• Title/Summary/Keyword: 네트워크 트래픽 예측

Search Result 170, Processing Time 0.028 seconds

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Attack Detection Algorithm Using Exponential Smoothing Method on the IPv6 Environment (IPv6 환경에서 지수 평활법을 이용한 공격 탐지 알고리즘)

  • Koo Hyang-Ohk;Oh Chang-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.378-385
    • /
    • 2005
  • Mistaking normal packets for harmful traffic may not offer service in conformity with the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DDoS(Distributed Denial of Service) attack. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWOX and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Modeling Heavy-tailed Behavior of 802.11b Wireless LAN Traffic (무선 랜 802.11b 트래픽의 두꺼운 꼬리분포 모델링)

  • Yamkhin, Dashdorj;Won, You-Jip
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.357-365
    • /
    • 2009
  • To effectively exploit the underlying network bandwidth while maximizing user perceivable QoS, mandatory to make proper estimation on packet loss and queuing delay of the underling network. This issue is further emphasized in wireless network environment where network bandwidth is scarce resource. In this work, we focus our effort on developing performance model for wireless network. We collect packet trace from actually wireless network environment. We find that packet count process and bandwidth process in wireless environment exhibits long range property. We extract key performance parameters of the underlying network traffic. We develop an analytical model for buffer overflow probability and waiting time. We obtain the tail probability of the queueing system using Fractional Brown Motion (FBM). We represent average queuing delay from queue length model. Through our study based upon empirical data, it is found that our performance model well represent the physical characteristics of the IEEE 802.11b network traffic.

  • PDF

Network Traffic Performance Analysis using Framework-based Integrated Management System (프레임워크 기반 통합관리시스템을 이용한 네트워크 트래픽 성능분석)

  • 최성만;변완섭;유철중;김용성;장옥배;태규열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.145-147
    • /
    • 2003
  • 본 논문에서 이용한 프레임워크 기반 통합관리시스템은 네트워크 관리와 분석을 위하여 관리기능, 분석 기능, 관리 및 분석 대상과 관련된 모든 항목을 측정하고 분석하여 예측할 수 있는 기능을 포함하는 시스템이다. 주요 연구방법으로는 세부 항목별로 현황 데이터를 수집, 가공, 분석하였으며, 각 항목간의 연관관계 및 대상별 연관관계를 상세하게 분석하고자 인프레인저(infRanger$^{TM}$)를 이용하였다. 프레임워크 기반통합관리시스템을 이용한 네트워크 트래픽 성능분석은 네트워크 운영에 있어서 성능 저하에 영향을 미치기 쉬운 장비나 구간, 그리고 현재의 문제 가능성이 예상되는 네트워크 자원을 선정하여 상세 분석을 실시하고 문제점을 도출할 수 있도록 하였다. 이렇게 해본 결과 사전에 네트워크에 대한 과잉투자를 예방하고 최적화된 네트워크 환경을 조성하여 관리의 효율성 및 보다 나은 서비스를 제공한다.

  • PDF

Distributed Virtual Topology Adaptation Method to Support IP Traffic in WDM Mesh Networks (WDM Mesh 네트워크에서 IP 트래픽을 수용하기 위한 분산형 가상토폴로지 적응 기법)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lee, Yong-Won;Chang, Sun-Hyok;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.1-10
    • /
    • 2007
  • We propose a new approach to accommodate bidirectional asymmetric traffic demands as well as unexpected dynamic internet traffic variation in the WDM mesh network by using optical networking technologies. In the proposed scheme, an intermediate node determines the optical path based on the switching statistics of IP router of the node which characterizes the Internet traffic variation, which in effect provides a dynamic and distributed traffic control over the network. It is expected to reduce the efficiency deterioration of RWA(Routing and Wavelength Assignment) due to the real-time variation of Internet traffic so that expandability and flexibility of the network can be enhanced. In this paper, we describe a methodology for traffic behavior analysis at a node, and the decision policy of the establishment/release of optical path. In addition, we evaluate the performance of the proposed scheme through the computer simulations.

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

High capacity WDM optical communication systems (파장분할 다중방식 초고속 광통신)

  • 이창희
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.12-13
    • /
    • 2001
  • 인터넷의 대중화로 폭발적으로 증가하는 데이터 및 영상 정보를 수용하기 위해 초고속 전송 시스템이 요구되고 있다. 그림 1은 1996년을 기준으로 통신네트워크의 트래픽 증가 추세를 나타내었다. 데이터를 포함한 총 트래픽은 매년 2배 이상씩 증가하므로 2006년에는 현재보다 100 배 많은 트래픽이 예측된다. 그러므로 2.5 Gb/s 16 ~ 32 채널 WDM (Wavelength Division Multiplexing) 광전송 시스템이 주로 사용되고 있는 현시점과 비교하면 2006년에는 4 Tb/s 이상의 WDM 광전송 시스템이 필요할 것이다. (중략)

  • PDF

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

Adaptive Input Traffic Prediction Scheme for Proportional Delay Differentiation in Next-Generation Networks (차세대 네트워크에서 상대적 지연 차별화를 위한 적응형 입력 트래픽 예측 방식)

  • Paik, Jung-Hoon
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.17-25
    • /
    • 2007
  • In this paper, an algorithm that provisions proportional differentiation of packet delays is proposed with an objective for enhancing quality of service (QoS) in future packet networks. It features an adaptive scheme that adjusts the target delay every time slot to compensate the deviation from the target delay which is caused by the prediction error on the traffic to be arrived in the next time slot. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot. The difference between them is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the exponential rate traffic. It is demonstrated through simulations that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional non-adaptive mechanism. The algorithm is implemented with VHDL on a Xilinx Spartan XC3S1500 FPGA and the performance is verified under the test board based on the XPC860P CPU.

  • PDF