• Title/Summary/Keyword: 인터넷 트래픽

Search Result 1,135, Processing Time 0.025 seconds

A Study of Performance Improvement of Internet Application Traffic Identification using Flow Correlation (플로우 상관관계를 통한 인터넷 응용 트래픽 분석의 성능 향상에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.600-607
    • /
    • 2011
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic identification becomes important for the effective use of network resources. In this paper, we present an Internet application traffic identification method based on flow correlation to overcome limitation of signature-based identification methods and to improve performance (completeness) of it. The proposed method can identify unidentified flows from signature-based method using flow correlation between identified and unidentified flows. We propose four separate correlation methods such as Server-Client, Time, Host-Host, and Statistic correlation and describe a flow correlation-based identification system architecture which incorporates the four separate methods. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

The Study on the Performance Evaluation of IPTV according to the increase of network traffic on the Internet Environment (인터넷환경에서 트래픽증가에 따른 IPTV 성능평가에 관한 연구)

  • Cho, Tae-Kyung
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.179-185
    • /
    • 2015
  • In this paper, we research the IPTV that is the convergence technique of TV and network technique and performed the performance evaluation of picture quality of IPTV in the situation of increasing the network traffic in the Internet environment. To do this, we constructed the mock Internet network similar to the real Internet environment and measured the quality of received video using V-Factor model according to the increase of network traffic, and analyzed the result of the experiment. Making use of the result of this paper for the threshold value of V-Factor, the measured factor of network performance, the measured factor of video performance in the watchable IPTV video quality.

Performance Analysis of TCP Traffic over AODV Routing Protocol in Ad-Hoc Wireless Network (Ad-Hoc 무선망에서 AODV 라우팅 프로토콜을 이용한 TCP 트래픽의 성능분석)

  • 고영웅;마주영;육동철;박승섭
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.9-17
    • /
    • 2001
  • Ad-Hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other communicate support facilities (such as base stations). The topology of an Ad-Hoc network changes due to the movement of mobile host. which may lead to sudden packet loss. Recently, a large amount of research has focused on the routing protocols needed in such an environment. but researches about Internet traffic performance analysis were unexhausted. Accordingly, we have simulated Ad-Hoc mobile network that using AODV routing protocol and Ad-Hoc mobile network topology size and node speed as simulation estimation-factor to analysis traffic performance. As the result of the simulation, we identify that TCP /Reno was more sensitive than TCP/Sack about node speed and a number of the node.

  • PDF

HTTP Traffic Modeling and Analysis with Statistical Process (통계적 분석을 이용한 HTTP 트래픽 모델링 및 분석)

  • Jun Uie-Soo;Lee Kwang-Hui
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.63-76
    • /
    • 2004
  • For efficient design and operation of a communication network, precise simulation of network characteristics is essential. This issue has been the focus of research by several groups. In this study, we first modeled the HTTP traffic which would be employed on simulation on the level of application using the real collected traffic data. There are two different viewpoints on the characteristics of web traffic pattern, Poisson distribution and self-similar characteristics. In our study, the results show that web traffic characteristics do not depend on only one type of distribution, but the traffic can be modeled as composition of these depending on the size of response of Web server. This implicates that the web traffic can be modeled as the combination of two characteristics. We also found that the characteristics of Web traffic rely on the properties of web servers. This result was deployed as a traffic generator in implementing the network simulator (NetDAS).

  • PDF

Distributed Virtual Topology Adaptation Method to Support IP Traffic in WDM Mesh Networks (WDM Mesh 네트워크에서 IP 트래픽을 수용하기 위한 분산형 가상토폴로지 적응 기법)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lee, Yong-Won;Chang, Sun-Hyok;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.1-10
    • /
    • 2007
  • We propose a new approach to accommodate bidirectional asymmetric traffic demands as well as unexpected dynamic internet traffic variation in the WDM mesh network by using optical networking technologies. In the proposed scheme, an intermediate node determines the optical path based on the switching statistics of IP router of the node which characterizes the Internet traffic variation, which in effect provides a dynamic and distributed traffic control over the network. It is expected to reduce the efficiency deterioration of RWA(Routing and Wavelength Assignment) due to the real-time variation of Internet traffic so that expandability and flexibility of the network can be enhanced. In this paper, we describe a methodology for traffic behavior analysis at a node, and the decision policy of the establishment/release of optical path. In addition, we evaluate the performance of the proposed scheme through the computer simulations.

