• 제목/요약/키워드: Information flow

검색결과 5,738건 처리시간 0.032초

Priority-based Scheduling Policy for OpenFlow Control Plane

  • Kasabai, Piyawad;Djemame, Karim;Puangpronpitag, Somnuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.733-750
    • /
    • 2019
  • Software Defined Networking (SDN) is a new network paradigm, allowing administrators to manage networks through central controllers by separating control plane from data plane. So, one or more controllers must locate outside switches. However, this separation may cause delay problems between controllers and switches. In this paper, we therefore propose a Priority-based Scheduling policy for OpenFlow (PSO) to reduce the delay of some significant traffic. Our PSO is based on packet prioritization mechanisms in both OpenFlow switches and controllers. In addition, we have prototyped and experimented on PSO using a network simulator (ns-3). From the experimental results, PSO has demonstrated low delay for targeted traffic in the out-of-brand control network. The targeted traffic can acquire forwarding rules with lower delay under network congestion in control links (with normalized load > 0.8), comparing to traditional OpenFlow. Furthermore, PSO is helpful in the in-band control network to prioritize OpenFlow messages over data packets.

간편결제 서비스의 지속사용의도에 영향을 미치는 요인에 관한 연구: 플로우, 신뢰 및 혁신저항을 중심으로 (A Study on the Factors of Intention of Continued Use of the Convenient Payment Service: The Perspectives of the Flow, the Reliability and the Innovative Resistance)

  • 손달호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제30권1호
    • /
    • pp.1-20
    • /
    • 2021
  • Purpose The purpose of this study is to deduct the motivative factors such as perceived value, trust, innovative resistance and flow from the pervious studies and to examine the effect of the motivative factors in the continued use of convenient payment service. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the Value-based Adoption Model and the Innovative Resistance Model with the factors deducted from the Flow Theory. Findings Results showed that perceived value had a significant effect on trust and innovative resistance. Moreover, trust had a significant effect on flow and continued use. Finally, innovative resistance and flow had a significant effect on continued use. However, the research model in this study was derived from a behavioral point of view, therefore, this model needs to combine the various factors of related fields.

왕복동식 수소압축기의 흡입통로내 작동유체 유동해석 (Numerical Analysis on the Working Fluid Flow of Suction-passage for Reciprocating Compressor)

  • 이경환;라흐만;심규진;정효민;정한식
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제32권8호
    • /
    • pp.1201-1207
    • /
    • 2008
  • Numerical analysis information will be very useful to improve fluid system. General information about an internal gas flow is presented by numerical analysis approach. Relating with hydrogen compressing system, which have an important role in hydrogen energy utilization, this should be a useful tool to observe the flow quickly and clearly. Flow characteristic analysis, including pressure and turbulence kinetic energy distribution of hydrogen gas coming to the cylinder of a reciprocating compressor are presented in this paper. Suction-passage model is designed based on real model of hydrogen compressor. Pressure boundary conditions are applied considering the real condition of operating system. The result shows pressure and turbulence kinetic energy are not distributed uniformly along the passage of the Hydrogen system. Path line or particles tracks help to demonstrate flow characteristics inside the passage. The existence of vortices and flow direction can be precisely predicted. Based on this result, the design improvement, such as reducing the varying flow parameters and flow reorientation should be done. Consequently, development of the better hydrogen compressing system will be achieved.

다단계 온도 감지막을 가진 마이크로 흐름센서의 열전달 특성 (Thermal Flow Characteristics of a New Micro Flow Sensor with Multiple Temperature Sensing Elements)

  • 김태용;정완영
    • 한국정보통신학회논문지
    • /
    • 제9권3호
    • /
    • pp.595-600
    • /
    • 2005
  • 마이크로 흐름센서는 반도체 집적기술을 이용할 수 있어, 소형으로 제작이 가능하며 빠른 응답특성을 가져 다양한 분야에 응용되고 있다. 본 연구에서는 넓은 흐름의 세기 영역에서 정밀한 감도를 가지는 2차원의 마이크로 흐름센서를 실리콘 기판위에 적충시켜 제작하였다. 흐름센서의 중앙에 하나의 히터와 양측에 온도를 검출할 수 있는 3쌍의 감지막을 가진 새로운 센서 구조를 제안하고, 온도 검출에 대한 성능평가를 위하여 시간영역에서의 유한차분법을 이용하여 공기흐름의 세기 변화에 따른 온도분포를 계산하였다. 계산결과를 통하여 실제 흐름센서의 동작을 정량적으로 분석하였다.

