• Title/Summary/Keyword: Internet Traffic

Search Result 1,628, Processing Time 0.026 seconds

On Visualization of Trajectory Data for Traffic Flow Simulation of Urban-scale (도시 스케일의 교통 흐름 시뮬레이션을 위한 궤적 데이터 시각화)

  • Choi, Namshik;Onuean, Athita;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.582-585
    • /
    • 2018
  • As traffic volume increases and road networks become more complicated, identifying for accurate traffic flow and driving smooth traffic flow are a concern of many countries. There are various analytical techniques and studies which desire to study about effective traffic flow. However, the necessary activity is finding the traffic flow pattern through data visualization including location information. In this paper aim to study a real-world urban traffic trajectory and visualize a pattern of traffic flow with a simulation tool. Our experiment is installing the sensor module in 40 taxis and our dataset is generated along 24 hours and unscheduled routes. After pre-processing data, we improved an open source traffic visualize tools to suitable for our experiment. Then we simulate our vehicle trajectory data with a dots animation over a period of time, which allows clearly view a traffic flow simulation and a understand the direction of movement of the vehicle or route pattern. In addition we further propose some novel timelines to show spatial-temporal features to improve an urban environment due to the traffic flow.

  • PDF

Traffic Analysis and Modeling for Network Games (네트워크 게임 트래픽 분석 및 모델링)

  • Park Hyo-Joo;Kim Tae-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.635-648
    • /
    • 2006
  • As the advances of Internet infra structure and the support of console and mobile for network games, the industry of online game has been growing rapidly, and the online game traffic in the Internet has been increasing steadily. For design and simulation of game network, the analysis of online game traffic have to be preceded. Therefore a number of papers have been proposed for the purpose of analyzing the traffic data of network games and providing the models. We make and use GameNet Analyzer as a dedicated tool for game traffic measurement and analysis in this paper. We measure the traffic of FPS Quake 3, RTS Starcraft and MMORPG World of Warcraft (WoW), and analyze the packet size, packet IAT(inter-arrival time), data rate and packet rate according to the number of players and in-game behaviors. We also present the traffic models using measured traffic data. These analysis and models of game traffic can be used for effective network simulation, performance evaluation of game network and the design of online games.

  • PDF

Multivariate Congestion Prediction using Stacked LSTM Autoencoder based Bidirectional LSTM Model

  • Vijayalakshmi, B;Thanga, Ramya S;Ramar, K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.216-238
    • /
    • 2023
  • In intelligent transportation systems, traffic management is an important task. The accurate forecasting of traffic characteristics like flow, congestion, and density is still active research because of the non-linear nature and uncertainty of the spatiotemporal data. Inclement weather, such as rain and snow, and other special events such as holidays, accidents, and road closures have a significant impact on driving and the average speed of vehicles on the road, which lowers traffic capacity and causes congestion in a widespread manner. This work designs a model for multivariate short-term traffic congestion prediction using SLSTM_AE-BiLSTM. The proposed design consists of a Bidirectional Long Short Term Memory(BiLSTM) network to predict traffic flow value and a Convolutional Neural network (CNN) model for detecting the congestion status. This model uses spatial static temporal dynamic data. The stacked Long Short Term Memory Autoencoder (SLSTM AE) is used to encode the weather features into a reduced and more informative feature space. BiLSTM model is used to capture the features from the past and present traffic data simultaneously and also to identify the long-term dependencies. It uses the traffic data and encoded weather data to perform the traffic flow prediction. The CNN model is used to predict the recurring congestion status based on the predicted traffic flow value at a particular urban traffic network. In this work, a publicly available Caltrans PEMS dataset with traffic parameters is used. The proposed model generates the congestion prediction with an accuracy rate of 92.74% which is slightly better when compared with other deep learning models for congestion prediction.

