parser modules. The granunar for the WML parser module is LALR(1) context-free grammar that is designed based on XML 1.0 and WML 1.2 DTD(Document Type Definition) with the consideration of the Wireless Application Protocol Binary XML grammar. The grammar description is converted into a C program to parse that grammar by using parser generator. Even though the tags in WML will be extended or WML DTD will be upgraded, this approach has the advantage of flexibility because the program is generated by modifying just the changed parts. We have verified the functionality of the WML compiler by using a WML decompiler in the public domain and by using the Nokia WAP Toolkit as a WAP client. To measurethe compressibility gain of the WML compiler, we have tested a large number of textual WML decks and obtained a maximum 85 %. As the effect of compression is reduced when the portion of general textual strings increases relative to one of the tags and attributes in a WML deck, an extended encoding method might be needed for specific applications such as compiling of the WML decks to which the Hyper Text Markup Language document is translated dynamically.

  • PDF

Evaluation of Dust Removal Efficiency on Roadway Structures Using Ultrafine Bubble Water Jet (초미세기포 water jet을 이용한 도로 시설물 분진 제거 효율 평가)

  • Kim, Hyun-Jin;Park, Il-gun
    • Clean Technology
    • /
    • v.27 no.1
    • /
    • pp.39-46
    • /
    • 2021
  • A road structure washing vehicle equipped with a 4 HP, 80 LPM ultrafine bubble generator was used to clean a tunnel wall and the surface of the surrounding structure, consisting of concrete and tiles, in a heavy traffic area around an apartment complex in the city. Ultrafine bubbles were generated by supplying air at 2 to 3 LPM and using a specially designed nozzle, whereas fine bubbles made by an impeller in a gas-liquid mixing self-priming pump were produced with an average diameter of 165.4 nm and 6.81 × 107 particles mL-1. Using a high pressure washer gun that can perform high-pressure cleaning at 150 bar and 30 LPM, ultrafine bubbles were used to wash dust adsorbed on the surface of the road structures. The experimental analysis was divided into before and after washing. The samples were analyzed by applying ISO 8502-3 to measure surface contamination of dust adsorbed on the surface. Using the transparent tape attached to the surface, the removal rate was calculated by measuring the weight of the dust, and the number of particles was calculated using the gravimetric method and the software, ImageJ. The results of the experiment showed that the number of dust particles adsorbed on the tile wall surface before and after washing were 3,063 ± 218 particles mL-1 and 20 ± 5 particles mL-1, respectively, with weights of 580 ± 82 mg and 13 ± 4 mg. Particles on the surface of the concrete structure before and after washing were 8,105 ± 1,738 particles mL-1 and 39 ± 6 particles mL-1, respectively, with weights of 1,448 ± 190 mg and 118 ± 32 mg.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.