• Title/Summary/Keyword: Traffic network system control

Search Result 394, Processing Time 0.034 seconds

The Modeling and Traffic Feedback Control for QoS Management on Local Network (지역 네트워크에서 QoS 관리를 위한 모델링 및 트래픽 피드백 제어)

  • Park Jong-jin;Huh Eui-Nam;Mun Young-song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.39-45
    • /
    • 2003
  • Throughput response characteristics depending on the network bandwidth allocation is needed to be modeled to devise adaptive control mechanism to support QoS of the local network. In this study, we propose a dynamic system model that reveals the response characteristics of network. The adaptive traffic feedback control is applied to this model. And we simulate this system for optimization of adaptive control mechanism.

  • PDF

Design of Internet Traffic Monitoring System Using TCP/IP (TCP/IP를 이용한 인터넷 교통량 모니터링 시스템설계)

  • Jin, Hyun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.99-104
    • /
    • 2010
  • We introduce Internet TCP/IP control system to monitor the traffic volume on the traffic network system. To check the traffic volume on traffic road, we use the traffic detector system shppe of circle or diamond or rectangular. Nevertheless we use traffic detector, we will use internet addressin TCP/IP system. If we use TCP/IP control system, we acquire many good point, we achive high sircurity and low costness traffic monitoring system coming difficulty and high level position. But internet system is very easy and low cost direction. Traffic control system is very more depending on the high techinquesion and very complexity. Therefore we introducing TCP/IP internet addressing control system schemetic point.

A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic (퍼지 로직을 이용한 느린 포트스캔 공격 탐지 및 대응 기법)

  • Kim, Jae-Kwang;Yoon, Kwang-Ho;Lee, Seung-Hoon;Jung, Je-Hee;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.679-684
    • /
    • 2008
  • The slow port scan attack detection is the one of the important topics in the network security. We suggest an abnormal traffic control framework to detect slow port scan attacks using fuzzy rules. The abnormal traffic control framework acts as an intrusion prevention system to suspicious network traffic. It manages traffic with a stepwise policy: first decreasing network bandwidth and then discarding traffic. In this paper, we show that our abnormal traffic control framework effectively detects slow port scan attacks traffic using fuzzy rules and a stepwise policy.

A Study on Distributed Message Allocation Method of CAN System with Dual Communication Channels (중복 통신 채널을 가진 CAN 시스템에서 분산 메시지 할당 방법에 관한 연구)

  • Kim, Man-Ho;Lee, Jong-Gap;Lee, Suk;Lee, Kyung-Chang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.10
    • /
    • pp.1018-1023
    • /
    • 2010
  • The CAN (Controller Area Network) system is the most dominant protocol for in-vehicle networking system because it provides bounded transmission delay among ECUs (Electronic Control Units) at data rates between 125Kbps and 1Mbps. And, many automotive companies have chosen the CAN protocol for their in-vehicle networking system such as chassis network system because of its excellent communication characteristics. However, the increasing number of ECUs and the need for more intelligent functions such as ADASs (Advanced Driver Assistance Systems) or IVISs (In-Vehicle Information Systems) require a network with more network capacity and the real-time QoS (Quality-of-Service). As one approach to enhancing the network capacity of a CAN system, this paper introduces a CAN system with dual communication channel. And, this paper presents a distributed message allocation method that allocates messages to the more appropriate channel using forecast traffic of each channel. Finally, an experimental testbed using commercial off-the-shelf microcontrollers with two CAN protocol controllers was used to demonstrate the feasibility of the CAN system with dual communication channel using the distributed message allocation method.

Mailing List Characteristic from Electronic Mail

  • Khaitiyakun, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.917-921
    • /
    • 2004
  • Principle of mailing list was distributed messages to all subscribers in one time. But mailing list operation has constructed a network traffic problem. Because mailing list manager distributed mails without concentrate on subscriber network. If our network has many of subscribers, there will be redundant data in traffic channel. Submailing list has purpose to reduce problems. Analyses of mailing list characteristic in electronic mail were a feature of submailing list system, which manage by human hand (Network Administrator). That will cause trouble for network traffic if Network Administrator could not seek for mailing list characteristic from e-mails in due time. This article will present ideas and recognize methodology for automatic working in submailing list system. Recognize step begin with capture process, which use to trap e-mail information from transfer channel. Next process is preparing raw data into recognition format. Then the third one is recognize part and find out confidential factor. The last process is make decision and determine which electronic mail has properties of mailing list characteristic. Afterward deliver result to submailing list for carry on.

