• Title/Summary/Keyword: Traffic information processing

Search Result 1,242, Processing Time 0.025 seconds

A study stack allocation on JIT Code Generator for reducing register load traffic (레지스터 로드 트래픽 감소를 위한 JIT Code Generator에 스택할당 정책 적용 방안 연구)

  • Song, Kyung-Nam;Kim, Hyo-Nam;Won, Yoo-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1541-1544
    • /
    • 2001
  • Java virtual machine의 성능을 향상시키기 위해 "JIT(Just-in-Time)"code generator가 고안되었다[3], JIT code generator는 스택기반의 자바 바이트 코드를 레지스터 기반의 native machine code로 변환해 주는 역할을 수행하여 바이트 코드의 번역시간을 줄여준다. 그러나 JIT 는 많은 레지스터의 사용을 야기시키므로 효율적인 레지스터 allocation 정책이 필요하고 스택과 레지스터 간의 traffic 을 가중시킨다. 그러므로 본 논문에서는 자바 바이트 코드의 효율적인 stack allocation 정책을 JIT code generator에 적용함으로 레지스터와의 traffic을 줄이는 방법을 제시하였다.

  • PDF

Improving Overall WMN Performance in Peak Times Using Load-sharing Aware Gateways

  • Vo, Hung Quoc;Dai, Tran Thanh;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.855-857
    • /
    • 2007
  • In recent years, Wireless Mesh Network (WMN) is a compelling topic to many network researchers due to its low cost in deployment, ease and simplicity in installation and scalability and robustness in operation. In WMN, Gateway nodes (Access Point-AP) are in charge of steering the traffic from the external network (e.g. Internet...) to client devices or mesh clients. The limited bandwidth of wireless links between Gateways and intermediate mesh routers makes the Gateways becomes the bottleneck of the mesh network in both uplink stream and downlink stream. In this paper, we propose a mechanism to permit Gateways collaboratively work to manipulate the traffic to fit our network. They will move the traffic from congested links to the unused capacity on other links.

  • PDF

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

  • Saha, Tonmoy;Shufean, Md. Abu;Alam, Mahbubul;Islam, Md. Imdadul
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.653-678
    • /
    • 2011
  • WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical technique of the two dimensional Markov chain is used to obtain the trajectory of the congestion of the network as a function of a traffic parameter. Finally, a two state phase dependent arrival process is considered to evaluate probability states. The entire analysis is kept independent of modulation and coding schemes.

Design of Open Street Traffic Information System (사용자 기반 대용량 교통정보 시스템 설계)

  • Back, Yeong-Tae;Kim, Sang-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.183-189
    • /
    • 2011
  • This paper suggests a user based OST(Open Street Traffic) system that solves TPEG's one-way communication problem, UTIS's limited usage and DSRC's small traffic bandwidth. In current commercial TPEG service, only some service providers collect traffic information. Thus, it can't cover traffic status in local lanes And UTIS, which local governments and police supports, requires additional equipments. Currently, only taxi and official vehicles use this system. Therefore, new traffic service by mobile device and user's participation can provide very detail traffic information coupling with previous traffic systems. But in this new system, real-time high volume data can be a problem. So, in this paper, new data storage manager design(TDSM :Traffic Data Storage Manager) is suggested and its performance is measured against commercial DBMS.

Performance Improvement of a Real-time Traffic Identification System on a Multi-core CPU Environment (멀티 코어 환경에서 실시간 트래픽 분석 시스템 처리속도 향상)

  • Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.348-356
    • /
    • 2012
  • The application traffic analysis is getting more and more challenging due to the huge amount of traffic from high-speed network link and variety of applications running on wired and wireless Internet devices. Multi-level combination of various analysis methods is desired to achieve high completeness and accuracy of analysis results for a real-time analysis system, while requires much of processing burden on the contrary. This paper proposes a novel architecture for a real-time traffic analysis system which improves the processing performance on multi-core CPU environment. The main contribution of the proposed architecture is an efficient parallel processing mechanism with multiple threads of various analysis methods. The feasibility of the proposed architecture was proved by implementing and deploying it on our campus network.

