• Title/Summary/Keyword: IP traffic

Search Result 635, Processing Time 0.035 seconds

Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON (상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법)

  • Seo, Chang-Jin;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.265-270
    • /
    • 2012
  • The subscriber access network is cause of the bottleneck phenomenon because equipment and infrastructure were not originally designed for busty high-bandwidth traffic between MAN(Metro Area Network) and LAN(Local Area Network). Whether riding on shorter copper drops or optical fiber, Ethernet is emerging as the future broadband protocol of choice, offering plug and play simplicity, and low cost. EPON(Ethernet Passive Optical Network) combines point-to-multipoint optical infrastructure with low-cost high-bandwidth Ethernet. The future broadband access network will be a combination of point-to-point and point-to-multipoint Ethernet, optimized for transporting IP data, as well as time critical voice and video. EPON is being considered as a novel communications infrastructure for next-generation broadband access network for the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. But, EPON has a problem with duplex multimedia services. It is the insufficiency of bandwidth for upstream. Because all ONUs use a shared transmission media for upstream. In this paper, we addressed the problem of upstream bandwidth in EPONs. We presented a wavelength division EPON supporting QoS in the differentiated services framework.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

A Weighted Fair Packet Scheduling Method Allowing Packet Loss (패킷 손실을 허용하는 가중치 기반 공정 패킷 스케줄링)

  • Kim, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1272-1280
    • /
    • 2010
  • WFQ (Weighted Fair Queuing) provides not only fairness among traffic flows in using bandwidth but also guarantees the Quality of Service (QoS) that individual flow requires, which is why it has been applied to the resource reservation protocol (RSVP)-capable router. The RSVP allocates an enough resource to satisfy both the rate and end-to-end delay requirements of the flow in condition of no packet loss, and the WFQ guarantees those QoS requirements with the allocated resource. In a practice, however, most QoS-guaranteed services, specially the Voice of IP, allow a few percent of packet loss, so it is strongly desired that the RSVP and WFQ make the best use of this allowable packet loss. This paper enhances the WFQ to allow packet loss and investigates its performance. The performance evaluation showed that allowing the packet loss of 0.4% can improve the flow admission capability by around 40 percent.

Design and Implementation of EJB based QoS Management System framework for Differentiated Services (차등 서비스를 위한 EJB 기반 QoS 관리 시스템 프레임워크의 설계 및 구현)

  • Cha Si ho;Lee Jong eon;Ahn Byung ho;Cho Kuk hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.192-201
    • /
    • 2005
  • DiffServ supports aggregated traffic classes to provide various QoS to different classes of traffics. However, current DiffServ specifications do not have a complete QoS management framework. It is possible to lead to serious QoS violations without a QoS management support. From this reasoning, a QoS management system that can manage differentiated QoS provisioning is required. This paper proposes and implements a policy-based QoS management platform for differentiated services networks, which specifies QoS policies to guarantee dynamic QoS requirements. The implementation of the proposed platform is built on W framework and uses XML to represent and validate high-level QoS policies. High-level QoS policies are represented as valid XML documents and are mapped into Em beans of the EJB-based policy server of the platform. The policy distribution and the QoS monitoring are processed using SNMP.

A Multicast-based Mobility Support Scheme in IPv6 Networks (IPv6 네트워크에서 멀티캐스트 기반 이동성 제공 방안)

  • Woo Mi ae;Jun Hong sun;Park Ho hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.210-217
    • /
    • 2005
  • With rapid advance in wireless communication technologies, many researches are conducted for providing Internet data services while users are roaming around. Efficient management of mobility of mobile nodes is essential as the use of real-time application program grows. In this paper, we propose a multicast-based localized mobility support scheme in IPv6 networks. The proposed scheme utilizes a class of multicast routing protocol for the localized mobility support. Features of the proposed scheme are use of join to a multicast group and leave from that group to localize binding update information and provision of an extended multicast group management mechanism to reduce leave latency. The results of simulation show that the proposed scheme out-performs Mobile IPv6 and Hierarchical Mobile IPv6 in UDP and TCP traffic performance and in wasted bandwidth.