A Study on the Construction of Information Network for Marine Traffic Control (해상교통관제 정보망 구출에 관한 연구)

  • 박성태;이은방
    • Proceedings of KOSOMES biannual meeting
    • /
    • 1999.03a
    • /
    • pp.93-105
    • /
    • 1999
  • In Vessel Traffic Service, the management information on marine traffic control is almost transported by VHF. It is so difficult to exchange a lot of the related information necessary for marine traffic control exactly and in real time. Aiming at improved visualized data transporting network, we examine the methods for transporting and displaying the data on marine traffic controls. In this paper, we design the information networks established by broadcasting method and by internet method using home page in order to manage marine traffics in Masan port.

  • PDF

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

Charging the Assured-Bandwidth Service (최저대역보장형 서비스에 대한 과금)

  • 이훈;이광휘
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.3
    • /
    • pp.179-179
    • /
    • 2004
  • In the near future we can expect a change in charging the Internet service. The flat charging maybe replaced with a usage-based charging. In line with this movement, we propose a method of charging the assured-quality Internet services for the next generation network by introducing a UBC (usage-based charging) scheme over the conventional flat charging platform. First, we investigate the attribute of elastic traffic generated by assured services in IP network. Next, we propose a new method to relate the bandwidth usage with the pricing for the elastic traffic, which is based partially on the usage rate of the network bandwidth. Next, we propose a charging function for elastic traffic, which is applicable to any type of assured Internet services. Finally, we discuss the implication of the work via simple numerical experiments.

Charging the Assured-Bandwidth Service (최저대역보장형 서비스에 대한 과금)

  • Seok, Seung-Hak;Lee, Hoon;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.3
    • /
    • pp.21-28
    • /
    • 2004
  • In the near future we can expect a change in charging the Internet service. The flat charging maybe replaced with a usage-based charging. In line with this movement, we propose a method of charging the assured-quality Internet services for the next generation network by introducing a UBC (usage-based charging) scheme over the conventional flat charging platform. First, we investigate the attribute of elastic traffic generated by assured services in IP network. Next, we propose a new method to relate the bandwidth usage with the pricing for the elastic traffic, which is based partially on the usage rate of the network bandwidth. Next, we propose a charging function for elastic traffic, which is applicable to any type of assured Internet services. Finally, we discuss the implication of the work via simple numerical experiments.

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.

Integrating Granger Causality and Vector Auto-Regression for Traffic Prediction of Large-Scale WLANs

  • Lu, Zheng;Zhou, Chen;Wu, Jing;Jiang, Hao;Cui, Songyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.136-151
    • /
    • 2016
  • Flexible large-scale WLANs are now widely deployed in crowded and highly mobile places such as campus, airport, shopping mall and company etc. But network management is hard for large-scale WLANs due to highly uneven interference and throughput among links. So the traffic is difficult to predict accurately. In the paper, through analysis of traffic in two real large-scale WLANs, Granger Causality is found in both scenarios. In combination with information entropy, it shows that the traffic prediction of target AP considering Granger Causality can be more predictable than that utilizing target AP alone, or that of considering irrelevant APs. So We develops new method -Granger Causality and Vector Auto-Regression (GCVAR), which takes APs series sharing Granger Causality based on Vector Auto-regression (VAR) into account, to predict the traffic flow in two real scenarios, thus redundant and noise introduced by multivariate time series could be removed. Experiments show that GCVAR is much more effective compared to that of traditional univariate time series (e.g. ARIMA, WARIMA). In particular, GCVAR consumes two orders of magnitude less than that caused by ARIMA/WARIMA.

A Study on the optimization design of ATM network Using Internet Traffic Characteristics (인터넷 트래픽 특성을 이용한 ATM 망의 최적설계에 관한 연구)

  • 최삼길;김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.574-581
    • /
    • 2002
  • Traditional queueing analyses are very useful for designing a network's capacity and predicting their performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN, and VBR traffic characteristic have indicated that the models used in the traditional Poisson assumption cannot properly predict the real traffic properties due to underestimation of the long-range dependence of network traffics and self-similar properties. In this paper, It is also shown that the self-similar traffic reflects real Ethernet traffic characteristics by comparing Pareto-like ON/OFF source model which is exactly self-similar model to the traditional Poisson model. It is also performed optimization design and performance analysis of ATM network using Internet traffic characteristics.