X-ray PIV 기법의 개발과 혈액 유동에의 적용연구 (Development of X-ray PIV Technique and its Application to Blood Flow)

  • 김국배;이상준
    • 대한기계학회논문집B
    • /
    • 제29권11호
    • /
    • pp.1182-1188
    • /
    • 2005
  • An x-ray PIV (Particle Image Velocimetry) technique was developed to measure quantitative information on flows inside opaque conduits and on opaque-fluid flows. At first, the developed x-ray PIV technique was applied to flow in an opaque Teflon tube. To acquire x-ray images suitable for PIV velocity field measurements, refraction-based edge enhancement mechanism was employed using detectable tracer particles. The optimal distance between with the sample and detector was experimentally determined. The resulting amassed velocity field data were in reasonable agreement with the theoretical prediction. The x-ray PIV technique was also applied to blood flow in a microchannel. The flow pattern of blood was visualifed by enhancing the diffraction/interference -bas ed characteristic s of blood cells on synchrotron x-rays without any contrast agent or tracer particles. That is, the flow-pattern image of blood was achieved by optimizing the sample (blood) to detector distance and the sample thickness. Quantitative velocity field information was obtained by applying PIV algorithm to the enhanced x-ray flow images. The measured velocity field data show a typical flow structure of flow in a macro-scale channel.

PMIPv6 환경에서 Multi-Interface 단말의 플로우 이동성 지원 방안 (Flow Mobility of PMIPv6 for Multi-Interface Mobile Nodes)

  • 이동민;민상원
    • 한국통신학회논문지
    • /
    • 제36권10B호
    • /
    • pp.1168-1174
    • /
    • 2011
  • IEFT에서는 PMIPv6 환경에서 다중 인터페이스틀 가지는 MN에 플로우 단위의 이동성을 지원하기 위한 연구가 활발히 진행되고 있다. 본 논문에서는 기존 PMIPv6 환경에 플로우 이동성을 제공하기 위하여 LMA의 BCE에 추가적인 필드와 절차를 제안하였다. 제안한 방안을 통하여 LMA에서 플로우 단위의 라우팅이 가능하게 하며 MAG에서 플로우 핸드오버된 패킷을 폐기하는 문제점을 해결하였다. 또한 제안한 방안의 검증을 위하여 LMA와 MAG, 요구되는 기능을 실제 구현하였으며 구현한 테스트베드를 이용하여 제안한 방안을 검증하였다. 그 결과 제안한 방안을 통하여 성공적으로 플로우 이동성이 제공됨을 확인하였다.

Implementation of an OpenFlow-based Access Point Virtual Switch for Monitoring and Virtualization of Legacy Wireless LAN

  • Lee, Hyung-Bong;Park, Ji-Hoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.65-72
    • /
    • 2016
  • Network virtualization is an emerging technology for solving the rigidity of the physical network infrastructure. The innovative technique virtualizes all resources in the network, including the network links and nodes, and provides a number of virtual networks on a single network infrastructure. In order to realize a virtual network, a thorough and complete monitoring of all resources in the network should be performed firstly. OpenFlow is an open source stack for network virtualization. However, it is impossible to apply OpenFlow to AP-based legacy wireless LAN environment because OpenFlow targets ethernet-based LAN environment. In this paper, we implement an adaptor-styled virtual switch for AP-based wireless LAN through customizing the Open vSwitch which is a virtual switch of OpenFlow. The evaluation test results show that the implemented OpenFlow stack operates successfully. The implemented OpenFlow stack can now be plugged immediately in existing AP-based wireless LAN environment and plays network resource monitoring. In the future, we can develop wireless LAN virtualization applications on the wireless OpenFlow stack.

A Flow Analysis Framework for Traffic Video

  • Bai, Lu-Shuang;Xia, Ying;Lee, Sang-Chul
    • 한국공간정보시스템학회 논문지
    • /
    • 제11권2호
    • /
    • pp.45-53
    • /
    • 2009
  • The fast progress on multimedia data acquisition technologies has enabled collecting vast amount of videos in real time. Although the amount of information gathered from these videos could be high in terms of quantity and quality, the use of the collected data is very limited typically by human-centric monitoring systems. In this paper, we propose a framework for analyzing long traffic video using series of content-based analyses tools. Our framework suggests a method to integrate theses analyses tools to extract highly informative features specific to a traffic video analysis. Our analytical framework provides (1) re-sampling tools for efficient and precise analysis, (2) foreground extraction methods for unbiased traffic flow analysis, (3) frame property analyses tools using variety of frame characteristics including brightness, entropy, Harris corners, and variance of traffic flow, and (4) a visualization tool that summarizes the entire video sequence and automatically highlight a collection of frames based on some metrics defined by semi-automated or fully automated techniques. Based on the proposed framework, we developed an automated traffic flow analysis system, and in our experiments, we show results from two example traffic videos taken from different monitoring angles.

  • PDF

Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

  • Nam, Seung Yeob;Djuraev, Sirojiddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2512-2531
    • /
    • 2014
  • We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. The stress is measured by the time interval during which a given client makes the server busy, referred to as a client-induced server busy period (CSBP). We also need to protect the servers from a sudden surge of attack flows even before the malicious flows are identified by the attack flow detection mechanism. Thus, we use whitelist-based admission control mechanism additionally to control the load on the servers. We evaluate the performance of the proposed scheme via simulation and experiment. The simulation results show that our defense system can mitigate DDoS attacks effectively even under a large number of attack flows, on the order of thousands, and the experiment results show that our defense system deployed on a linux machine is sufficiently lightweight to handle packets arriving at a rate close to the link rate.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.