  • PDF

Traffic Capacity Estimate of Personal Rapid Transit System based on Digraph Model (소형자동궤도차량 시스템의 그래프 모델 기반 수송능력 추정)

  • Won, Jin-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.3
    • /
    • pp.263-267
    • /
    • 2007
  • This study proposes a new methodology to estimate the traffic capacity of a personal rapid transit(PRT) system. The proposed method comprises three steps. The first step models the guideway network(GN) of PRT as a digraph, where its node and link represent a station and a one-way guideway link between two stations, respectively. Given local vehicle control strategies, the second step formulates the local traffic capacities through the nodes and links of the GN model. The third step estimates the worst-case local traffic demands based on a shortest-path routing algorithm and an empty vehicle allocation algorithm. By comparing the traffic estimates to the local traffic capacities, we can determine the feasibility of the given GN in traffic capacity.

A Performance Analysis on the Traffic Control of OSI Network Management Protocol (OSI망 관리 프로토콜의 트래픽 제어에 대한 성능 분석)

  • 변옥환;진용옥
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.758-766
    • /
    • 1992
  • In this paper, the traffic control scheme used by M-cancel-Get services In CMIS /CMIP, OSI network management protocol, is presented and the performance is analyzed. M -Get service which allows a multiple response functional unit is a service that searches an attribute of the managed sys-tem and the service requires a large quantity of response as its typical characteristics. At the time, management response is transmitted Irrelevant to the network condition In the managed as well as In the management system. The management system requests M Canrel-Get service which informs the canrelation of M -Get service (or Information retrieval. In case of using M-Cancel-Get service for traffic control, the point of time for traffic control is propose by the result of simulation on management response time as the number of multiple response packets is Increased. The result is analyzed by processing ratio of the network workload and the average delay time of packets. As a result, the traffic control parameters proposed in the study show superiority in its processing ratio and the average packet delay time. Especially, its performance improves as the size of background traffic density Increase.

  • PDF

A Study on the Command Priority between Railway Traffic Controllers Based on Railway Control System Using AHP Method

  • Chae, Yun Seok;Kim, Sigon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.417-423
    • /
    • 2024
  • This study compared and analyzed the importance of command priority between railway traffic controllers through pairwise comparison of AHP analysis. 27 railway traffic controllers working on metropolitan railway control center, urban railway control center, and unmanned driving control center responded. As a result of the analysis, all the railway traffic controllers generally recognized the train driving control and train signal control as the most important priorities. For the controller in the manned driving system, a train driving control was the highest at 0.375. On the other hand, the controller based on unmanned driving recognized train signal control as the highest priority at 0.469. In the result of the AHP analysis considering all the variables, the braking system was the highest priority at 0.19 based on manned train driving. On the other hand, the controller based on unmanned train driving recognized wired and wireless network systems and SCADA as the highest priority at 0.267.

An Integrated Method for Application-level Internet Traffic Classification

  • Choi, Mi-Jung;Park, Jun-Sang;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.838-856
    • /
    • 2014
  • Enhanced network speed and the appearance of various applications have recently resulted in the rapid increase of Internet users and the explosive growth of network traffic. Under this circumstance, Internet users are eager to receive reliable and Quality of Service (QoS)-guaranteed services. To provide reliable network services, network managers need to perform control measures involving dropping or blocking each traffic type. To manage a traffic type, it is necessary to rapidly measure and correctly analyze Internet traffic as well as classify network traffic according to applications. Such traffic classification result provides basic information for ensuring service-specific QoS. Several traffic classification methodologies have been introduced; however, there has been no favorable method in achieving optimal performance in terms of accuracy, completeness, and applicability in a real network environment. In this paper, we propose a method to classify Internet traffic as the first step to provide stable network services. We integrate the existing methodologies to compensate their weaknesses and to improve the overall accuracy and completeness of the classification. We prioritize the existing methodologies, which complement each other, in our integrated classification system.

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF