• Title/Summary/Keyword: traffics

Search Result 549, Processing Time 0.035 seconds

A Study on the Efficient Polling Architecture Design for SNMP (SNMP 기반의 효율적인 데이터 수집 방식에 대한 연구)

  • 윤병수;김채영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.271-274
    • /
    • 2002
  • This paper presents tile efficient polling architecture for simple network management protocol (SNMP). Now a day, tile internet traffics have been increasing rapidly within a few years as the subscriber's network to connect internet is provided commonly. With this trend, the network management traffics also make the same phases. To provide numerous higher Quality services to the customers, the management traffic must be controlled within the permitted limit. This paper proposes the policy-based felling architecture for SNMP MIB with several parameters and suggests the data collecting layer architecture for the efficient polling.

  • PDF

Traffic Management Scheme for Supporting QoS of VBR/ABR Services in ATM Switching Systems (ATM 스위칭 시스템의 VBR/ABR 서비스 품질 지원을 위한 트랙픽 관리 기법)

  • 유인태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1160-1168
    • /
    • 2000
  • This paper presents a real-time integrated traffic management (RITM) scheme that can effectively manage variable bit rate (VBR) and available bit rate (ABR) traffics having unpredictable characteristics in asynchronous transfer mode (ATM) networks. An unique feature of this scheme is that it has a special ATM cell control block which makes it possible to monitor bursty traffics in real-time so that the delay incurred to measure cell arrival rate is minimized. Additionally, the proposed scheme intends to dynamically reassign the leftover network resources to VBR/ABR connections without any deterioration in quality of service (QoS) of the existing connections. The RITM scheme has been verified to reliably monitor incoming traffics and to efficiently manage network resources by computer simulations. The capability of managing the incoming ATM traffics in real-time helps determine an optimal acceptable number of user connections for a given network condition. We can use this value as a threshold to protect the network from being congested and to find out a cost-effective buffer design method.

  • PDF

Time Utility and Channel State based Wireless Downlink Packet Scheduling Algorithm for OFDMA System (OFDMA 무선 시스템에서의 시간-효용과 채널 상태 기반의 하향 링크 패킷 스케줄링)

  • Ryu, Seung-Wan;Seo, Hyun-Hwa;Chung, Soo-Jung;Lim, Soon-Yong;Park, Sei-Kwon
    • IE interfaces
    • /
    • v.17 no.spc
    • /
    • pp.111-121
    • /
    • 2004
  • In this paper, we propose an urgency and efficiency based wireless packet scheduling (UEPS) algorithm that is able to schedule real time (RT) and non-real time (NRT) traffics at the same time. The proposed UEPS algorithm is designed to support wireless downlink packet scheduling in the OFDMA system which is a strong candidate wireless system for the next generation mobile communications. The UEPS algorithm uses the time-utility function as a scheduling urgency factor and the relative status of the current channel to the average one as an efficiency indicator of radio resource usage. The design goal of the UEPS algorithm is to maximize throughput of NRT traffics with satisfying QoS requirements of RT traffics. The simulation study shows that the proposed UEPS algorithm is able to give better throughput performance than existing wireless packet scheduling algorithms such as proportional fair (PF) and modified-largest weighted delay first (M-LWDF) while satisfying QoS requirements of RT traffics such as the average delay and the packet loss rate under various traffic loads.

Harmful Traffic Control Using Sink Hole Routing (싱크홀 라우팅을 이용한 유해 트래픽 제어)

  • Chang, Moon-Soo;Lee, Jeong-Il;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.69-76
    • /
    • 2009
  • The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it's hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.

A Study on Danger Degree Analysis for the Adjacent Waterway of Main Ports in the Korean Southern Area (남해안 주요항만 접근해역의 위험도 분석에 관한 연구)

  • Park, Young-Soo;Kim, Kyung-Tae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.1
    • /
    • pp.71-76
    • /
    • 2008
  • The main ports of Korean south sea are exposed to intensive danger as 58.1% of total vessel in Korea waters and 62.9% of total dangerous cargo ships. Therefore, it is required to establish fundamental database to solve numerous issues at the main ports cf the south sea as studying amount of the vessel traffic and their flows into the main ports, and evaluating degree of danger by traffics environmental stress model as analyzing relationships among degree of danger, maritime accident, and number of vessel arriving or departing in the main ports.