Fixed IP-port based Application-Level Internet Traffic Classification (고정 IP-port 기반 응용 레벨 인터넷 트래픽 분석에 관한 연구)

  • Yoon, Sung-Ho;Park, Jun-Sang;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.205-214
    • /
    • 2010
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic classification becomes important for the effective use of network resources. In this paper, we present an application traffic classification method based on fixed IP-port information. A fixed IP-port is a {IP address, port number, transport protocol}triple dedicated to only one application, which is automatically collected from the behavior analysis of individual applications. We can classify the Internet traffic more accurately and quickly by simple packet header matching to the collected fixed IP-port information. Therefore, we can construct a lightweight, fast, and accurate real-time traffic classification system than other classification method. In this paper we propose a novel algorithm to extract the fixed IP-port information and the system architecture. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Traffic Analysis and Modeling for Network Games (네트워크 게임 트래픽 분석 및 모델링)

  • Park Hyo-Joo;Kim Tae-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.635-648
    • /
    • 2006
  • As the advances of Internet infra structure and the support of console and mobile for network games, the industry of online game has been growing rapidly, and the online game traffic in the Internet has been increasing steadily. For design and simulation of game network, the analysis of online game traffic have to be preceded. Therefore a number of papers have been proposed for the purpose of analyzing the traffic data of network games and providing the models. We make and use GameNet Analyzer as a dedicated tool for game traffic measurement and analysis in this paper. We measure the traffic of FPS Quake 3, RTS Starcraft and MMORPG World of Warcraft (WoW), and analyze the packet size, packet IAT(inter-arrival time), data rate and packet rate according to the number of players and in-game behaviors. We also present the traffic models using measured traffic data. These analysis and models of game traffic can be used for effective network simulation, performance evaluation of game network and the design of online games.

  • PDF

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Traffic Generation Method of Sampled Values for Smart Grid (스마트 그리드를 위한 샘플 값들의 트래픽 발생 방안)

  • Hwang, Sung-Ho;Park, Kyung-Won;Park, Jeong-Do;Song, Han-Chun;Park, Jae-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.225-230
    • /
    • 2015
  • This study presents a method for generating IEC 61850 Sampled Values(SV) traffic by combining the emulation function of network simulator ns-3 with the actual communication equipment. For the SV traffic generation and reception, the emulation function of the network simulator ns-3 is used, while as a communication network, the actual communication equipment, switches are used. In addition, the SV traffic frames generated are analyzed, using Wireshark, and it is confirmed that the SV traffic frames are generated accurately. The method for the SV traffic generation proposed in the present study will be very useful when various SV traffics are generated under the environment of an actual substation.

핫이슈 / 복잡한 환경 설정은 이제 그만 '소스별 멀티캐스팅 부상'

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.8 s.99
    • /
    • pp.75-75
    • /
    • 2001
  • 대역폭을 많이 차지하는 멀티미디어 트래픽이 인터넷을 채워감에 따라 멀티캐스트가 웹 캐스팅을 훨씬 효율화시켜주는 대안으로 등장하고 있다. 소스별 멀티캐스트라는 이 새로운 트래픽관리 프로토콜은 기존 인터넷 프로토콜 멀티캐스트 기술 확산에 걸림돌로 지적됐던 네트워크 컨피규레이션 문제를 해결해 줄 수 있다는 매력을 준다. 소스별 멀티캐스트 지원이 가능하도록 네트워크를 업그레이드하는데 시간이 걸리는 문제가 있기는 하지만, 차세대 인터넷 표준에 들어가게 될 가능성이 높은 이번 시도를 지지하는 기업들이 매우 많다는 것이 많은 전문가들의 공통된 의견이다.

  • PDF