• Title/Summary/Keyword: 트래픽 라우팅

Search Result 376, Processing Time 0.028 seconds

QoS Gurantieeing Scheme based on Deflection Routing in the Optical Burst Switching Networks (광 버스트 교환망에서 우회 라우팅을 이용한 QoS 보장 방법)

  • Kim, Jong-Won;Kim, Jung-Youp;Choi, Young-Bok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.447-454
    • /
    • 2003
  • Optical burst switching (OBS) has been proposed to reduce the use of fiber delay lines (FDLs) and to realize the optical switching paradigm of the next-generation ail optical networks. The OBS can provide improvements over wavelength routing in terms of bandwidth efficiency and core network scalability via statistical multiplexing of bursts. Recently, another challenging issue is how to upport quality of service (QoS) in the optical burst switching networks. In this paper, we propose a deflection routing scheme to guarantee the QoS for the OBS networks to detour lower priority burst forward to the deflection routing path when congested. A big advantage of the proposed scheme is the simplicity of QoS provision, that comes from the simple QoS provisioning algorithm. Also, the QoS provisioning scheme be able to make efficient networks by fairly traffic distributing with the reduce of the use of FDLs at core routers. The QoS provisioning scheme has been verified to reliably guarantee the QoS of priority 0, 1, 2 burst and to efficiently utilize network resources by computer simulations using OPNET As results, the end-to-end delay of high priority burst is improved, and the network efficiency is also improved.

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

A Per-User-based Enhanced Distributed Mobility Management Scheme in PMIPv6 Networks (PMIPv6 네트워크에서 사용자 기반의 향상된 분산형 이동성 관리 기법)

  • Kong, Ki-Sik
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.111-118
    • /
    • 2016
  • Proxy mobile IPv6 (PMIPv6), which is a centralized mobility management protocol, are dependent on a local mobility anchor (LMA) to process all control and data traffics. Therefore, it has serious problems such as the tremendous traffic concentration into the core network and the triangle routing. In this paper, therefore, in order to alleviate these drawbacks, we propose a PMIPv6-based enhanced distributed mobility management scheme considering a user's traffic locality. Performance evaluation results indicate that in most cases, except for when a user's mobility rate is relatively very higher than the traffic rate, the proposed scheme shows better performance result than that of PMIPv6. Besides, it is demonstrated that the proposed scheme can be an effective alternative that can distribute the significant loads on the LMA of the core networks to the MAGs of the edge networks.

Fault Management in Multichannel ATM Switches (다중 채널 ATM 스위치에서의 장애 관리)

  • 오민석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8A
    • /
    • pp.569-580
    • /
    • 2003
  • One of the important advantages of multichannel switches is the incorporation of inherent fault tolerance into the switching fabric. For example, if a link which belongs to the multichannel group fails, the remaining links can assume responsibility for some of the traffic on the failed link. On the other hand, if faults occur in the switching elements, it can lead to erroneous routing and sequencing in the multichannel switch. We investigate several fault localization algorithms in multichannel crossbar ATM switches with a view to early fault recovery, The optimal algorithm gives the best performance in terms of time to localization but is computationally complex which makes it difficult to implement. We develop an on-line algorithm which is computationally mote efficient than the optimal algorithm. We evaluate its performance through simulation. The simulation results show that performance of the on line algorithm is only slightly sub-optimal for both random and bursty traffic. Finally a fault recovery algorithm is described which utilizes the information provided by the fault localization algorithm.

Intelligent Hierarchical Mobility Support Scheme in F-PMIPv6 Networks (F-PMIPv6 네트워크에서 지능적인 계층적 이동성 지원 기법)

  • Han, Sunghee;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.337-349
    • /
    • 2013
  • In this paper, we propose a new mobility management scheme, called i-FP(intelligent Fast PMIPv6). Our proposed i-FP scheme is addressed for solving the existing local mobility management problems from legacy frameworks. To move MN(Mobile Node) to other networks in one domain, i-FP employs three network entities which are extended from PMIPv6(Proxy Mobile IPv6), LMA(Local Mobility Anchor), MAG(Mobile Access Gateway) and MN. In i-FP, the three network entities can reduce the handover delay time of MNs. Also, i-FP uses an IP header swapping mechanism to avoid the traffic overhead and improve the throughput of network. To evaluate the performance of i-FP, we analyze our i-FP, HMIPv6(Hierarchical Mobile IPv6) and PMIPv6 which are legacy protocols of local mobility management in terms of various parameters. Finally, our i-FP scheme shows good performance(reduction of routing hops 10.2%, signaling costs 58.5% and handover delay 16.3%) than other network schemes for the total cost.

