• Title/Summary/Keyword: Traffic Overload

Search Result 121, Processing Time 0.026 seconds

Quality Measurement of Data Processing by a Protocol Change of Power SCADA System (전력감시제어설비의 프로토콜 변경에 따른 데이터처리 품질측정)

  • Lee Yong-Doo;Choi Seong-Man;Yoo Cheol-Jung;Chang Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1031-1038
    • /
    • 2005
  • In this paper, the maximum traffic quantity and actual traffic quantify of the data which are needed to grasp the statement of a system will be measured more accurately. A concrete quality measurement will be conducted by analysing a change of traffic quantity according to a protocol change and traffic under an overload condition when there is an accident. As a result can make an opportunity to maximize safety of power SCADA. Furthermore, future traffic quantity can be prospected by knowing current traffic quantity and grasping the rate of increase by the analysis and the information can be used as data to secure the band width in advance. It can make stable operation of power SCADA by arranging the limited network resources efficiently by information analysis of a network and expects more confidence.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Load Balancing Technique using MAP Structure Change on HMIPv6 (HMIPv6에서 MAP 구조를 개선한 부하분산기법)

  • Hong, Won-Sang;Lee, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.135-140
    • /
    • 2005
  • This paper proposes the technique of load balancing with traffic which is concentrated to MAP on the hierarchical mobile IPv6. This technique sends the secondary MAP address using the extension option of IPv6, so the upper level MAP will manage it. Therefore, when the overload occurs, it distributes the overload to the secondary MAP address by using redirect tunneling technique, so the efficient communication becomes possible. We validate the feasibility and result of the proposed technique by using ns-2 simulator.

A study on a Preventive measure of traffic congestion in building security system (빌딩 출입 보안 시스템의 정보폭주 방지방법에 관한 연구)

  • 서창옥;김계국
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • In general, security server controls information of people who usually come to building. In order to exit and entrance, while they bring Identification card into contact with card reader, server admits them into building after asks whether their informations are or not in database. However if many People want to exit and entrance in all direction. it may give rise to a serious traffic congestion. Therefore the delay is due to server's overload. In this paper, we suggested IZA(Identification Zone Algorithm) in order to prevent of traffic congestion.

  • PDF

Design of MAC protocol for Wireless ATM Networks (무선 ATM 망을 위한 매체 전근 제어 프로토콜 설계)

  • Kang, Yong-Un;Yoe, Hyun
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2000.11a
    • /
    • pp.44-48
    • /
    • 2000
  • In this study was modify the PRMA for supporting various types of traffic classes such as CBR, VBR, ABR and UBR. For uplink, we use reservation slots and so the performance will not degrade in case of over load conditions. For downlink broadcasting slots for informing the status of slot reservations are used so the high priority priority terminal can preempt. And we use almost same size buffer as the frame size. So we can dynamically deal with, the traffic changes of VBR terminals. It makes easy for the terminals to reserve supplementary slots. Each terminal is reallocated by the priority of traffic classes and so we can easily select the dropping packets in case of overload conditions. As a result, using our scheme, we can get high channel efficiency and get low packet dropping ratio and delay.

  • PDF

Design of Push Agent Model Using Dual Cache for Increasing Hit-Ratio of Data Search (데이터 검색의 적중률 향상을 위한 이중 캐시의 푸시 에이전트 모델 설계)

  • Kim Kwang-jong;Ko Hyun;Kim Young-ja;Lee Yon-sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.153-166
    • /
    • 2005
  • Existing single cache structure has shown difference of hit-ratio according to individually replacement strategy However. It needs new improved cache structure for reducing network traffic and providing advanced hit-ratio. Therefore, this Paper design push agent model using dual cache for increasing hit-ratio by reducing server overload and network traffic by repetition request of persistent and identical information. In this model proposes dual cache structure to do achievement replace gradual cache using by two caches storage space for reducing server overload and network traffic. Also, we show new cache replace techniques and algorithms which executes data update and delete based on replace strategy of Log(Size) +LRU, LFU and PLC for effectiveness of data search in cache. And through an experiment, it evaluates Performance of dual cache push agent model.

  • PDF

Proposal Scheme of a D2D Communication in Smart Shipyard (스마트 조선소내 D2D 통신 기술 적용 방안 제안)

  • Kim, Su-Hyun;Lee, Seong Ro;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1261-1266
    • /
    • 2014
  • Smart shipyard, all of the business of shipyard by using a mobile application, and the rapid spread of smart equipment, the overload of infrastructure due to a variety of mobile services is expected. Because macrocell and femtecell to reduce the overloading of existing infrastructure, additional core network devices have a problem, in this paper, the efficiency of resources than the communication over the existing infrastructure smart shipyard network to improve, to apply the D2D communication technology that can reduce the load on the infrastructure. The proposed routing path plan in accordance with the transfer method and the traffic type of network configuration and D2D equipment navigation and data for applying a smart shipyard. Whether to execute the function to overload traffic in the core network can send to the optimized path was confirmed by using the state transition diagram. Smart shipyard, by applying D2D communication allow efficient traffic handling than conventional communication method.

An Effective Control of Network Traffic using RTCP for Transmitting Video Streaming Data (비디오 스트리밍 데이타 전송시 RTCP를 이용한 효율적인 네트워크 트래픽 제어)

  • Park, Dae-Hoon;Hur, Hye-Sun;Hong, Youn-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.328-335
    • /
    • 2002
  • When we want to transfer video streaming data through computer networks, we will have to be allocated a larger bandwidth compared to a general application. In general, it causes a serious network overload inevitably due to the limited bandwidth. In this paper, in order to resolve the problem, we haute taken a method for transmitting video streaming data using RTP and RTCP. With RR(Receiver Report) packet in RTCP we will test it to check whether the traffic in a network has occurred or not. If it happened, we haute tried to reduce the overall network traffic by dynamically changing the quantization factor of the Motion JPEG that is one of the encoding styles in JMF. When the ratio of the average of transmission for each session to the average of overall transmission is greater than 7%, we should adjust the amount of data to be transmitted for each session to reach the session mean values. The experimental results show that the proposed method taken here reduces the overload effectively and therefore improves the efficiency for transmitting video streaming data.

A study on the radio protocol for ALE of digital communications in HF band (HF대 디지털통신의 ALE를 위한 무선프로토콜 연구)

  • Go, Yun-Gyu;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.811-814
    • /
    • 2009
  • The HF band maritime communication is have developing to digital methode that techniques should be readied the automatic link establishment of 1:N by coast station to many ship station. Because can use way by polling simply that communication environment calls particular station wicked fellow HF communication states which is much redundancy times for coast station to set link. In amateur radio particular station selective calling do to be using ALE(Automatic Link Establishment) controller by 1:1 automatic link setting way, but expect 1:N link setting by these way in maritime communication very difficult. That is difficult to avoid collision by traffic overload to induce calling of ship stations. Because HF communication considers channel special quality traffic state radio link should be established, and should be applied automatically secures stability of channel as accommodative at traffic overload. In this paper is studied the new radio protocol by 3 step sequency driving of free access, group free access and polling access using multi-tone in single channel.

  • PDF

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.