• Title/Summary/Keyword: Traffic network model

Search Result 916, Processing Time 0.025 seconds

A study about analysis of self-similar characteristics for the optimized design networks (Network 최적 설계를 위한 네트워크 트래픽의 self-similar 특성 분석에 관한 연구)

  • 이동철;김창호;황인수;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.267-271
    • /
    • 2000
  • Traffic analysis during past years used the Poisson distribution or Markov model, assuming an exponential distribution of packet queue arrival. Recent studies, however, have shown aperiodic and burst characteristics of network traffics. Such characteristics of data traffic enable the scalability of network, QoS, optimized design, when we analyze new traffic model having a self-similar characteristic. This paper analyzes the self-similar characteristics of a small-scale mixed traffic in a network simulation, the real network Traffic.

  • PDF

A New Optimization System for Designing Broadband Convergence Network Access Networks (Broadband Convergence Network 가입자 망 설계 시스템 연구)

  • Lee, Young-Ho;Jung, Jin-Mo;Kim, Young-Jin;Lee, Sun-Suk;Park, No-Ik;kang, Kuk-Chang
    • Korean Management Science Review
    • /
    • v.23 no.2
    • /
    • pp.161-174
    • /
    • 2006
  • In this paper, we consider a network optimization problem arising from the deployment of BcN access network. BcN convergence services requires that access networks satisfy QoS meausres. BcN services have two types of traffics : stream traffic and elastic traffic. Stream traffic uses blocking probability as a QoS measure, while elastic traffic uses delay factor as a QoS measure. Incorporating the QoS requirements, we formulate the problem as a nonlinear mixed-integer Programming model. The Proposed model seeks to find a minimum cost dimensioning solution, while satisfying the QoS requirement. We propose two local search heuristic algorithms for solving the problem, and develop a network design system that implements the developed heuristic algorithms. We demonstrate the computational efficacy of the proposed algorithm by solving a realistic network design problem.

Application of Multi-Agent Transport Simulation for Urban Road Network Operation in Incident Case (유고상황 시 MatSIM을 활용한 도시부 도로네트워크 운영 분석)

  • Kim, Joo-Young;Yu, Yeon-Seung;Lee, Seung-Jae;Hu, Hye-Jung;Sung, Jung-Gon
    • International Journal of Highway Engineering
    • /
    • v.14 no.4
    • /
    • pp.163-173
    • /
    • 2012
  • PURPOSES : The purpose of this study is to check the possibilities of traffic pattern analysis using MatSIM for urban road network operation in incident case. METHODS : One of the stochastic dynamic models is MatSIM. MatSIM is a transportation simulation tool based on stochastic dynamic model and activity based model. It is an open source software developed by IVT, ETH zurich, Switzerland. In MatSIM, various scenario comparison analyses are possible and analyses results are expressed using the visualizer which shows individual vehicle movements and traffic patterns. In this study, trip distribution in 24-hour, traffic volume, and travel speed using MatSIM are similar to those of measured values. Therefore, results of MatSIM are reasonable comparing with measured values. Traffic patterns are changed according to incident from change of individual behavior. RESULTS : The simulation results and the actual measured values are similar. The simulation results show reasonable ranges which can be used for traffic pattern analysis. CONCLUSIONS : The change of traffic pattern including trip distribution, traffic volumes and speeds according to various incident scenarios can be used for traffic control policy decision to provide effective operation of urban road network.

Estimating Telephone Network Structure and Investment Cost Changes (교환/전송 기술진화에 따른 전화교환망 구조변화-시뮬레이션 모형에 의한 사례 분석-)

  • 송석재;장석권;전용수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1997.10a
    • /
    • pp.138-141
    • /
    • 1997
  • In this study, a simulation model is developed to analyze the effects of routing and scale-economy of transmission facilities on the traffic network topology and investment cost changes in a metropolitan telephone network. Computational experiments showed that the wide deployment of bifurcated routing in a dual-homing configuration reduces significantly the traffic network connectivity and the investment cost. Its enhanced version, when combined with the subscriber network cost model, can be used as a prototype cost proxy model for figuring out the access charges in a multi-operator environment.

