• Title/Summary/Keyword: 인터넷 트래픽

Search Result 1,135, Processing Time 0.025 seconds

A Wireless Downlink Packet Scheduling Algorithm for Multimedia Traffic (멀티미디어 트래픽에 대한 무선 환경에서의 순방향 패킷 스케줄링 알고리즘)

  • 김동회;류병한
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.12
    • /
    • pp.539-546
    • /
    • 2002
  • In this paper, we consider a wireless multimedia environment to service both real-time video traffic and non-real-time WWW-application traffic In our suggested new packet scheduling algorithm, we consider both the accumulation counter and SIR to reduce delay in real-time traffic. In addition, our packet scheduling algorithm gives priority first to real-time video traffic service and then to non-real-time internet Packet service when real-time traffic service is absent. From the simulation results, we find that the AC (Accumulation Counter) scheme has much smaller delay than the conversional M-LWDF scheme for real-time video data users, which has a special quality sensitive to its own delay. We also consider the transmission structure of using both the frame period in the time-axis and the OVSF codes in the code-axis at the same time, which is similar to the structure of HSDPA system.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

A Research Trend Analysis of PMIPv6-based Distributed Mobility Management Technology for Traffic Offload (트래픽 오프로드를 위한 PMIPv6 기반 분산형 이동성 관리 기술 연구동향 분석)

  • Kong, Ki-Sik
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.469-476
    • /
    • 2012
  • Recently, as the smart devices such as smart phone and smart pad are becoming increasingly common, the number of the smart devices users is increasing explosively. Therefore, the mobile Internet traffic is tend to get more and more increasing, and thus it is expected that the demand for using mobile Internet traffic will be exponentially increasing annually worldwide. In addition, mobile communications operators concentrate on much efforts and investments in order to effectively solve these problems at home and abroad, and the interest on the network-based (i.e., PMIPv6-based) distributed mobility management technology, which effectively distributes the explosively increasing mobile Internet traffic, is getting larger and larger. In this paper, we address the overview and recent research trend of PMIPv6-based distributed mobility management technology, and also describe the necessity and future prospect for studying PMIPv6-based distributed mobility management technology.

High Performance Signature Generation by Quality Evaluation of Payload Signature (페이로드 시그니쳐 품질 평가를 통한 고효율 응용 시그니쳐 탐색)

  • Lee, Sung-Ho;Kim, Jong-Hyun;Goo, Young-Hoon;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1301-1308
    • /
    • 2016
  • Internet traffic identification is an essential preliminary step for stable service provision and efficient network management. The payload signature-based-classification is considered as a reliable method for Internet traffic identification. But its performance is highly dependent on the number and the structure of signatures. If the numbers and structural complexity of signatures are not proper, the performance of payload signature-based-classification easily deteriorates. Therefore, in order to improve the performance of the identification system, it is necessary to regulate the numbers of the signature. In this paper, we propose a novel signature quality evaluation method to decide which signature is highly efficient for Internet traffic identification. We newly define the signature quality evaluation criteria and find the highly efficient signature through the method. Quality evaluation is performed in three different perspectives and the weight of each signature is computed through those perspectives values. And we construct the signature map(S-MAP) to find the highly efficient signature. The proposed method achieved an approximately fourfold increased efficiency in application traffic identification.

Traffic Anomaly Detection for Campus Networks using Fisher Linear Discriminant (Fisher 선형 분류법을 이용한 비정상 트래픽 탐지)

  • Park, Hyun-Hee;Kim, Mee-Joung;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.140-149
    • /
    • 2009
  • Traffic anomaly detection is one of important technology that should be considered in network security and administration. In this paper, we propose an abnormal traffic detection mechanism that includes traffic monitoring and traffic analysis. We develop analytical passive monitoring system called WISE-Mon which can inspect traffic behavior. We establish a criterion by analyzing the characteristics of a traffic training set. To detect abnormal traffic, we derive a hyperplane by using Fisher linear discriminant and chi-square distribution as well as the analyzed characteristics of traffic. Our mechanism can support reliable results for traffic anomaly detection and is compatible to real-time detection. In addition, since the trend of traffic can be changed as time passes, the hyperplane has to be updated periodically to reflect the changes. Accordingly, we consider the self-learning algorithm which reflects the trend of the traffic and so enables to increase the pliability of detection probability. Numerical results are presented to validate the accuracy of proposed mechanism. It shows that the proposed mechanism is reliable and relevant for traffic anomaly detection.

  • PDF

An Efficient QoS-Aware Bandwidth Re-Provisioning Scheme in a Next Generation Wireless Packet Transport Network (차세대 이동통신 패킷 수송망에서 서비스 품질을 고려한 효율적인 대역폭 재할당 기법)

  • Park, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1A
    • /
    • pp.30-37
    • /
    • 2006
  • In this paper, we propose a QoS-aware efficient bandwidth re-provisioning scheme in a next generation wireless packet transport network. At the transport network layer, it classifies the traffic of the radio network layer into a real time class and a non-real time class. Using an auto-regressive time-series model and a given packet loss probability, our scheme predicts the needed bandwidth of the non-real time class at every re-provisioning interval. Our scheme increases the system capacity by releasing the unutilized bandwidth of the non-real time traffic class for the real-time traffic class while insuring a controllable upper bound on the packet loss probability of a non-real time traffic class. Through empirical evaluations using the real Internet traffic traces, our scheme is validated that it can increase the bandwidth efficiency while guaranteeing the quality of service requirements of the non-real time traffic class.

Output Buffered ATM Switch based IP Switching System with Traffic Type Merging Function and Its Traffic Handling Characteristics (트래픽 유형별 VC-Merging 기능을 갖는 출력 버퍼형 ATM 스위치 기반 IP 교환 방식 및 특성)

  • Han, Chi-Moon;Lee, Sang-Hwa
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.10
    • /
    • pp.41-48
    • /
    • 2001
  • It is necessary to provide the QoS guaranteed end to-end routing services using the internet protocol through the connectionless network based on high speed network. From the above necessities, this paper classified the existing traffic into two type traffics such as real time traffics and non real time traffics and proposes the ATM based IP switching method with traffic type VC merging which allows many routes according to traffic type to be mapped to the same VC label. And this paper suggests the optimum switching architecture through simulation and performance analysis of proposed VC merging output module. From the simulation results, we confirmed the performance of the proposed method better than existing VC merging system under mixed traffic circumstances.

  • PDF