• Title/Summary/Keyword: Traffic data

Search Result 4,753, Processing Time 0.033 seconds

The study on Traffic management in Mobile Ad-hoc Network (이동 Ad-hoc 네트워크에서의 트래픽 관리에 관한 연구)

  • 강경인;박경배;유충렬;문태수;정근원;정찬혁;이광배;김현욱
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2002.05a
    • /
    • pp.121-127
    • /
    • 2002
  • In this paper, we propose traffic management support and evaluate the performance through simulation. We suggest traffic management routing protocol that can guarantee reliance according to not only reduction of the Network traffic congestion but also distribution of the network load that prevents data transmission. For performance evaluation, we analyzed the average data reception rate and network load, considering the node mobility. We found that in the mobile Ad Hoc networks, the traffic management service increased the average data reception rate and reduced the network traffic congestion and network load in Mobile Ad Hoc Networks.

  • PDF

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering

  • Zeng, Yi;Chen, Thomas M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.134-146
    • /
    • 2009
  • Traffic classification seeks to assign packet flows to an appropriate quality of service(QoS) class based on flow statistics without the need to examine packet payloads. Classification proceeds in two steps. Classification rules are first built by analyzing traffic traces, and then the classification rules are evaluated using test data. In this paper, we use self-organizing map and K-means clustering as unsupervised machine learning methods to identify the inherent classes in traffic traces. Three clusters were discovered, corresponding to transactional, bulk data transfer, and interactive applications. The K-nearest neighbor classifier was found to be highly accurate for the traffic data and significantly better compared to a minimum mean distance classifier.

Mobile Traffic Trends (모바일 트래픽 동향)

  • Jahng, J.H.;Park, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.106-113
    • /
    • 2019
  • Mobile traffic is one of the most important indexes of the growth of the mobile communications market, and it has a close relationship with subscribers' service usage patterns, frequency demand and supply, network management, and information communication policy. The purpose of this paper is to understand mobile data usage in Korea and to suggest the optimal steps for establishing the frequency supply and demand system by researching the traffic trends that reflect the characteristics of radio resources in the mobile communications field. To achieve this goal, attempts were made to increase the possibility of policy use by analyzing and forecasting mobile traffic trends, and to improve the accuracy of the research through the verification of the existing prediction results. The paper ends with a discussion of the necessity of a frequency management system based on data science.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.19-27
    • /
    • 2021
  • In this paper, we present a method for effectively predicting traffic volume based on vehicle location data that are collected by using LDP (Local Differential Privacy). The proposed solution in this paper consists of two phases: the process of collecting vehicle location data in a privacy-presering manner and the process of predicting traffic volume using the collected location data. In the first phase, the vehicle's location data is collected by using LDP to prevent privacy issues that may arise during the data collection process. LDP adds random noise to the original data when collecting data to prevent the data owner's sensitive information from being exposed to the outside. This allows the collection of vehicle location data, while preserving the driver's privacy. In the second phase, the traffic volume is predicted by applying deep learning techniques to the data collected in the first stage. Experimental results with real data sets demonstrate that the method proposed in this paper can effectively predict the traffic volume using the location data that are collected in a privacy-preserving manner.

NetFlow based IPv6 user's Flow traffic monitoring (NetFlow 기반 IPv6 사용자 Flow traffic 모니터링)

  • Kim, Sung-Su;Song, Wang-Cheol;Oh, Yong-Taek;Choi, Deok-Jai
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.42-46
    • /
    • 2006
  • As the next generation internet (NGI) is supporting High-speed in Gbps rate with the appearance of advanced network technologies, various applications that require high data rates. have been experimented and operated. By using high speed application services, many kinds of problems can be generated but we cannot easily grasp their reasons. However, if the user monitors the end-to-end one's flow data information (path and data rate in each router, state of each router) he can find them more accurately Until now, we have found out the fact that systems which can network-widely monitor end-to-end flow have not be developed yet, only simple systems which can monitor user's individual flow data at just one node are developed In this study, we suggest and materialize a system which can analyze bandwidth in real time by searching routing paths and measuring packet transfer rate between end-to-end flow data and supported flow traffic of using IPv6.

  • PDF

Network Traffic Analysis System Based on Data Engineering Methodology (데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템)

  • Han, Young-Shin;Kim, Tae-Kyu;Jung, Jason J.;Jung, Chan-Ki;Lee, Chil-Gee
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.27-34
    • /
    • 2009
  • Currently network users, especially the number of internet users, increase rapidly. Also, high quality of service is required and this requirement results a sudden network traffic increment. As a result, an efficient management system for huge network traffic becomes an important issue. Ontology/data engineering based context awareness using the System Entity Structure (SES) concepts enables network administrators to access traffic data easily and efficiently. The network traffic analysis system, which is studied in this paper, is designed and implemented based on a model and simulation using data engineering methodology to be avaiable in evaluating large network traffic data. Extensible Markup Language (XML) is used for metadata language in this system. The information which is extracted from the network traffic analysis system could be modeled and simulated in Discrete Event Simulation (DEVS) methodology for further works such as post simulation evaluation, web services, and etc.

Performance Analysis of Reverse Traffic Channels for Mixed Voice and Data Services Using Computer Simulation in CDMA Cellular Systems (CDMA 이동 통신 시스템에서 음성과 데이터의 동시 서비스를 위한 역방향 트래픽 채널 할당 방법과 컴퓨터 시뮬레이션을 이용한 용량 분석)

  • 최우용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5A
    • /
    • pp.651-659
    • /
    • 2000
  • In this paper, a computer simulation approach is proposed to analyze the performance of reverse traffic channels in a base station serving voice and data calls in CDMA cellular systems. It is assumed that multiple traffic channels simultaneously serve a data call and a voice call is served by one traffic channel in a base station. The numerical examples will be presented to derive the capacity of traffic channels from the parameters such as the arrival rates and mean durations of voice and data calls, the soft handoff area ratio, etc..

  • PDF

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

Development of Car Accidents Person Fatality Model using Data Mining (데이터 마이닝을 이용한 차량 사고자 사망확률 모형)

  • Kim Cheon-Shik;Hong You-Shik;Jung Myung-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.25-31
    • /
    • 2006
  • In this paper, a fatality model of car accident using data mining is proposed with the goal of reducing fatality of traffic accident. The analysis results with a proposed fatality model are utilized to improve a technology and environment for driving. For this, traffic accident data are collected, a data mining algorithm is applied to this data, and then, a fatality model of car accident is developed based on the analysis. The training data as well as test data are utilized to develop the fatality model. The important factors to cause fatality in traffic accidents can be investigated using the model. If these factors are taken into account in traffic policies and driving environment, it is expected that the fatality rate of traffic accident can be reduced hereafter.

Analysis of Diversion Rate using Expressway Traffic Data(FTMS, TCS): Focusing on Maesong~Balan IC at Seohaean Expressway (고속도로 교통데이터(FTMS, TCS)를 이용한 경로전환율 분석: 서해안고속도로 매송~발안 구간을 중심으로)

  • Ko, Han-Geom;Choi, Yoon-Hyuk;Oh, Young-Tae;Choi, Kee-Choo
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.3
    • /
    • pp.31-41
    • /
    • 2012
  • Due to growing interests in the distribution of traffic volume through information dissemination such as VMS and traffic broadcasting system, the research on the driver's reaction and effect of the traffic report has continued. In this study, we propose a methodology, which estimates the traffic volume of diversion and the consequential diversion rate using FTMS data and TCS data, and the estimation is based on the analysis of the national highway and IC, in which real-time FTMS and TCS data are established. We also calculate the diversion rate of actual targeted sections and analyze the changes in time and spatial diversion rate. In this study, we define a deviation (considering a deviation due to dynamic properties of traffic conditions) found when the outflow traffic volume is temporarily higher than the average outflow traffic volume on a relevant time slot after providing traffic information. The diverting volume is considered to be caused by the traffic information, and the study determines the ratio of traffic volume on highways to that of route diversion as the diversion rate. The analysis on changes in the diversion rate in accordance with the time flow, the initial change in the diversion rate on upstream IC that first acquires the report on the traffic congestion is significant. After that, the change in the diversion rate on upstream IC affects the route diversion on downstream IC with spatial and time flow, and this again leads the change in upstream IC. Thereby, we confirmed that there is a feedback-control circulation system in the route diversion.