• Title/Summary/Keyword: Traffic Monitoring

Search Result 734, Processing Time 0.025 seconds

Traffic Control Algorithm for Periodic Traffics in WSN (WSN에서 주기적 트래픽 처리를 위한 트래픽 제어 알고리즘)

  • Kim, Jeonghye;Lee, Sungkeun;Koh, Jingwang;Park, Jaesung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.44-50
    • /
    • 2010
  • Wireless sensor network is consist of multiple sensor nodes and performs a shared tasks through the coordination of sensor nodes. Traffic in WSN is categorized as periodical monitoring traffic, event-driven traffic and query-based traffic. Periodic traffic takes significant proportion of the whole traffic processing because multiple sensor nodes generate traffic in a steady interval although the generation frequency of periodic traffic is low. In this paper, we propose a traffic control algorithm of network protocol for periodic traffic in terms of energy efficiency and conduct performance analysis of the algorithm.

Adaptive Network Monitoring Strategy for SNMP-Based Network Management (SNMP 기반 네트워크관리를 위한 적응형 네트워크 모니터링 방법)

  • Cheon, Jin-young;Cheong, Jin-ha;Yoon, Wan-oh;Park, Sang-bang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1265-1275
    • /
    • 2002
  • In the network management system, there are two approaches; the centralized approach based on SNMP and the distributed approach based on mobile agent. Some information changes with time and the manager needs to monitor its value in real time. In such a case, the polling is generally used in SNMP because the manager can query agents periodically. However, the polling scheme needs both request and response messages for management information every time, which results in network traffic increase. In this paper, we suggest an adaptive network monitoring method to reduce the network traffic for SNMP-based network management. In the proposed strategy, each agent first decides its on monitoring period. Then, the manager collects them and approves each agent's period without modification or adjusts it based on the total traffic generated by monitoring messages. After receiving response message containing monitoring period from the manager, each agent sends management information periodically without the request of manager. To evaluate performance of the proposed method, we implemented it and compared the network traffic and monitoring quality of the proposed scheme with the general polling method.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Scalable Network Architecture for Flow-Based Traffic Control

  • Song, Jong-Tae;Lee, Soon-Seok;Kang, Kug-Chang;Park, No-Ik;Park, Heuk;Yoon, Sung-Hyun;Chun, Kyung-Gyu;Chang, Mi-Young;Joung, Jin-Oo;Kim, Young-Sun
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.205-215
    • /
    • 2008
  • Many control schemes have been proposed for flow-level traffic control. However, flow-level traffic control is implemented only in limited areas such as traffic monitoring and traffic control at edge nodes. No clear solution for end-to-end architecture has been proposed. Scalability and the lack of a business model are major problems for deploying end-to-end flow-level control architecture. This paper introduces an end-to-end transport architecture and a scalable control mechanism to support the various flow-level QoS requests from applications.

  • PDF

Improvement of Network Traffic Monitoring Performance by Extending SNMP Function

  • Youn Chun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.171-175
    • /
    • 2004
  • Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely

  • PDF

A Study on the Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Huang, Xiao;Ban, Tae-Hak;Ham, Jong-Wan;Jeong, Sun-Chul;Jung, Heo-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.643-645
    • /
    • 2011
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

  • PDF

Establishment of Safety Alert Systems for Urban Air Mobility Operations (도심항공교통(UAM) 운항을 위한 안전 경고 기능 구축)

  • Sang-il Choi;Seung-yeon Nam;Hui-yang Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.2
    • /
    • pp.163-171
    • /
    • 2024
  • In the existing air traffic management (ATM) system, various types of safety alert features are provided based on trajectory data to ensure the safety of aircraft operations, along with aircraft position and detailed flight information. The urban air traffic management (UATM) system for urban air mobility (UAM) should also provide safety alert features to ensure the safety of UAM operations. Considering the operational environment of UAM, it is necessary that the safety alert features provided at least match or exceed those available in the existing ATM system. This study aims to present the safety alert features of the new UATM system that differ from those provided by the existing ATM system before introduction and commercialization of UAM. The study was conducted focusing on the safety alert features that should be provided in the event of a deviation from the UAM's path, and the establishment of the safety alert features was carried out in two parts: approach path monitor (APM), which is applied during the approach phase, and route adherence monitoring (RAM), which is applied during the cruise phase.

HDF: Hybrid Debugging Framework for Distributed Network Environments

  • Kim, Young-Joo;Song, Sejun;Kim, Daeyoung
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.222-233
    • /
    • 2017
  • Debugging in distributed environments, such as wireless sensor networks (WSNs), which consist of sensor nodes with limited resources, is an iterative and occasionally laborious process for programmers. In sensor networks, it is not easy to find unintended bugs that arise during development and deployment, and that are due to a lack of visibility into the nodes and a dearth of effective debugging tools. Most sensor network debugging tools are not provided with effective facilities such as real-time tracing, remote debugging, or a GUI environment. In this paper, we present a hybrid debugging framework (HDF) that works on WSNs. This framework supports query-based monitoring and real-time tracing on sensor nodes. The monitoring supports commands to manage/control the deployed nodes, and provides new debug commands. To do so, we devised a debugging device called a Docking Debug-Box (D2-Box), and two program agents. In addition, we provide a scalable node monitor to enable all deployed nodes for viewing. To transmit and collect their data or information reliably, all nodes are connected using a scalable node monitor applied through the Internet. Therefore, the suggested framework in theory does not increase the network traffic for debugging on WSNs, and the traffic complexity is nearly O(1).

A Study on the Development of a Wide-Area Monitoring and Control System for Tug/barges

  • Moon, Serng-Bae;Kim, Bo-Kyung;Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.33 no.9
    • /
    • pp.609-614
    • /
    • 2009
  • The traffic of tug/barges which are carrying construction materials, large plants for harbor development, or offshore structures has recently increased in the coast of Korea. The west and south coast of Korea are always congested due to a lot of islands and traffic concentration. Specially tug/barges have higher probability of marine accidents due to their bad maneuverability than others. Considering the operational circumstance and maneuverability, this study was to develop a wide-area monitoring and control system for tug/barges in the coastal area of Korea. The system was made in the form of three program modules i.e. navigation analysis program module, monitoring and control program module, database module. And seven functions were programmed to monitor and control the tug/barges efficiently. These are ship information search, tug/barge information and track management, designated area and safe navigation zone management, fairway management, accident data management, warning of danger, safety information management.