Congestion Control for Burst Loss Reduction in Labeled OBS Network (Labeled OBS 망에서의 버스트 손실 감소를 위한 혼잡 제어)

  • Park Jonghun;Yoo Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.331-337
    • /
    • 2005
  • The optical Internet is considered as a feasible solution for transporting huge amount of traffic volume in the future Internet. Among optical switching technology for the optical Internet, OBS becomes one of the most promoting solution. Recently, a lebeled OBS(LOBS) architecture is considered for an efficient control on OBS network. Given that a data burst may contain few thousands of IP packets, a single loss of data burst results in a serious throughput degradation in LOBS network. In this paper, we improve the performance of LOBS network by introducing the burst congestion control mechanism. More specifically, the OBS router at the network core detects the network congestion by measuring the loss probability of burst control packet. The OBS router at the network edge reduces the burst generation according to the network condition repored by the OBS router at the network core. Through the simulations, it is shown that the proposed congestion control mechanism can reduce the burst loss probability and improve the LOBS network throughput.

Topology-aware Chord system for efficient lookup (효율적인 탐색을 위한 위상 인지 Chord 시스템)

  • Kim, Jun-Hong;Jo, In-June;Kim, Seung-Hae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.89-92
    • /
    • 2005
  • Centralized P2P system, Napster and Unstructured P2P system, Gnutella accomplish main current. Centralized system and unstructured system have a restriction in a scalability. To solve the this problem, structured system is appeared. CAN, Chord, Pastry and Tapestry are delegation of this system. Although structured system don't aware physical proximity of node because it uses Distribute Hash Table. In proposing system, a node can communicate with physical proximity of node using concept of LAN. Internet traffic is also decreased because communication in the Chord network divide in two(original network and sub network).

  • PDF

NEMO-enabled Hybrid Distributed Mobility Management (네트워크 이동성을 지원하는 하이브리드 분산 이동성 관리)

  • Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.1030-1040
    • /
    • 2018
  • In Distributed Mobility Management (DMM) protocol, the mobility functions are distributed to network edge closer to mobile users. DMM protocol has some advantages of low-cost traffic delivery, optimized routing path, high scalability. However, it needs many mobile anchors to exchange signaling messages and it results in a high signaling cost. Thus, previous works suggested the hybrid DMM protocol to reduce the high signaling cost for long-live sessions and this paper extends a hybrid scheme to the NEMO environment. The mobile routers are installed at vehicles and can move together with several mobile devices. So we can define the high-mobility property for mobile routers and suggest the hybrid scheme using this property. According to the high-mobility property of mobile routers, we can distribute the mobile anchors or allocate a centralized mobile anchor. In this paper, we mathematically analyze the performance of the proposed NEMO-enabled hybrid DMM protocol and show superior performance.

Design and Implementation of Web Interface for Internet management System Using SNMP MIB-II (SNMP MIB-II를 이용한 인터넷 관리 시스템의 웹 인터페이스 설계 및 구현)

  • Yu, Seung-Geun;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.699-709
    • /
    • 1999
  • This paper is aimed at defining items of analysis using SNMP MIB-II for the purpose of managing the Internet based network running on TCP/IP protocol, and then utilize these items, in conjunction with various Web technology and JAVA to design and implement a Web based interface of a management system to analyze the performance and status of the Internet. Among the required items in order to accomplish this task are utilization, interface packet transmission rate, I/O traffic ratio, and so on. Based on these items, the actual analysis is carried out by the Web interface according to the type of analysis. For instance, the interface executes the function of real-time analysis, collection processing, elementary analysis and detailed analysis. The demand of the user is fed into the Web interface which carried out a real-time analysis with the client system which in turn will eventually produce the results of the analysis. In order words, the interface acts as a mediator server for the analysis system. Furthermore, a protocol for exchange of data and messages between the server and the analysis system, the MATP protocol, was also designed. Finally, the results obtained through the system presented in this paper were displayed on screen according to the type of analysis. The system realized in this paper uses We technology and is independent of platform and allows the user to determine the performance of Internet at his/her own host according to the selected items of analysis.

  • PDF

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.