• Title/Summary/Keyword: traffic flows

Search Result 344, Processing Time 0.031 seconds

Adaptive Queue Management in TCP/IP Networks (TCP/IP 네트워크에서 적응적 큐 관리 알고리즘)

  • Kim, Chang Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.153-167
    • /
    • 2010
  • Traffic conditions, in particular number of active TCP flows, change dramatically over time. The main goal of this paper is an adaptive queue management algorithm that can maintain network state of high-throughput and low-delay under changing traffic conditions In this paper, we devise Probability Adaptive RED(PARED) that combines the more effective elements of recent algorithms with a RED core. It automatically adjusts its adaptive marking function to account for changes in traffic load and to keep queue length within the desired target queue length. We simulate that PARED algorithm results in under changes in traffic load and mixed traffic load. The simulation test confirm this stability, and indicate that overall performances of PARED are substantially better than the RED and ARED algorithms.

An Algorithm for Real-Traffic Signal Control at An Isolated-Intersection (실시간 신호제어알고리즘 개발에 관한 연구)

  • Shin, Eon-Kyo;Kim, Young-Chan;Lee, Jong-Man
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.161-167
    • /
    • 2004
  • While most or fixed-time control systems such as UTCS produce the signal timing plans that either maximizing bandwidth or minimizing a disutility index of delay and stops, cannot consider the fluctuation of traffic flow. One category of the traffic-response control systems, which make small changes on a predefined signal plan such as SCOOT, cannot be easily modified for feedback real-time control schemes based on observation of variables other than traffic flow. The other category, which decide to whether switch the traffic lights or not at each step of time as in PRODYN, does not adequately consider the relations between traffic flows and traffic lights at each step of time. In this paper we present a complete formulation that adequately consider the relations between traffic flows and traffic lights at each step of time. The formulation is a binary mixed integer linear programing (BMILP) that obtain traffic lights at each step for minimizing delay. Since numarical examples for application of the proposed model illustrated that the model adequately produced dynamic traffic signal plans minimizing delay at each step, the model may be expected to contribute to advanced transportation management systems (ATMS) for dynamic traffic signal control.

Development of Lane-changing Model for Two-Lane Freeway Traffic Based on CA (Cellular Automata 기반 2차로 고속도로 차로변경모형 개발)

  • Yoon, Byoung Jo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.3D
    • /
    • pp.329-334
    • /
    • 2009
  • The various behaviors of vehicular traffic flow are generated through both car-following and lane-changing behaviors of vehicles. Especially lane-usage varies by lane-changing behaviors. In the area of microscopic vehicle simulation, a lane-changing model connected to a car-following model parallel is essential to generate both various traffic flows relationships and laneusages. In Korea, some studies on car-following models have been reported, but few studies for lane-changing models stay in the beginning stage. In this paper, a two-lane changing model for the simulation modeling of large freeway network is introduced. The lane-changing model is developed based on CA (Cellular Automata) model. The developed model is parallel combined with an existing CA car-following model and tested on a closed link system. The results of simulation show that the developed model generates the various behaviors of lane usage, which existing CA lane-changing models could not generate. The presented model is expected to be used for the simulation of more various freeway traffic flows.

Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links (고속 인터넷 백본 링크상에서의 트래픽 측정에 의한 네트워크 공격 징후 탐지 방법)

  • Roh Byeong-hee
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.23-33
    • /
    • 2004
  • In this paper, we propose a novel traffic measurement based detection of network attack symptoms on high speed Internet backbone links. In order to do so, we characterize the traffic patterns from the normal and the network attacks appeared on Internet backbone links, and we derive two efficient measures for representing the network attack symptoms at aggregate traffic level. The two measures are the power spectrum and the ratio of packet counts to traffic volume of the aggregate traffic. And, we propose a new methodology to detect networks attack symptoms by measuring those traffic measures. Experimental results show that the proposed scheme can detect the network attack symptoms very exactly and quickly. Unlike existing methods based on Individual packets or flows, since the proposed method is operated on the aggregate traffic level. the computational complexity can be significantly reduced and applicable to high speed Internet backbone links.

