• Title/Summary/Keyword: internet traffic

Search Result 1,626, Processing Time 0.028 seconds

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

Traffic Analysis of Statistics based on Internet Application Services (인터넷 응용 서비스의 통계에 근거한 트래픽 분석)

  • 정태수;최진섭;정중수;김정태;김대영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.995-1003
    • /
    • 2004
  • A number of Internet application services are used with the development of Internet backbone nowadays. Well-known services such as WWW, ]n, email are provided at first time. Tremendous unwell-known services are presented according to the demands of various contents. After analyzing PDU information of the packet using unwell-known port travelling on the internet, searching internet service type and its statistical data is provided with internet traffic analyst as very useful information. This paper presents the mechanism to extract the internet application services operated on (un)well-known port of UDP or TCP used occasionally through netflow and tcpdump method introduced by ethereal and the operation scheme of the service. Afterwards to get the detailed statistics of the analyzed application service, the agent and the server environment, the agent gathering raw data traffics and the server adapting the traffic received from the agent BNF(Backus-Naur Form) method, is also introduced. Adapting the presented mechanism eve. LAN of Andong national university, the internet traffic service type and the detailed statistics of the analyzed application services which provides with internet traffic analyst are presented as very useful information.

A Study on support QoS using Traffic Engineering in WDM Network (WDM에서 트래픽 엔지니어링을 이용한 QoS 보장에 관한 연구)

  • 김용성;김장복
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.41-44
    • /
    • 2000
  • Because of internet's growth, today's network has a serious bandwidth problem. WDM(Wavelength Division Multiplexing) is a solution of this problem. In the WDM networks, QoS(Quality of Service) is as important as bandwidth. And today's voice over IP technology makes a lot of delay-sensitive internet traffic. De]ay-sensitive internet traffic is growing up, so more QoS is needed. We proposed effective solution to assign QoS.

  • PDF

Traffic Characterization and Analysis for AO/DI Internet Services (AO/DI 인터넷 서비스 도입을 위한 트랙픽 분석 연구)

  • 이강원;국광호;정광재;김태일
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.3
    • /
    • pp.65-79
    • /
    • 2000
  • Based on the results of the internet service survey, the traffic demand forecasts of the AO/DI internet service and N-ISDN service have been performed for each channel(B-channel and D-channel). These traffic forecasts can be used as useful input data for investigating packet processing capacity of the TDX-10A switching system and suggesting guideline for capacity increasement.

  • PDF

Analysis of Aggregated HTTP-based Video Traffic

  • Biernacki, Arkadiusz
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.826-836
    • /
    • 2016
  • Increase of hypertext transfer protocol (HTTP)-based video popularity causes that broadband and Internet service providers' links transmit mainly multimedia content. Network planning, traffic engineering or congestion control requires understanding of the statistical properties of network traffic; therefore, it is desirable to investigate the characteristic of traffic traces generated, among others, by systems which employ adaptive bit-rate streaming. In our work, we investigate traffic originating from 120 client-server pairs, situated in an emulated laboratory environment, and multiplexed onto a single network link. We show that the structure of the traffic is distinct from the structure generated by first and second generation of HTTP video systems, and furthermore, not similar to the structure of general Internet traffic. The obtained traffic exhibits negative correlations, anti-persistence, and its distribution function is skewed to the right. Furthermore, we show that the traffic generated by clients employing the same or similar play-out strategies is positively correlated and synchronised (clustered), whereas traffic originated from different play-out strategies shows negative or no correlations.

Traffic Engineering Based on Local States in Internet Protocol-Based Radio Access Networks

  • Barlow David A.;Vassiliou Vasos;Krasser Sven;Owen Henry L.;Grimminger Jochen;Huth Hans-Peter;Sokol Joachim
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.377-384
    • /
    • 2005
  • The purpose of this research is to develop and evaluate a traffic engineering architecture that uses local state information. This architecture is applied to an Internet protocol radio access network (RAN) that uses multi-protocol label switching (MPLS) and differentiated services to support mobile hosts. We assume mobility support is provided by a protocol such as the hierarchical mobile Internet protocol. The traffic engineering architecture is router based-meaning that routers on the edges of the network make the decisions onto which paths to place admitted traffic. We propose an algorithm that supports the architecture and uses local network state in order to function. The goal of the architecture is to provide an inexpensive and fast method to reduce network congestion while increasing the quality of service (QoS) level when compared to traditional routing and traffic engineering techniques. We use a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm. We use the network simulator ns-2 as the core of our simulation environment. Around this core we built a system of pre-simulation, during simulation, and post-processing software that enabled us to simulate our traffic engineering architecture with only very minimal changes to the core ns-2 software. Our simulation environment supports a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm.

A Study on the Internet based Traffic Intersection Control (인터넷 응용 4지교차로제어에 관한 연구)

  • Jin, Hyun-Soo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.245-247
    • /
    • 2008
  • Traffic intersection conrol is implemented by the data which is acquired to vechile Loop detector. Traffic intersection control equation is Webster equation, which use passing and delayed vechile number. But webster equation is applied to the spot traffic intersection, it is not used to related traffic intersection network system. There is not the approprate remote traffic intersection control, even if there is, it is high cost local network system. Therefore low cost and expert traffic intersection control is realized by internet referencing next and distant intersection traffic information.

  • PDF

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications

  • Luan, Shenji;Bao, Jianrong;Liu, Chao;Li, Jie;Zhu, Deqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1123-1140
    • /
    • 2019
  • Many Internet of Things (IoT) applications involving bursty traffic have emerged recently with event detection. A power management scheme qualified for uplink bursty traffic (PM-UBT) is proposed by distinguishing between bursty and general uplink traffic patterns in the IEEE 802.11 standard to balance energy consumption and uplink latency, especially for stations with limited power and constrained buffer size. The proposed PM-UBT allows a station to transmit an uplink bursty frame immediately regardless of the state. Only when the sleep timer expires can the station send uplink general traffic and receive all downlink frames from the access point. The optimization problem (OP) for PM-UBT is power consumption minimization under a constrained buffer size at the station. This OP can be solved effectively by the bisection method, which demonstrates a performance similar to that of exhaustive search but with less computational complexity. Simulation results show that when the frame arrival rate in a station is between 5 and 100 frame/second, PM-UBT can save approximately 5 mW to 30 mW of power compared with an existing power management scheme. Therefore, the proposed power management strategy can be used efficiently for delay-intolerant uplink traffic in event-driven IoT applications, such as health status monitoring and environmental surveillance.

The Design of a CTI System for reliable video-conference (신뢰성있는 화상회의를 위한 CTI System 설계)

  • 이종열;정현우;박원배
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.225-228
    • /
    • 2000
  • In this paper, a design of the reliable video-conference system using CTI(Computer Telephony Integration) technology is proposed. When video-conference is run on the current existing Internet, the transmission delay problem for voice data traffic can be frequently occurred. In order to transmit the real-time voice data through the Internet efficiently, some complicated algorithms such as CODEC(Code/Decode) should be applied. It can cause further excessive processing delay which can affect the overall performance. The voice traffic is usually transmitted through the reliable PSTN(Public Switched Telephone Network) in the CTI system. In this paper a new architecture, in which PSTN for voice traffic and Internet for video traffic are used at the same time instead of using Internet by itself, is proposed to relieve the problems on a video conference.

  • PDF