• Title/Summary/Keyword: Traffic information

Search Result 7,051, Processing Time 0.033 seconds

RMT: A Novel Algorithm for Reducing Multicast Traffic in HSR Protocol Networks

  • Nsaif, Saad Allawi;Rhee, Jong Myung
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.123-131
    • /
    • 2016
  • The high-availability seamless redundancy (HSR) protocol is one of the most important redundancy IEC standards that has garnered a great deal of attention because it offers a redundancy with zero recovery time, which is a feature that is required by most of the modern substation, smart grid, and industrial field applications. However, the HSR protocol consumes a lot of network bandwidth compared to the Ethernet standard. This is due to the duplication process for every sent frame in the HSR networks. In this paper, a novel algorithm known as the reducing multicast traffic (RMT) is presented to reduce the unnecessary redundant multicast traffic in HSR networks by limiting the spreading of the multicast traffic to only the rings that have members associated with that traffic instead of spreading the traffic into all the network parts, as occurs in the standard HSR protocol. The mathematical and the simulation analyses show that the RMT algorithm offers a traffic reduction percentage with a range of about 60-87% compared to the standard HSR protocol. Consequently, the RMT algorithm will increase the network performance by freeing more bandwidth so as to reduce HSR network congestion and also to minimize any intervention from the network administrator that would be required when using traditional traffic filtering techniques.

Simulation Analysis about Effects on Highway Network and Drivers under Information Providing Service (정보제공 서비스가 운전자 및 도로 네트워크에 미치는 영향에 대한 시뮬레이션 분석)

  • ;IIDA, Yasunori;;UNO, Nobuhiro
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.3
    • /
    • pp.85-96
    • /
    • 2003
  • To build traffic information providing services by ITS technology should be carried out effect analysis in the first step for social and individual advantages. The propose on this study is to make clear what influences of highway network by traffic information are, and what differences between drivers who use traffic information and drivers who do not use that for route choice are. For these propose. travel time and forecast error of travel time on network and traffic information dependence of driver are analyzed by simulation. As a result of analysis travel time and forecast error of travel time is that the efficiency and reliability of travel time were increased when getting more drivers using traffic information in network. Drivers who using traffic information had advantage of decrease of travel time and forecast error in only definite situation. traffic information dependence analysis presented that drivers are dependent upon information and reliability of traffic information is also increased when drivers using traffic information become on increasing in network. In conclusion, considering the range of the traffic information user ratio in this simulation, this study presents that the traffic information service provides an advantage to the highway network and the drivers, and increases the dependence of information.

Evaluating of Traffic Flow Distributed Control Strategy on u-TSN(ubiquitous-Transportation Sensor Network) (V2I 통신을 이용한 교통류 분산제어 전략 수립 및 평가)

  • Kim, Won-Kyu;Lee, Min-Hee;Kang, Kyung-Won;Kim, Byung-Jong;Kang, Yeon-Su;Oh, Cheol;Kim, Song-Ju
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.3
    • /
    • pp.122-131
    • /
    • 2009
  • Ubiquitous-Transportation sensor network is able to realize a vehicle ad-hoc network. Since there are some problems in an existing ITS system, the new technology and traffic information strategies are requirements in this advanced system, u-TSN. The purposes of this paper is to introduce the components on u-TSN system, establish new traffic strategies for this system, and then evaluate these strategies by making a comparative study of ITS and using micro traffic simulator, AIMSUN. The strategy evaluated by AIMSUN is position-based multicast strategy which provides traffic information to vehicles using V2I (vehicle to Infrastructure) communication. This paper focuses on the providing real-time route guidance information when congestion is occurred by the incidents. This study estimates total travel time on each route by API modules. Result from simulation experiments suggests that position-based multicast strategy can achieve more optimal network performance and increased driver satisfaction since the total accumulated travel times of both the major road and the total system on position-based multicast strategy are less than those on VMS.

  • PDF

A New AAL2 Scheduling Algorithm for Mobile Voice and Data Services over ATM

  • Huhnkuk Lim;Dongwook lee;Kim, Kiseon;Kwangsuk Song;Changhwan Oh;Lee, Suwon
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.229-232
    • /
    • 2000
  • AAL2 has been adopted for bandwidth-efficient trans-mission of low bit tate traffic over ATM networks in ITUT and ATM Forum. Since ATM/AAL2 is expected to be used as a switching technology in third-generation mobile access networks and mobile data traffic is expected to increase rapidly in near future, there must be a need for efficient scheduling scheme satisfying the QoS requirement of ow bit rate voice as well as the one of high bit rate data. In this paper, we propose a new class-scheduling scheme to improve data packet loss probability, while Qos of voice traffic is guaranteed, when data traffic is multiplexed together with mobile voice traffic into a single ATM VCC. The proposed scheme can efficiently support data traffic by assigning a time threshold value to voice traffic. Through simulation study, we show that the proposed scheme does not only achieve better efficiency for providing both mobile voice and data services than HOL class-scheduling scheme and normal FIFO scheme, but also guarantees mean voice packet delay under a certain criteria.

  • PDF

Design of Traffic Data Acquisition System with Loop Defector and Piezo-Electric Sensor (루프검지기와 피에조 센서를 이용한 차량정보 수집 시스템 설계)

  • 한경호;양승훈
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.6
    • /
    • pp.102-108
    • /
    • 2002
  • This paper handles the design of a real time traffic data acquisition system using loop detector and piezo-electric sensor to acquire the vehicle information EISA compatible parallel I/O interface card is designed to sample 30 I/O channels at variable rates for raw traffic data acquisition. The control software is designed to generate the traffic data informations from the raw data. The traffic data information provides vehicle length, speed, number of axles, etc. Vehicle types are detected and categorized into eleven types from the vehicle length, axles positions and axle counts information. The traffic information is formed into packet and transferred to the remote hosts through serial communications for ITS applications.

A Video Traffic Flow Detection System Based on Machine Vision

  • Wang, Xin-Xin;Zhao, Xiao-Ming;Shen, Yu
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1218-1230
    • /
    • 2019
  • This study proposes a novel video traffic flow detection method based on machine vision technology. The three-frame difference method, which is one kind of a motion evaluation method, is used to establish initial background image, and then a statistical scoring strategy is chosen to update background image in real time. Finally, the background difference method is used for detecting the moving objects. Meanwhile, a simple but effective shadow elimination method is introduced to improve the accuracy of the detection for moving objects. Furthermore, the study also proposes a vehicle matching and tracking strategy by combining characteristics, such as vehicle's location information, color information and fractal dimension information. Experimental results show that this detection method could quickly and effectively detect various traffic flow parameters, laying a solid foundation for enhancing the degree of automation for traffic management.

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

Development Of Qualitative Traffic Condition Decision Algorithm On Urban Streets (도시부도로 정성적 소통상황 판단 알고리즘 개발)

  • Cho, Jun-Han;Kim, Jin-Soo;Kim, Seong-Ho;Kang, Weon-Eui
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.6
    • /
    • pp.40-52
    • /
    • 2011
  • This paper develops a traffic condition decision algorithm to improve the reliability of traffic information on urban streets. This research is reestablished the criteria of qualitative traffic condition categorization and proposed a new qualitative traffic condition decision types and decision measures. The developed algorithm can be classified into 9 types for qualitative traffic condition in consideration of historical time series of speed changes and traffic patterns. The performance of the algorithm is verified through individual matching analysis using the radar detector data in Ansan city. The results of this paper is expected to help promotion of the traffic information processing system, real-time traffic flow monitoring and management, use of historical traffic information, etc.

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.

TPEG Application as a Protocol of Traffic Information for DMB in Korea (TPEG의 국내 DMB 교통정보 전송형식 적용 가능성 연구)

  • Hyun Cheol-Seung;Han Won-Sub;Kim Dong-Hyo;Hong You-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.128-134
    • /
    • 2006
  • Traffic information protocol in DMB is very different from existing analog broadcasting and wireless communication network. In this paper, we examined whether traffic information protocol of Europe Broadcasting Union(TPEG) is applicable to domestic DMB. Also, we proposed a division of classification on kinds of franc information, and related data that it is required to transmit traffic information of TPEG form. We composed of experiment equipment and studied whether is expressed traffic informations as like accident, event, traffic condition and CCTV image on car navigation system. The results obtained it can be given expression to phrases from TPEG streaming data and to link with electronics map by decoding TPEG straming data. Also it can be expressed CCTV and graphic image which is composed of TPEG form.