  • PDF

Analysis of Regional Centrality by Investigating Direct and Indirect Flows of Commuters (통근통행에 의한 직·간접 흐름을 이용한 지역의 중심성 분석)

  • Lee, Jong-Sang;Seo, Ducksu
    • Journal of Agricultural Extension & Community Development
    • /
    • v.27 no.3
    • /
    • pp.125-134
    • /
    • 2020
  • The regional centrality plays a very important role in national and regional planning and it is measured by data such as people, goods, and information flows among regions. The inter-regional flows are usually considered by only direct flows, yet indirect flows, which are generated accordingly from direct flows, are not critically considered. Most centrality studies have also hardly reflected the indirect flow in the network analysis. This study demonstrates the significance of the indirect flows to enhance accuracy of the regional centrality. The nationwide dataset of inter-regional commuter traffic matrix is used in this study and analysed into two groups; one to consider only direct flow and the other both direct and indirect flows. The results indicate remarkable differences of centrality raking between two groups such as Yeongam of Jeonnam Province(+60th), Eumseong of Chungbuk Province(+57th), Gwacheon of Gyeonggi Province (-35th), and Nowon of Seoul (-32nd). It clearly shows the significant influence of indirect flow for regional centrality study. This also reveals regional centrality ranking in Korea by considering direct and indirect flows of commuters. Jung, Gangnam, and Jongno of Seoul are categorized in the highest rank group and Ulleung of Gyeongbuk, Ongjin of Incheon, and Jindo of Jeonnam are in the lowest group. The top group includes seven districts of Seoul, two of Busan, and one of Gyeonggi Province. The bottom group includes mostly island and costal areas. As this study shows an accurate method of centrality measurement, it has a significant implication to lead an effective regional planning.

Queuing Analysis of IEEE 802.15.4 GTS Scheme for Bursty Traffic (Bursty Traffic을 위한 IEEE 802.15.4 GTS 기법의 대기 해석)

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.87-91
    • /
    • 2010
  • The IEEE 802.15.4 and IEEE 802.15.7 standard are the typical of low rate wireless and Visible Light Wireless personal area networks. Its Medium Access Control protocol can support the QoS traffic flows for real-time application through guaranteed time slots (GTS) in beacon mode. However, how to achieve a best allocation scheme is not solved clearly. The current analytical models of IEEE 802.15.4 MAC reported in the literature have been mainly developed under the assumption of saturated traffic or non-bursty unsaturated traffic conditions. These assumptions don't capture the characteristics of bursty multimedia traffic. In this paper, we propose a new analytical model for GTS allocation with burst Markov modulated ON-OFF arrival traffic.

Flow based Sequential Grouping System for Malicious Traffic Detection

  • Park, Jee-Tae;Baek, Ui-Jun;Lee, Min-Seong;Goo, Young-Hoon;Lee, Sung-Ho;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3771-3792
    • /
    • 2021
  • With the rapid development of science and technology, several high-performance networks have emerged with various new applications. Consequently, financially or socially motivated attacks on specific networks have also steadily become more complicated and sophisticated. To reduce the damage caused by such attacks, administration of network traffic flow in real-time and precise analysis of past attack traffic have become imperative. Although various traffic analysis methods have been studied recently, they continue to suffer from performance limitations and are generally too complicated to apply in existing systems. To address this problem, we propose a method to calculate the correlation between the malicious and normal flows and classify attack traffics based on the corresponding correlation values. In order to evaluate the performance of the proposed method, we conducted several experiments using examples of real malicious traffic and normal traffic. The evaluation was performed with respect to three metrics: recall, precision, and f-measure. The experimental results verified high performance of the proposed method with respect to first two metrics.

