• Title/Summary/Keyword: IP traffic

Search Result 635, Processing Time 0.023 seconds

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

Distributed processing for the Load Minimization of an SIP Proxy Server (SIP 프록시 서버의 부하 최소화를 위한 분산 처리)

  • Lee, Young-Min;Roh, Young-Sup;Cho, Yong-Karp;Oh, Sam-Kweon;Hwang, Hee-Yeung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.929-935
    • /
    • 2008
  • As internet telephony services based on Session initiation Protocol (SIP) enter the spotlight as marketable technology, many products based on SIPs have been developed and utilized for home and office telephony services. The call connection of an internet phone is classified into specific call connections and group call connections. Group call connections have a forking function which delivers the message to all of the group members. This function requires excessive message control for a call connection and creates heavy traffic in the network. In the internet cail system model. most of the call-setup messages are directed to the proxy server during a short time period. This heavy message load brings an unwanted delay in message processing and. as a result, call setup can not be made. To solve the delay problem, we simplified the analysis of the call-setup message in the proxy server, and processed the forking function distributed for the group call-setup message. In this thesis, a new system model to minimize the load is proposed and the subsequent implementation of this model demonstrates the performance improvement.

A Study on the Performance Analysis of the DOCSIS 1.1 Protocol for Digital CATV Broadcasting (디지털 유선방송을 위한 DOCSIS 1.1 프로토콜의 성능분석에 관한 연구)

  • Kim Soo-Hee;Sohn Won;Kim Young-Soo;Hong Een-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11A
    • /
    • pp.1253-1262
    • /
    • 2004
  • The Data Over Cable System Interface Specification (DOCSIS) protocol enables the delivery of Internet Protocol(IP) traffic over Cable TV networks with significantly higher data rates. In this paper, we assessed the performance of the DOCSIS protocol using the OPNET. The simulation can be used to predict the upstream system throughput, mean access delay and channel utilization on varying packet size and transmission stream and wid/without concatenation, and it has shown that maximum system throughput is 4.6 Mbps for channel capacity of 5.12 Mbps and packet size of 1500 bytes. The mean access delay varies depending on the offered load, and it is assumed that the offered load does not exceed the capacity of the channel. Excess offered load causes service starvation according to the assigned priority.

Simulation Analysis for Verifying an Implementation Method of Higher-performed Packet Routing

  • Park, Jaewoo;Lim, Seong-Yong;Lee, Kyou-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.440-443
    • /
    • 2001
  • As inter-network traffics grows rapidly, the router systems as a network component becomes to be capable of not only wire-speed packet processing but also plentiful programmability for quality services. A network processor technology is widely used to achieve such capabilities in the high-end router. Although providing two such capabilities, the network processor can't support a deep packet processing at nominal wire-speed. Considering QoS may result in performance degradation of processing packet. In order to achieve foster processing, one chipset of network processor is occasionally not enough. Using more than one urges to consider a problem that is, for instance, an out-of-order delivery of packets. This problem can be serious in some applications such as voice over IP and video services, which assume that packets arrive in order. It is required to develop an effective packet processing mechanism leer using more than one network processors in parallel in one linecard unit of the router system. Simulation analysis is also needed for verifying the mechanism. We propose the packet processing mechanism consisting of more than two NPs in parallel. In this mechanism, we use a load-balancing algorithm that distributes the packet traffic load evenly and keeps the sequence, and then verify the algorithm with simulation analysis. As a simulation tool, we use DEVSim++, which is a DEVS formalism-based hierarchical discrete-event simulation environment developed by KAIST. In this paper, we are going to show not only applicability of the DEVS formalism to hardware modeling and simulation but also predictability of performance of the load balancer when implemented with FPGA.

  • PDF

Performance Evaluation of Hybrid Distributed Mobility Management (하이브리드 분산 이동성 관리 방식의 성능 평가)

  • Wie, Sunghong;Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1862-1872
    • /
    • 2017
  • To overcome the limitations of the current Central Mobility Management (CMM) protocols, IETF has been discussing about the Distributed Mobility Management (DMM) protocols that the centralized mobility functions of Home Agents (HA) are distributed to network edges closer to mobile users. The DMM protocol has some advantages of low-cost traffic delivery and high scalability. However, it faces several problems such as a high signaling cost and a complex address management. Especially, users moving at a high speed and with long-live sessions can make these problems worse. To reduce the high signaling cost for long-live sessions, we propose a novel hybrid DMM protocol allocating different mobility anchors according to the session durations. In this paper, we analyze the performance of the proposed hybrid DMM protocol and show superior performance with respect to the signaling cost.

