• Title/Summary/Keyword: Internet Traffic

Search Result 1,632, Processing Time 0.023 seconds

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

Influence The use of Smart phones on Duty Performance Capability (선박 당직 중 스마트폰 사용이 당직수행 능력에 미치는 영향)

  • Shin, Daewoon;Park, Youngsoo;Park, Jinsoo;Park, Sangwon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.100-102
    • /
    • 2015
  • In recent years, using a smart phone that can access the Internet becomes routine in society through development of information and communication technology. On land, as especially actual accidents and research results show risk that using the smart phone while driving at the same time, and there are traffic laws and regulations that restriction of using of smart phone. But the regulations on the use of smart phones at sea is incomplete state. On this paper. We invested present status of use and reality of smart phone at sea and analyzed the subjective risk for judging to apply to regulation. And we analyzed risk quantitatively by using the simulation experiment; it Suggested a direction of guideline for use of smart phone at sea.

  • PDF

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

Hashing Method with Dynamic Server Information for Load Balancing on a Scalable Cluster of Cache Servers (확장성 있는 캐시 서버 클러스터에서의 부하 분산을 위한 동적 서버 정보 기반의 해싱 기법)

  • Hwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.269-278
    • /
    • 2007
  • Caching in a cache sorrel cluster environment has an advantage that minimizes the request and response tine of internet traffic and web user. Then, one of the methods that increases the hit ratio of cache is using the hash function with cooperative caching. It is keeping a fixed size of the total cache memory regardless of the number of cache servers. On the contrary, if there is no cooperative caching, the total size of cache memory increases proportional to the number of cache sowers since each cache server should keep all the cache data. The disadvantage of hashing method is that clients' requests stress a few servers in all the cache servers due to the characteristics of hashing md the overall performance of a cache server cluster depends on a few servers. In this paper, we propose the method that distributes uniformly client requests between cache servers using dynamic server information. We performed experiments using 16 PCs. Experimental results show the uniform distribution o

An Efficient AP Selection Strategy in Wi-Fi based Vechicle-to-Infrastructure Communications (Wi-Fi 기반의 차량과 기지국간 통신에서 효과적인 AP 선택에 관한 연구)

  • Hwang, Jae-Ryong;Lee, Hwa-Ryong;Choi, Jae-Hyuk;Yoo, Joon;Kim, Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.491-498
    • /
    • 2010
  • Wi-Fi based vehicle-to-infrastructure (V2I) communication is an emerging solution to improve the safety, traffic efficiency, and comfort of passengers. However, due to the high mobility of vehicles and the limited coverage of Wi-Fi APs, the V2I system may suffer from frequent handoffs although roadside APs can support cost effective Internet connectivity. Such problem of V2I systems can be overcome with Mobile AP (MAP) platform. The MAPs yield longer service duration by moving along with vehicles, yet they provide a lower link capacities than the roadside APs. In this paper, we propose a new association control mechanism that effectively determines whether the vehicle will select a fixed roadside-AP or a nearby MAP in mobile vehicular network environments. We consider both the achievable link bandwidth and available connection duration as a selection criterion and provide their run-time estimation method. Extensive simulation using real traces show significant performance improvements.

The Comparative Study on Performance Analysis of Windows 7 and Ubuntu Applying Open Source IDS/IPS Suricata (오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석)

  • Seok, Jinug;Kim, Jimyung;Choi, Moonseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.141-151
    • /
    • 2017
  • Nowadays, It is undeniable that the threat of network security is growing as time flows due to worldwide development of wire/wireless, various Internet platform and sophisticated hacking techniques. The amount of traffics that Network security solution has to handle is increasing and recently many occurrence of explosive traffic attacks from PulseWave are being observed which has many similar characteristics to New DDos. Medium and small sized firms abroad have developed and distributed Snort and Suricata that are based on open-source Intrusion Detection System(IDS) / Intrusion Prevention System (IPS). The goal of this study is to compare between Windows7 by applying suicata 4.0.0 32bit version and Ubuntu 16.04.3 LTS by applying suicata 4.0.0 version which is an open source Intrusion Detection System / Intrusion Protection System that uses multi threads method. This experiment's environment was set as followed C1100 server model of Dell, Intel Xeon CPU L5520 2.27GHz*2 with 8 cores and 16 threads, 72GB of RAM, Samsung SSD 250GB*4 of HDD which was set on RAID0. According to the result, Suricata in Ubuntu is superior to Suricata in Windows7 in performance and this result indicates that Ubuntu's performance is far advanced than Windows7. This meaningful result is derived because Ubuntu that applied Suricata used multi core CPU and RAM more effectively.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

Design and Implementation of SIP Internet Call-setup System using Seven States (7가지 상태를 이용한 SIP 인터넷 전화연결 시스템 설계 및 구현)

  • Shin, Yong-Kyoung;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.300-310
    • /
    • 2007
  • The Session Initiation Protocol (SIP) is one of the major protocols used in call-setup over IP telephony. The SIP-signaled calls use many-sided states according to a request of user. In this paper, we suggest seven states and some events that help developers to design and implement new applications efficiently. And they enable an object-oriented design of the system. If you design the call-setup procedure only by the processing model suggested in RFC 3261 over commercial network, a fatal error may occur in the system because of heavy data traffic or unpredicted exception cases. However, according to the suggested seven states, if they are predefined events in the current system state, the standardized processing routine is executed. Otherwise, they can be processed by the exception routine in system. All event processing routines are designed and implemented using Finite State Machine (FSM).

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.

A New fairness Mechanism based on Number of Effective Nodes providing Efficient Bandwidth Allocation in the Resilient Packet Ring (RPR에서 효율적인 대역폭 할당을 위한 유효 노드 수 기반의 새로운 공평 메커니즘)

  • Lee Dong-Hun;Lee Jae-Hwoon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.641-649
    • /
    • 2005
  • Metro networks use the existing circuit-switching technology like SONET/SDH. Such circuit-switching based networks are inefficient in tarrying Internet traffic with bursty nature. Therefore, metro networks can become a bottleneck In order to resolve this problem, the IEEE 802.17 working group has proposed the RPR (Resilient Packet Ring) technology. In addition to this, the RPR fairness mechanism has been defined to provide fairness among the stations in the RPR network. However, the current RPR fairness mechanism has the problem of inefficient use of the available bandwidth after when the congestion at a node is resolved. In this paper, we propose an improved bandwidth allocation mechanism in which, after the congestion resolution at a node, the node estimates the number of nodes transmitting data and measures the remaining bandwidth and fairly allocates the available bandwidth to active nodes. To show the performance of our proposed mechanism, we have performed simulation and showed that the proposed mechanism offers higher bandwidth utilization.