Performance Benefits of Virtual Path Tunneling for Control and Management Flows in the Broadband ATM Network

  • Choi, Jun-Kyun;Kim, Soo-Hyung;Kim, Nam;Sohn, Sung-Won;Choi, Mun-Kee
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.23-28
    • /
    • 1999
  • In this paper, we analyze the performance benefits of broadband ATM networks when the call control and management flows are separated from user data flows. The virtual path tunneling concept for control and management flows are applied to the same physical ATM networks. The behaviors of channel throughput and transfer delay are analyzed. It results that the proposed virtual short-cut paths can maintain the network being stable with acceptable bandwidth. They are very useful to provide the stable control and management capabilities for Internet and mobile applications in the broadband ATM networks. In our numerical results, the effective throughputs of the proposed virtual shout-ut channel are about three times than those of end-to-end user data channels with hop distances of 10, and about two times than those with hop distance of 5 when the link blocking probability increases to 0.1. It concludes that the effective channel bandwidth are greatly reduced down while physical links are not stable and user traffic flows are occasionally overflowed.

  • PDF

Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

  • Nam, Seung Yeob;Djuraev, Sirojiddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2512-2531
    • /
    • 2014
  • We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. The stress is measured by the time interval during which a given client makes the server busy, referred to as a client-induced server busy period (CSBP). We also need to protect the servers from a sudden surge of attack flows even before the malicious flows are identified by the attack flow detection mechanism. Thus, we use whitelist-based admission control mechanism additionally to control the load on the servers. We evaluate the performance of the proposed scheme via simulation and experiment. The simulation results show that our defense system can mitigate DDoS attacks effectively even under a large number of attack flows, on the order of thousands, and the experiment results show that our defense system deployed on a linux machine is sufficiently lightweight to handle packets arriving at a rate close to the link rate.

DEVELOPMENT OF MATDYMO (MULTI-AGENT FOR TRAFFIC SIMULATION WITH VEHICLE DYNAMICS MODEL) I: DEVELOPMENT OF TRAFFIC ENVIRONMENT

  • CHOI K. Y.;KWON S. J.;SUH M. W.
    • International Journal of Automotive Technology
    • /
    • v.7 no.1
    • /
    • pp.25-34
    • /
    • 2006
  • For decades, simulation technique has been well validated in areas such as computer and communication systems. Recently, the technique has been much used in the area of transportation and traffic forecasting. Several methods have been proposed for investigating complex traffic flows. However, the dynamics of vehicles and diversities of driver characteristics have never been considered sufficiently in these methods, although they are considered important factors in traffic flow analysis. In this paper, we propose a traffic simulation tool called Multi-Agent for Traffic Simulation with Vehicle Dynamics Model (MATDYMO). Road transport consultants, traffic engineers and urban traffic control center managers are expected to use MATDYMO to efficiently simulate traffic flow. MATDYMO has four sub systems: the road management system, the vehicle motion control system, the driver management system, and the integration control system. The road management system simulates traffic flow for various traffic environments (e.g., multi-lane roads, nodes, virtual lanes, and signals); the vehicle motion control system constructs the vehicle agent by using various vehicle dynamic models; the driver management system constructs the driver agent capable of having different driving styles; and lastly, the integrated control system regulates the MATDYMO as a whole and observes the agents running in the system. The vehicle motion control system and driver management system are described in the companion paper. An interrupted and uninterrupted flow model were simulated, and the simulation results were verified by comparing them with the results from a commercial software, TRANSYT-7F. The simulation result of the uninterrupted flow model showed that the driver agent displayed human-like behavior ranging from slow and careful driving to fast and aggressive driving. The simulation of the interrupted flow model was implemented as two cases. The first case analyzed traffic flow as the traffic signals changed at different intervals and as the turning traffic volume changed. Second case analyzed the traffic flow as the traffic signals changed at different intervals and as the road length changed. The simulation results of the interrupted flow model showed that the close relationship between traffic state change and traffic signal interval.