• Title/Summary/Keyword: internet traffic data

Search Result 598, Processing Time 0.027 seconds

Adaptive Data Transmission Control for Multilane-Based Ethernet

  • Han, Kyeong-Eun;Kim, Kwangjoon;Kim, SunMe;Lee, Jonghyun
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.146-149
    • /
    • 2013
  • We propose a reconciliation sublayer (RS)-based lane and traffic control protocol for energy-efficient 40-G/100-G Ethernet. The RS performs active/inactive lane control and data rate adaptation depending on active lane information received from the upper layer. This protocol does not result in a processing delay in the media access control layer, nor is an additional buffer required at the physical layer for dynamic lane control. It ensures minimal delay and no overhead for the exchange of control frames and provides a simple adaptive data rate.

Optimal Provider Mobility in Large-Scale Named- Data Networking

  • Do, Truong-Xuan;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4054-4071
    • /
    • 2015
  • Named-Data Networking (NDN) is one of the promising approaches for the Future Internet to cope with the explosion and current usage pattern of Internet traffic. Content provider mobility in the NDN allows users to receive real-time traffic when the content providers are on the move. However, the current solutions for managing these mobile content providers suffer several issues such as long handover latency, high cost, and non-optimal routing path. In this paper, we survey main approaches for provider mobility in NDN and propose an optimal scheme to support the mobile content providers in the large-scale NDN domain. Our scheme predicts the movement of the provider and uses state information in the NDN forwarding plane to set up an optimal new routing path for mobile providers. By numerical analysis, our approach provides NDN users with better service access delay and lower total handover cost compared with the current solutions.

Study on the Functional Classification of IM Application Traffic using Automata (오토마타를 이용한 메신저 트래픽의 기능별 분류에 관한 연구)

  • Lee, Sang-Woo;Park, Jun-Sang;Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.921-928
    • /
    • 2011
  • The increase of Internet users and services has caused the upsurge of data traffic over the network. Nowadays, variety of Internet applications has emerged which generates complicated and diverse data traffic. For the efficient management of Internet traffic, many traffic classification methods have been proposed. But most of the methods focused on the application-level classification, not the function-level classification or state changes of applications. The functional classification of application traffic makes possible the in-detail understanding of application behavior as well as the fine-grained control of applications traffic. In this paper we proposed automata based functional classification method of IM application traffic. We verified the feasibility of the proposed method with function-level control experiment of IM application traffic.

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

Traffic Information and Path Guidance System is based on Windows CE Board using GPS and HSDPA (GPS와 HSDPA를 이용한 Windows CE 보드 기반의 교통량 수집 장치 및 경로 서비스에 관한 연구)

  • Kim, Tae-Min;Kim, Sun-Kyun;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.401-403
    • /
    • 2007
  • This paper present the Traffic information system that based on embedded WinCE board which has GPSand HSDPA. This system is able to overcome the limit of area using the Internet service other system can't provide. When the embedded board receives the data which has geometric and vehicle speed information, it transmits the data to server via HSDPN/the Internet. The server receives and processes the data for the path services. By an algorithm the data that road information is applied is provided to user. The users will be able to arrive there destination faster.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

A Dynamic Priority Control Method to Support an Adaptive Differentiated Service in Home Networks (홈 네트워크에서 적응적 차등화 서비스를 위한 동적 우선순위 조절 기법)

  • 정광모;임승옥;민상원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.641-649
    • /
    • 2004
  • We propose a dynamic traffic management model which uses adaptive priority reassignment algorithm to deliver service differentiation in home networks, and implement adaptive priority reassignment algorithm using FPGA. The proposed architecture is designed to handle home network traffic without the need for signaling protocol. We categorize home network traffic into three kinds of traffic class: control data traffic class, the Internet data and non-real-time data traffic class, and multimedia data traffic class (include non-real-time and real-time multimedia data traffic). To support differential service about these kinds of traffic class, we designed and implemented a traffic management framework that dynamically change each traffic class priority depending on bandwidth utilization of each traffic class.

The Design and Implementation of Parameter Extraction System for Analyzing Internet Using SNMP (SNMP를 이용한 인터넷 분석 파라미터 추출 시스템의 설계 및 구현)

  • Sin, Sang-Cheol;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.710-721
    • /
    • 1999
  • In this paper, we have designed and implemented a parameter extraction system for analyzing Internet using SNMP. The extraction system has two modules; one is collection request module, and the other is analysis request module. The collection request module generates a polling script, which is used to collect management information from the managed system periodically. With this collected data, analysis request module extracts analysis parameters. These parameters are traffic flow analysis, interface traffic analysis, packet traffic analysis, and management traffic analysis parameter. For management activity, we have introduced two-step-analysis-view. One is Summary-View, which is used find out malfunction of a system among the entire managed systems. The Other is Specific-View. With this view we can analyze the specific system with all our analysis parameters. To show available data as indicators for line capacity planning, network redesigning decision making of performance upgrade for a network device and things like that.

  • PDF

An Empirical Study on the relevance of Web Traffic for Valuation of Internet Companies (인터넷 기업의 웹 트래픽 정보와 기업가치의 상관관계에 관한 실증연구)

  • Yi, Sung-Wook;Hwang, Seung-June
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.79-98
    • /
    • 2009
  • Web traffic is becoming an important indicator to make inferences about internet companies' future prospects so that traditional firm valuation methods need to be modified to integrate the ideas of web traffic information as a major asset of internet companies. It is because web traffic is a measure of attracting visitors to firm's web site and is the basis for internet companies' marketing expenditure and customer acquisition and retention. Also the web traffic represents the internet companies' technological advances and marketability. The major purpose of this study is to show the relevance of web traffic for valuation of internet companies. For this, we test hypothesis with the firm's web traffic and financial data using the analysis model of Hand(2000a) derived from the log-linear model introduced by Ye and Finn(1999). Test results show that the web traffic, more specifically the number of unique visitors, visits, and page views are all positively related to the firm's value. This implies that the web traffic information should be considered as one of the important non-financial indicator for the internet firm valuation.

  • PDF

Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer (애플리케이션 계층에서 트래픽 분석을 위해 부하 차단기를 적용한 네트워크 트래픽 모니터링 시스템)

  • Son Sei-Il;Kim Heung-Jun;Lee Jin-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.53-60
    • /
    • 2006
  • As it has been continuously increased the volume of traffic over Internet, it is hard for a network traffic monitoring system to analysis every packet in a real-time manner. While it is increased usage of applications which are dynamically allocated port number such as peer-to-peer(P2P), steaming media, messengers, users want to analyze traffic data generated from them. This high level analysis of each packet needs more processing time. This paper proposes to introduce load shedder for limiting the number of packets. After it determines what application generates a selected packet, the packet is analyzed with a defined application protocol.

  • PDF