The Study on improve method of GNUnet for structured P2P Model of encording block (제안 인코딩 블록을 구조적 P2P 모델에 적용한 GNUnet 성능 개선방안)

  • Lee, Myoung-Hoon;Park, Byung-Yeon;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.75-81
    • /
    • 2005
  • The GNUnet in P2P system have solved an anonymous(publisher, storer, demander); a service of condition equal for peer. The GNUnet for an anonymous has separated a file and dispersed to the network. But, the 1Kbyte block size of the GNUnet is a creation of many additional block. I and R block has created with indirect point of D block The waste of I and R block appeared to 4% of the original file and the additional network traffic for the block transmission. To resolve the problems, this paper proposes an new scheme of file splitting distribution using P2P networks with the new GNUnet protocol, The GNUnet support minimization of the additional block and for a network traffic. It proposed an efficiency improvement of encording block and routing algorithm.

  • PDF

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Design of Efficient P2P Based File Search Algorithm (효율적인 P2P 기반 파일 검색 알고리즘 설계)

  • Baek, Seung-Jae;Ahn, Jin-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.454-456
    • /
    • 2005
  • 최근에 파일 공유 애플리케이션을 개발하는데 있어 클라이언트-서버(client-sewer) 모델의 문제점을 해결하기 위해 피어-투-피어(peer-to-peer) 모델이 각광 받고 있다. 대표적일 P2P 기반 파일 공유 시스템으로 넵스터, 그누텔라등이 있다. 그러나 이 시스템들은 각각 중앙 집중적 제어, 혹은 브로드캐스팅에 의한 과도한 네트워크 트래픽 발생 등 확장성 문제를 발생시킨다. 이런 문제점을 해결하기 위해 울트라피어 및 동적 라우팅 기법을 사용하지만 여전히 rare 파일에 대한 높은 응답시간과 검색의 낮은 신뢰성 문제점들을 해결할 수 없다. 본 논문에서는 popular 파일과 rare 파일에 대한 검색을 구분하여 popular 파일을 기존의 그누텔라 검색 방법을 사용하고 rare 파일 검색을 제안하는 새로운 DHT 알고리즘을 사용하도록 한다. 특히 제안하는 DHT 알고리즘은 기존의 DHT 알고리즘들과 달리 일반 노드가 아닌 울트라피어들만으로 구성함으로서 검색 비용, 노드 조인과 리브 비용, 핑거 테이블의 엔트리 수를 매우 줄임으로서 효과적이고 확장적이라 할 수 있다.

  • PDF

Determination of Multicast Routing Scheme for Traffic Overload in On-Line Game (온라인 게임에서 트래픽 부하 상태에 따른 멀티캐스트 라우팅 방식의 결정)

  • Lee, Kwang-Jae;Doo, Gil-Soo;Seol, Nam-O
    • Journal of Korea Game Society
    • /
    • v.2 no.1
    • /
    • pp.30-35
    • /
    • 2002
  • The deployment of multicast communication services in the Internet is expected to lead a stable packet transfer even in heavy traffic as in On-Line Game environment. The Core Based Tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibit two major deficiencies such as traffic concentration or poor core placement problem. So, measuring the bottleneck link bandwidth along a path is important for understanding the performance of multicast. We propose not only a definition of CBT's core link state that Steady-State(SS), Normal-State(NS) and Bottleneck State(BS) according to the estimation link speed rate, but also the changeover of multicast routing scheme for traffic overload. In addition, we introduce anycast routing tree, a efficient architecture for construct shard multicast trees.

  • PDF

Development of ACE2000 MPLS based IP-VPN (ACE2000 BGP/MPLS VPN 서비스 개발)

  • Yoon, Ho-Sun;Yoon, Hyun-Sik;Yang, Sun-Hee;Kang, Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1415-1418
    • /
    • 2001
  • 본 논문에서는 ACE2000 MPLS 시스템의 핵심 응용 기능으로 개발된 BGP/MPLS VPN의 기능블럭 구성과 주요 특성을 기술하였다. BGP/MPLS VPN은 VPN사이트들간을 MPLS LSP를 이용하여 터널링시키는 서비스로서 VPN 사이트들에 대한 라우팅 정보가 BGP4 확장 프로토콜을 이용해서 전달되고, VPN 사이트간의 트래픽은 MPLSLSP를 통해서 전달된다. ACE2000 BGP/MPLS VPN은 품질의 차별적 지원이 가능하고 확장성이 뛰어난 구조로 개발되었다.

  • PDF