  • PDF

Alternative LSP Allocation for Considering QoS in MPLS Networks (MPLS 망에서 QoS를 고려한 복구경로 할당)

  • 양형규;이병호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.11-18
    • /
    • 2004
  • In this paper, we propose the alternative LSP allocation for MPLS networks required more confidence. In the first place, we must classify the user traffics by the QoS parameter. We assigned altermative LSPs on realtime traffics and then allocated alternative LSPs of non-realtime traffics. The proposed algorithm can provide more confidential alternative LSP by priority method for relatively high cost realtime traffic error. And the proposed algorithm can improve the shortage of network resources what is occured by using a few links when altermative LSPs are setup. The validity of the proposed algorithm has been justified in performance by analysis through simulation results using the program tool and comparison with conventional methods. Also, that improves 9% more than existing method in the recovery ratio-one is 89%, the other is 98%, respectively.

Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions (다중침해가 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.257-262
    • /
    • 2012
  • In this paper, transmission performance for serval VoIP traffics is meaured and analysised over MANET(Mobile Ad-hoc Networks) under some types of intrusions. VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, network delay, packet loss rate and call connection rate is measured for transmission performance. With analysis of measued data, characteristics of each traffics for transmission performance parameters is showed on MANET under multi intrusions, As a results of this paper, some recommendation condtion for codec selection and blackhole intrusion is suggested to implement VoIP services on MANET under multi intrusions like as DDoS and blockhole intrusions.

Traffic Estimation Method for Visual Sensor Networks (비쥬얼 센서 네트워크에서 트래픽 예측 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1069-1076
    • /
    • 2016
  • Recent development in visual sensor technologies has encouraged various researches on adding imaging capabilities to sensor networks. Video data are bigger than other sensor data, so it is essential to manage the amount of image data efficiently. In this paper, a new method of video traffic estimation is proposed for efficient traffic management of visual sensor networks. In the proposed method, a first order autoregressive model is used for modeling the traffic with the consideration of the characteristics of video traffics acquired from visual sensors, and a Kalman filter algorithm is used to estimate the amount of video traffics. The proposed method is computationally simple, so it is proper to be applied to sensor nodes. It is shown by experimental results that the proposed method is simple but estimate the video traffics exactly by less than 1% of the average.

SSH Traffic Identification Using EM Clustering (EM 클러스터링을 이용한 SSH 트래픽 식별)

  • Kim, Kyoung-Lyoon;Kim, Myung-Sup;Kim, Hyoung-Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1160-1167
    • /
    • 2012
  • Identifying traffic is an important issue for many networking applications including quality of service, firewall enforcement, and network security. Once we know the purpose of using the traffic in the firewall, we can allow or deny it and provide quality of service, and effective operation in terms of security. However, a number of applications encrypts traffics in order to enhance security or privacy. As a result, effective traffic monitoring is getting more difficult. In this paper, we analyse SSH encrypted traffic and identify differences among SSH tunneling, SFTP, and normal SSH traffics. By using EM clustering, we identify traffics and validate experiment results.

A Study on the Dynamic Priority Scheduling for Multiple Class Traffic in ATM Network (ATM망에서 다중등급 통화유량 처리를 위한 동적 우선순위 스케쥴링에 관한 연구)

  • 정상국;진용옥
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.279-287
    • /
    • 1993
  • In this paper, double laxity threshold MLT(Minimum Laxity Threshold) algorithm and double queue threshold QLT(Queue Length Threshold) algorithm are proposed as DPS(Dynamic Priority Scheduling) techniques for advanced processing of multiple class traffics. Also, the performance of the proposed algorithms is analyzed by a computer simulation. According to the simulation results, it can be shown that the proposed double laxity threshold ML T algorithm advances the processing performance versus ML T algorithm for 2 or more classes delay sensitive traffics, and that double queue length threshold QL T algorithm provides more efficient performance than QL T for 2 or more classes of non real time traffics.

  • PDF