• Title/Summary/Keyword: 인터넷 트래픽

Search Result 1,135, Processing Time 0.026 seconds

High capacity WDM optical communication systems (파장분할 다중방식 초고속 광통신)

  • 이창희
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.12-13
    • /
    • 2001
  • 인터넷의 대중화로 폭발적으로 증가하는 데이터 및 영상 정보를 수용하기 위해 초고속 전송 시스템이 요구되고 있다. 그림 1은 1996년을 기준으로 통신네트워크의 트래픽 증가 추세를 나타내었다. 데이터를 포함한 총 트래픽은 매년 2배 이상씩 증가하므로 2006년에는 현재보다 100 배 많은 트래픽이 예측된다. 그러므로 2.5 Gb/s 16 ~ 32 채널 WDM (Wavelength Division Multiplexing) 광전송 시스템이 주로 사용되고 있는 현시점과 비교하면 2006년에는 4 Tb/s 이상의 WDM 광전송 시스템이 필요할 것이다. (중략)

  • PDF

Design and Implementation of Network Traffic Filtering System (네트워크 트래픽 필터링 시스템의 설계 및 구현)

  • 김민수;김성조
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.269-271
    • /
    • 2000
  • 인터넷의 속도가 점차 빨라지고 대역폭이 증가함에도 불구하고 네트워크 대역폭은 여전히 부족한 자원이다. 이는 네트워크 속도가 빨라짐에도 불구하고 그 만큼 이를 모두 활용하는 어플리케이션이 계속 개발되어 사용되기 때문이다. 기업 차원에서는 주요한 자산인 네트워크 대역폭을 효율적으로 활용하는 것이 매우 중요하며, 개인 차원에서는 미성년들이 유해한 정보에 노출되는 것을 방지하는 것이 필요하다. 본 논문에서는 이러한 필요성에 따라 네트워크 트래픽을 분석하고, 이를 바탕으로 관리 정책에 따라 네트워크 트래픽을 필터링하는 시스템을 설계하고 이를 구현하였다.

  • PDF

광 인터넷

  • 최준균
    • TTA Journal
    • /
    • s.87
    • /
    • pp.149-156
    • /
    • 2003
  • 최근 급속하게 증가하는 인터넷 트래픽을 대용량의 광 통신망을 통하여 전달할 수 있는 광 인터넷에 대한 표준화가 활발하게 진행중이다. 본 고에서는 광인터넷에 대하여 현재까지 ITU-T 및 IETF를 중심으로 최근에 추진되고 있는 표준화 동향을 살펴본다. 특히, 광 네트워크의 제어 평면 측면에서 기존의 MPLS 뿐만 아니라 SONET/SDH, wavelength 및 fiber를 통합할 수 있는 GMPLS 기술을 중심으로 표준화 동향을 분석한다.

  • PDF

Design and Performance Evaluation of the QoS based Multimedia Services under Wibro Network Environment (휴대 인터넷 환경에서 QoS 기반 멀티미디어 서비스 제공 방안 및 성능 평가)

  • Yoe, Hyun;Eom, Ki-Bok;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.306-312
    • /
    • 2007
  • Present TCP/IP networks have some service quality problems. They delay various kinds of traffic, while increased traffic bottle necks, a phenomena experienced by too many internet users. Therefore, as use of the network increases, building up a stable network service is needed. Thus, network managers desperately need the best, most effective traffic control and wide-band services. Until now there has been no other way of increasing wide-band use of lines, particularly because of the expenses a limit solutions of solving continuously to increasing traffic problems. This study suggests a problem solving method under the base of 802.16e(Wibro) which will be widely used in the future.

  • PDF

MACsec Adapter for 2 Layer Security (2계층 보안을 위한 MACsec 어댑터)

  • Jeong, Nahk-Ju;Seo, Jong-Kyoun;Han, Ki-Cheon;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.654-656
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly. Because of today, Becoming the increase in traffic and complex situations to protect the overall traffic, not just certain parts. The MACsec technology has received attention. In this paper, Layer 2 security technology to MACsec. Design the technology MACsec adapter that can easily and readily added to existing Layer 2 network.

  • PDF

Intrusion Prevention Using Harmful Traffic Analysis (유해 트래픽 분석을 이용한 침입 방지)

  • Chang, Moon-Soo;Koo, Hyang-Ohk;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.173-179
    • /
    • 2005
  • The continuous development of computing technique and network technology bring the explosive growth of the Internet, it accomplished the role which is import changes the base facility in the social whole and public infra, industrial infrastructure, culture on society-wide to Internet based environment. Recently the rapid development of information and technology environment is quick repeated the growth and a development which is really unexampled in the history but it has a be latent vulnerability, Therefore the damage from this vulnerability like worm, hacking increases continually. In this paper, in order to resolve this problem, implement the analysis system for harmful traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF

A traffic analysis of Gigabit Ethernet high-speed network design (초고속 네트워크 구현을 위한 Gigabit Ethernet 트래픽 분석)

  • 서석철;고남영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.48-54
    • /
    • 2002
  • Gigabit Ethernet was advented as Internet's activation from owing to Internet user and the development of its various application and as inevitability the high-speed network as its demand for more and more the bandwidth by much application using the network. This Gigabit Ethernet makes an alternative plan to solve the request traffic by Internet user, because it holds several merits as providing great capacity with the network in the existing Ethernet environment and as displaying highly efficient ability This paper researches into a concept and characters about Gigabit Ethernet technology and raises the stability and efficiency of Gigabit Ethernet with regard of competing against FDDI technology and using Traffic analysis.

QoS-based Packet Scheduling Algorithm for Integrated Service (통합 서비스 제공을 위한 QoS기반 패킷 스케줄링 알고리즘)

  • 이은주;오창석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.154-162
    • /
    • 2001
  • In this paper, we investigate the scheduling algorithm of router system for Internet service based on the qualify-of-service (QoS) level of the input source traffics. We suggest an approprite scheduling algorithm in order to satisfy their QoS requirements for the loss-sensitive traffic and delay-sensitive traffic. For this purpose, we first study the service requirements of the multiplexer in Internet and the definition of QoS based on the ITU-T white recommendations. Second. we suggest a functional architecture of the multiplexer and the scheduling algorithm to satisfy various QoS requirements for Internet service. Finally. the performance measures of interest, namely steady-state packet loss probability and average delay, are discussed by simulation results.

  • PDF

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring (트래픽 모니터링을 통한 P2P 및 웹 하드 다운로드 응용의 파일이름 식별 방법)

  • Son, Hyeon-Gu;Kim, Ki-Su;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.477-482
    • /
    • 2010
  • Recently, advanced Internet applications such as Internet telephone, multimedia streaming, and file sharing have appeared. Especially, P2P or web-based file sharing applications have been notorious for their illegal usage of contents and massive traffic consumption by a few users. This paper presents a novel method to identify the P2P or web-based file names with traffic monitoring. For this purpose, we have utilized the Korean decoding method on the IP packet payload. From experiments, we have shown that the file names requested by BitTorrent, Clubbox, and Tple applications could be correctly identified.