Point-to-Multipoint Services and Hierarchical QoS on PBB-TE System (PBB-TE 기반의 패킷전송시스템에서 멀티캐스트 서비스와 계층적 QoS 구현)

  • Lee, Won-Kyoung;Choi, Chang-Ho;Kim, Sun-Me
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.433-442
    • /
    • 2012
  • We have proposed a solution to multicast services and an advanced quality of service (QoS) mechanism on a packet transport system (PTS) based on PBB-TE. The point-to-multipoint (PtMP) connection in the PBB-TE system have been realized by grouping point-to-point (PtP) PTL trunks and mapping a BSI onto the PtP PTL trunks using a multicast backbone destination address. To provide end-to-end QoS of the PtMP services, the hierarchical QoS scheme for backbone service instances and connection-oriented paths has been implemented in the PTS. For providing different capabilities for service selection and priority selection, the PTS offers to customers three basic types of the port-based, C-tagged, and S-tagged service interface defined by the IEEE 802.1ah. To offer to customers different capabilities of the layer 3 applications and services, moreover, an IP-flow service interface have been added. In order to evaluate traffic performance for PtMP services in the PTS, the PtMP throughputs for the link capacity of 1 Gbps at the four service interfaces were measured in the leaves of the ingress edge node, the transit node, and the egress edge node. The throughputs were about 96 % because the B-MAC overhead of 22 bytes occupies 4% of the 512-byte packet. The QoS performance is ability to guarantee an application or a user a required bandwidth, and could be evaluated by the accuracy of policing or shaping. The accuracy of the policing scheme and the accuracy of the shaping scheme were 99% and 99.3% respectively.

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support

  • Song, Myungseok;Jeong, Jongpil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1344-1367
    • /
    • 2014
  • Mobile traffic is increasing a masse because of the propagation of the Internet and the development of wireless mobile technology. Accordingly, the Network Local Mobility Management (NETLMM) working group [1] of the Internet Engineering Task Force (IETF) has standardized Proxy Mobile IPv6 (PMIPv6) [2] as a protocol for accomplishing the transmissibility of mobile terminals. PMIPv6 is a network-led IP-based mobility management protocol, which can control terminal mobility without depending on the type of access system or the capability of the terminal. By combining PMIPv6 and the mobility of Session Initiation Protocol (SIP), we can establish terminal mobility and session mobility through a more effective route. The mobility function can be improved and the overlap of function reduced as compared to that in the case of independent operation. PMIPv6 is appropriate for a non-real-time service using TCP, and SIP is appropriate for a real-time service using RTP/UDP. Thus, in the case of a terminal using both services, an effective mobility management is possible only by using PMIPv6 together with SIP. In order to manage mobility in this manner, researches on PMIPv6-SIP are in progress. In line with this trend, this paper suggests a new PMIPv6-SIP architecture where when a mobile terminal conducts a handover, a network-led handover while maintaining the session without the addition of a special function or middleware is possible along with effective performance evaluation through mathematical modeling by comparing the delay and the packet loss that occur during the handover to the Pure-SIP.

An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold (공격 탐지 임계값을 고려한 비상태기반 방화벽 정책 추론 방법)

  • Kim, Hyeonwoo;Kwon, Dongwoo;Ju, Hongtaek
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2015
  • Inferring firewall policy is to discover firewall policy by analyzing response packets as results of active probing without any prior information. However, a brute-force approach for generating probing packets is unavailable because the probing packets may be regarded as attack traffic and blocked by attack detection threshold of a firewall. In this paper, we propose a firewall policy inference method using an efficient probing algorithm which considers the number of source IP addresses, maximum probing packets per second and interval size of adjacent sweep lines as inference parameters to avoid detection. We then verify whether the generated probing packets are classified as network attack patterns by a firewall, and present the result of evaluation of the correctness by comparing original firewall policy with inferred firewall policy.

The hybrid method of Listen-Before-Talk and Adaptive Frequency Hopping for coexistence of Bluetooth and WLAN (블루투스 및 무선 LAN 시스템의 동시지원을 위해 Listen-Before-Talk 기법을 결합한 Adaptive Frequency Hopping 방식의 제안)

  • ;Bin Zhen
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7B
    • /
    • pp.706-718
    • /
    • 2002
  • In bluetooth system, there are two kinds of interference. One is the frequency static interference, for example 802.11 direct sequence, the interferer uses fixed frequency band. Another is frequency dynamic interference, for example other piconets or 802.11 frequency hopping, the interferer uses dynamic frequency channel and cant be estimated. In this paper we introduce a novel solution of hybrid method of Listen-Before-Talk (LBT) and Adaptive Frequency Hopping (AFH) to address the coexistence of bluetooth and Direct Sequence of wireless local area network (WLAN). Before any bluetooth packet transmission, in the turn around time of the current slot, both the sender and receiver sense the channel whether there is any transmission going on or not. If the channel is busy, packet transmission is withdrawn until another chance. This is the LBT in Bluetooth. Because of asymmetry sense ability of WLAN and bluetooth, AFH is introduced to combat the left front-edge packet collisions. In monitor period of AFH, LBT is performed to label the channels with static interference. Then, all the labeled noisy channels are not used in the followed bluetooth frequency hopping. In this way, both the frequency dynamic and frequency static interference are effectively mitigated. We evaluate the solution through packet collision analysis and a detail realistic simulation with IP traffic. It turns out that the hybrid method can combat both the frequency dynamic and frequency static interference. The packet collision analysis shows it almost doubles the maximal system aggregate throughput. The realistic simulation shows it has the least packet loss.