Performance Improvement of the Payload Signature based Traffic Classification System (페이로드 시그니처 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jun-Sang;Yoon, Sung-Ho;Park, Jin-Wan;Lee, Hyun-Shin;Lee, Sang-Woo;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1287-1294
    • /
    • 2010
  • The traffic classification is a preliminary and essential step for stable network service provision and efficient network resource management. While a number of classification methods have been introduced in literature, the payload signature-based classification method shows the highest performance in terms of accuracy, completeness, and practicality. However, the payload signature-based method has a significant drawback in high-speed network environment that the processing speed is much slower than other classification method such as header-based and statistical methods. In this paper, We describes various design options to improve the processing speed of traffic classification in design of a payload signature based classification system and describes our selections on the development of our traffic classification system. Also the feasibility of our selection was proved through experimental evaluation on our campus traffic trace.

A study on building the platform and development of algorithm for collecting real-time traffic data (실시간 교통정보 수집을 위한 알고리즘 개발 및 플랫폼 구축에 관한 연구)

  • Kim, Dong-Min;Jeong, Young-Mu;Min, Soo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.535-538
    • /
    • 2012
  • Recently active research for ITS(Intelligent Transportation System) helps to build for next generation traffic information system at information society. Build the system for sensing a vehicle speed and traffic information on the road. Provide collected data to driver, flow of overall traffic impacts have a good influence. In this study, research for building the platform and development algorithm that provided from other source processing real-time traffic data provides a more reliable real-time traffic data.

  • PDF

A New Class-Based Traffic Queue Management Algorithm in the Internet

  • Zhu, Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.575-596
    • /
    • 2009
  • Facing limited network resources such as bandwidth and processing capability, the Internet will have congestion from time to time. In this paper, we propose a scheme to maximize the total utility offered by the network to the end user during congested times. We believe the only way to achieve our goal is to make the scheme application-aware, that is, to take advantage of the characteristics of the application. To make our scheme scalable, it is designed to be class-based. Traffic from applications with similar characteristics is classified into the same class. We adopted the RED queue management mechanism to adaptively control the traffic belonging to the same class. To achieve the optimal utility, the traffic belonging to different classes should be controlled differently. By adjusting link bandwidth assignments of different classes, the scheme can achieve the goal and adapt to the changes of dynamical incoming traffic. We use the control theoretical approach to analyze our scheme. In this paper, we focus on optimizing the control on two types of traffic flows: TCP and Simple UDP (SUDP, modeling audio or video applications based on UDP). We derive the differential equations to model the dynamics of SUDP traffic flows and drive stability conditions for the system with both SUDP and TCP traffic flows. In our study, we also find analytical results on the TCP traffic stable point are not accurate, so we derived new formulas on the TCP traffic stable point. We verified the proposed scheme with extensive NS2 simulations.

The Fuzzy Traffic Control Method for ABR Service (ABR 서비스에서 퍼지 트래픽 제어 방식)

  • Yu, Jae-Taek;Kim, Yong-U;Lee, Jin-Lee;Lee, Gwang-Hyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1880-1893
    • /
    • 1996
  • In this paper, we propose the fuzzy traffic control method in ABR service for the effective use of ATM link. This method, a modified version of EPRCA which is one of rate control methods in ABR service, controls the values of the transmission rates of source by using the fuzzy traffic inference based on switch buffer size and buffer variate rate. For this method, we developed a model and algorithm of the fuzzy traffic control method and a fuzzy traffic controller, after studying fuzzy and neural networks which applied to ATM traffic control and EPRCA. For the fuzzy traffic controller, we also designed a membership function, fuzzy control rules and a max-min inferencing method. We conducted a simulation and compared the link utilization of the fuzzy traffic control method with that of the EPRCA method. The results of the simulation indicated that, compared to EPRCA, the fuzzy traffic control method improves the link utilization by 2.3% in a normal distribution model and by 2.7% in the MMPP model of the source.

  • PDF