• Title/Summary/Keyword: traffic collection

Search Result 329, Processing Time 0.032 seconds

An Study on navy rebuilding and Special Tax Collection of Yi Soon-shin (이순신의 수군재건과 특별조세 징수에 관한 연구)

  • Choi, Hack Sam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.9-16
    • /
    • 2018
  • This study focuses on investigate to the Special Tax of the Seaway Traffic Certificate collected by Tongjeyoung for secure of Gunyangmi and safety of the people and military recruitment for the navy rebuilding carried out by Yi Soon-sin of Jeongyujaeran period. In addition, I examined Yu-Hyeng, Lee Eui-On, Choi Hee-Ryang, and Jung Sa-Joon's brothers who played a major role in helping Yi Soon-sin and rebuilding the navy. Yi Soon-sin is the person to be sown forever as the Holy Hero of the save country that saved Chosun from the aggression of the Japen enemy. In addition to these contents, this study has significance in focusing on the part where Yi Soon-shin went beyond the top commander of the navy army organization and exerted his ability as the administrator for the nation and the people.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

Technique for Estimating the Number of Active Flows in High-Speed Networks

  • Yi, Sung-Won;Deng, Xidong;Kesidis, George;Das, Chita R.
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.194-204
    • /
    • 2008
  • The online collection of coarse-grained traffic information, such as the total number of flows, is gaining in importance due to a wide range of applications, such as congestion control and network security. In this paper, we focus on an active queue management scheme called SRED since it estimates the number of active flows and uses the quantity to indicate the level of congestion. However, SRED has several limitations, such as instability in estimating the number of active flows and underestimation of active flows in the presence of non-responsive traffic. We present a Markov model to examine the capability of SRED in estimating the number of flows. We show how the SRED cache hit rate can be used to quantify the number of active flows. We then propose a modified SRED scheme, called hash-based two-level caching (HaTCh), which uses hashing and a two-level caching mechanism to accurately estimate the number of active flows under various workloads. Simulation results indicate that the proposed scheme provides a more accurate estimation of the number of active flows than SRED, stabilizes the estimation with respect to workload fluctuations, and prevents performance degradation by efficiently isolating non-responsive flows.

  • PDF

Study on Discharge Electrode Design applied for Road Tunnel (터널용 전기집진시스템 개발을 위한 방전극 설계)

  • Kim, Jong-Ryul;Weon, Jong-Oung;Jang, Chun-Man
    • Proceedings of the SAREK Conference
    • /
    • 2009.06a
    • /
    • pp.1238-1243
    • /
    • 2009
  • As Social Overhead Capital(SOC) has been expanded, the highway road construction has been accelerated and city road system has been more complicated. So, long road tunnels have been increased and traffic flow rate also has been raised. Accordingly, the exhausting gas of vehicle cars seriously deteriorates the tunnel inside air quality and driving view. In order to improve tunnel inside air quality, it is needed to introduce a compulsory ventilation system as well as natural ventilation mechanism. The former, that is, a special compulsory ventilation facility is very useful and helpful to prevent a tunnel of being contaminated by traffic in most case. In the case of obtaining clearer and longer driving view, the ventilation systems have to be considered in order to remove floating contaminants or exhaust gas from engines. In this paper, discharge electrode design technology will be discussed.

  • PDF

Deploying Ubiquitous Traffic Flow Control System under the ITS Environments (ITS 환경에 유비쿼터스 교통관리시스템 접목 가능성 연구)

  • Park, Eun-Mi;Oh, Hyun-Sun;Suh, Euy-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.5
    • /
    • pp.36-46
    • /
    • 2011
  • It is thought traffic flow management under the ubiquitous transportation system has great potential in view of individual vehicle data availability and V2V, V2I two-way communication environments. However, it is expected that deployment of the ubiquitous transportation system takes some time. Therefore it is necessary to evaluate the feasibility of the algorithm under the ITS environment. The speed management algorithm proposed in the previous research is revised to fit for the ITS data collection and information provision environment. And the feasibility of the algorithm is evaluated through simulation experiments.

A Study on design of G.983.1 based MAC protocol for ATM-PON (ATM-PON에서의 G.983.1을 적용한 매체 접근 제어 프로토콜의 설계에 관한 연구)

  • 장성호;노태곤;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.125-128
    • /
    • 2001
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtVBR, nrtVBR, ABR aild UBR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm.

  • PDF

Design and performance evaluation of G.983.1 based on Dynamic UC Protocol for ATM-PON (ATM-PON에서의 G.983.1을 이용한 Dynamic MAC Protocol의 설계 및 성능평가)

  • Jang, Seong-Ho;Jang, Jong-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.523-530
    • /
    • 2002
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtYBR, nrtYBR, UBR and ABR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm. From the simulation result, we have confirmed that our proposed scheme can reduce the average cell delay in comparison to that of conventional MAC schemes.

Improvement of SNMP Performance using the Group Polling (그룹폴링을 이용한 SNMP 성능 개선)

  • 홍종준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.120-125
    • /
    • 2000
  • SNMP(Simple Network Management Protocol) could have the overhead of network, if the number of the agent system which is managed by the management system is increased by the polling for the collection of network management information and the reply traffic for it. In this Paper, the polling method used in SNMP is improved, and Group Polling method is proposed. This can reduce the overhead of network, on case that the agent system is to be increased. The proposed method collects information by grouping agent systems, and have smaller reply latency time and communication overhead than the previous method. So if the number of agent system or the Polling count is numerous, the proposed method is more efficient. As the result of the prototype test, the increasement of agent system can have small variation of traffic and transmission delay time.

  • PDF

Design and Performance Evaluation of G.983.1 based on Dynamic MAC Protocol for ATM-PON (ATM-PON에서 G.983.1을 이용한 Dynamic MAC Protocol의 설계 및 성능 평가)

  • 장성호;장종욱;이대봉;노태곤
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.353-356
    • /
    • 2001
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtVBR, nrtVBR, UBR and ABR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm. from the simulation result, we have confirmed that our proposed scheme ran reduce the average tell delay in comparison to that of conventional MAC schemes.

  • PDF

Feature Selection with PCA based on DNS Query for Malicious Domain Classification (비정상도메인 분류를 위한 DNS 쿼리 기반의 주성분 분석을 이용한 성분추출)

  • Lim, Sun-Hee;Cho, Jaeik;Kim, Jong-Hyun;Lee, Byung Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 2012
  • Recent botnets are widely using the DNS services at the connection of C&C server in order to evade botnet's detection. It is necessary to study on DNS analysis in order to counteract anomaly-based technique using the DNS. This paper studies collection of DNS traffic for experimental data and supervised learning for DNS traffic-based malicious domain classification such as query of domain name corresponding to C&C server from zombies. Especially, this paper would aim to determine significant features of DNS-based classification system for malicious domain extraction by the Principal Component Analysis(PCA).