  • PDF

A Study on the Insider Behavior Analysis Framework for Detecting Information Leakage Using Network Traffic Collection and Restoration (네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.125-139
    • /
    • 2017
  • In this paper, we developed a framework to detect and predict insider information leakage by collecting and restoring network traffic. For automated behavior analysis, many meta information and behavior information obtained using network traffic collection are used as machine learning features. By these features, we created and learned behavior model, network model and protocol-specific models. In addition, the ensemble model was developed by digitizing and summing the results of various models. We developed a function to present information leakage candidates and view meta information and behavior information from various perspectives using the visual analysis. This supports to rule-based threat detection and machine learning based threat detection. In the future, we plan to make an ensemble model that applies a regression model to the results of the models, and plan to develop a model with deep learning technology.

A Traffic Model based on the Differentiated Service Routing Protocol (차별화된 서비스제공을 위한 트래픽 모델)

  • 인치형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.947-956
    • /
    • 2003
  • The current IP Routing Protocolspacket networks also need to provide the network QoS based of DiffServ, RSVP, MPLStraffic model which is standardized as IETF reference model for NGN. The first topic of this paper is to propose Traffic-Balanced Routing Protocol(TBRP) to process existing best effort traffic. TBRP will process low priority interactive data and background data which is not sensitive to dealy. Secondly Hierarchical Traffic-Traffic-Scheduling Routing Protocol(HTSRP) is also proposed. HTSRP is the hierarchical routing algorithm for backbone and access networkin case of fixed-wireless convergence network. Finally, HTSRP_Q is proposed to meet the QoS requirement when user want interactive or streaming packet service. This protocol will maximize the usage of resources of access layer based on the QoS parameters and process delay-sensitive traffic. Service classes are categorized into 5 types by the user request, such as conversational, streaming, high priority interactive, low priority interactive, and background class. It could be processed efficiently by the routing protocolstraffic model proposed in this paper. The proposed routing protocolstraffic model provides the increase of efficiency and stability of the next generation network thanks to the routing according to the characteristic of the specialized service categories.

An Efficient Priority Based Adaptive QoS Traffic Control Scheme for Wireless Access Networks

  • Kang Moon-sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.762-771
    • /
    • 2005
  • In this paper, an efficient Adaptive quality-of-service (QoS) traffic control scheme with priority scheduling is proposed for the multimedia traffic transmission over wireless access networks. The objective of the proposed adaptive QoS control (AQC) scheme is to realize end-to-end QoS, to be scalable without the excess signaling process, and to adapt dynamically to the network traffic state according to traffic flow characteristics. Here, the reservation scheme can be used over the wireless access network in order to get the per-flow guarantees necessary for implementation of some kinds of multimedia applications. The AQC model is based on both differentiated service model with different lier hop behaviors and priority scheduling one. It consists of several various routers, access points, and bandwidth broker and adopts the IEEE 802.1 le wireless radio technique for wireless access interface. The AQC scheme includes queue management and packet scheduler to transmit class-based packets with different per hop behaviors (PHBs). Simulation results demonstrate effectiveness of the proposed AQC scheme.

A Study on Analysis Characteristic Self-similar for Network Traffic with Multiple Time Scale (다중화된 네트워크 트래픽의 self-similar 특성 분석에 관한 연구)

  • Cho, Hyun-Seob;Han, Gun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3098-3103
    • /
    • 2009
  • In this paper, self-similar characteristics over statistical approaches and real-time Ethernet network traffic measurements are estimated. It is also shown that the self-similar traffic reflects real Ethernet traffic chareacteristics by comparing TCP-MT source model which is exactly self-similar model to the traditional Poisson model.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

A design and implementation of the traffic source model considering user's moving characteristics in urban areas (도시 사용자 이동특성을 고려한 traffic source model의 설계 및 구현)

  • 유기홍
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1373-1382
    • /
    • 2001
  • Traditionally, Mobile Teletraffic model consists of two sub-models, i.e. the network traffic model and the traffic source model. In this paper, we present the traffic source model by developing MobCall(Mobile Call Simulator) which analyses various mobile wireless environments based on regional characteristics that the base stations are located. User mobility is presented by regional average vehicle speeds and the transportation share rate. Moreover, the user mobility on subway, which is increasing in urban area, is considered in MobCall. Using MobCall, the accumulated number of calls in residential and commercial regions, the handoff rate with respect to traffic sources of Seoul, the handoff rate on highway, and the handoff rate according to the call duration are presented. MobCall enables the simulation of dynamic handoff buffering and functional entity control of one base station according to the changes in user's calling pattern at the design phase.

  • PDF