• Title/Summary/Keyword: Internet traffic engineering

Search Result 689, Processing Time 0.026 seconds

Analysis of Aggregated HTTP-based Video Traffic

  • Biernacki, Arkadiusz
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.826-836
    • /
    • 2016
  • Increase of hypertext transfer protocol (HTTP)-based video popularity causes that broadband and Internet service providers' links transmit mainly multimedia content. Network planning, traffic engineering or congestion control requires understanding of the statistical properties of network traffic; therefore, it is desirable to investigate the characteristic of traffic traces generated, among others, by systems which employ adaptive bit-rate streaming. In our work, we investigate traffic originating from 120 client-server pairs, situated in an emulated laboratory environment, and multiplexed onto a single network link. We show that the structure of the traffic is distinct from the structure generated by first and second generation of HTTP video systems, and furthermore, not similar to the structure of general Internet traffic. The obtained traffic exhibits negative correlations, anti-persistence, and its distribution function is skewed to the right. Furthermore, we show that the traffic generated by clients employing the same or similar play-out strategies is positively correlated and synchronised (clustered), whereas traffic originated from different play-out strategies shows negative or no correlations.

Investigation of Traffic Accident using Skid Mark (스키드마크를 이용한 교통사고 조사)

  • Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.113-120
    • /
    • 2010
  • In case the traffic accident occurs, skid mark is very important factor to calculate the car speed. Especially, for the purpose of objective and scientific inspection, traffic accidents should be appraised and inspected by righteous material evidences, computer simulation, and studies such as automobile engineering, traveling and collision accident dynamics, road and traffic engineering. In this paper, it displays the results of studying cases with the reasons of traffic accidents by analyzing and studying automobile kinetics, real traffic accidents and the results of in scientific and objective ways. After computer simulation result that it is proved that compared with unpacked road condition and packed road condition. unpacked road condition is shorter than packed road condition.

A Review of Mobile Data Traffic Explosion according to Digital Convergence and Action Plans of Network Operator (디지털 컨버전스 활성화에 따른 모바일 데이터 트래픽 증가 현황에 대한 고찰 및 대응 방안 모색)

  • Park, Bok-Nyong;Moon, Tae-Hee;Kwack, Jun-Yeung;Kwon, June-Hyuk
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.131-140
    • /
    • 2010
  • Recently, mobile wireless data traffic has been dramatically increased due to not only the popularization of digital convergence devices including smart phone, Net-book, and Tablet PC, but also the vitalization of wireless Internet related eco-systems such as AppStore. In addition, it is expected that a tremendous increase in mobile data is caused by the release of unlimited mobile data plans (flat-fee). In order to deal with such mobile data traffic explosion, it is necessary that network operators should make efforts to offload wireless data traffic. This paper reviews the condition of mobile wireless data traffic in domestic and international telecommunication industry and looks for various action plans to overcome the difficulty of network operators.

  • PDF

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

Implementation of Smart Traffic Safety Systems using Fuzzy Theory

  • Han, Chang Pyoung;Hong, You Sik
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.71-82
    • /
    • 2020
  • Traffic accidents due to excessive speed frequently occur in places where traffic signal controllers are installed, places where sharp curves exist, or places where the traffic signal cycle does not match the current time. These traffic accidents cause economic loss due to the destruction of road facilities and structures, and cause a big problem of increasing the number of traffic accident deaths. When a traffic accident occurs, leaving a tire mark before or after a car crash, pre-collision speed of the car is calculated using the law of conservation of momentum or the skid mark formula. In the skip skid mark generated in ABS brake vehicles and the combshaped yaw mark generated by tire trace caused by lateral sliding, there is a difference of 30-40% in the reliability of the vehicle speed calculated by the smite mark. In this paper, we propose an algorithm that can improve the calculation reliability in vehicle speed by using skid marks in order to compensate for this problem. In addition, we present an intelligent speed calculation algorithm for traffic safety and a computer simulation in order to prevent traffic accidents by estimating the speed of a vehicle, using Skid marks, Yaw marks, and ABS brake characteristics and fuzzy rules.

A Flexible Network Access Scheme for M2M Communications in Heterogeneous Wireless Networks

  • Tian, Hui;Xie, Wei;Xu, Youyun;Xu, Kui;Han, Peng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3789-3809
    • /
    • 2015
  • In this paper, we deal with the problem of M2M gateways' network selection for different types of M2M traffic in heterogeneous wireless networks. Based on the difference in traffic's quality of service (QoS) requirements, the M2M traffic produced by various applications is mainly classified as two categories: flexible traffic and rigid traffic. Then, game theory is adopted to solve the problem of network-channel selection with the coexistence of flexible and rigid traffic, named as flexible network access (FNA). We prove the formulated discrete game is a potential game. The existence and feasibility of the Nash equilibrium (NE) of the proposed game are also analyzed. Then, an iterative algorithm based on optimal reaction criterion and a distributed algorithm with limited feedback based on learning automata are presented to obtain the NE of the proposed game. In simulations, the proposed iterative algorithm can achieve a near optimal sum utility of whole network with low complexity compared to the exhaustive search. In addition, the simulation results show that our proposed algorithms outperform existing methods in terms of sum utility and load balance.

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Dongcheul;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1284-1297
    • /
    • 2019
  • The network environment is presently becoming very increased. Accordingly, the study of traffic classification for network management is becoming difficult. Automatic signature extraction system is a hot topic in the field of traffic classification research. However, existing automatic payload signature generation systems suffer problems such as semi-automatic system, generating of disposable signatures, generating of false-positive signatures and signatures are not kept up to date. Therefore, we provide a fully automatic signature update system that automatically performs all the processes, such as traffic collection, signature generation, signature management and signature verification. The step of traffic collection automatically collects ground-truth traffic through the traffic measurement agent (TMA) and traffic management server (TMS). The step of signature management removes unnecessary signatures. The step of signature generation generates new signatures. Finally, the step of signature verification removes the false-positive signatures. The proposed system can solve the problems of existing systems. The result of this system to a campus network showed that, in the case of four applications, high recall values and low false-positive rates can be maintained.

Test Bed for Radio Access Network Slicing Using FlexRAN Controller (FlexRAN 제어기를 이용한 무선 접근 망 슬라이싱을 위한 테스트베드)

  • Ahmed, Jahanzeb;Song, Wang-Cheol;Ahn, Khi Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.211-212
    • /
    • 2019
  • Slicing Radio Access Network (RAN) can help in effectively utilizing the network bandwidth and to better manage the increasing traffic over interent. RAN slicing system discussed in this paper is based on an open-source slicing mechanism in which we write a JSON configuration file for slicing policy and send it to the FlexRAN controller. FlexRAN controlls the core networks (CNs) through OAI-RAN on the evolved packet core (EPC) component of this system. Each CN is responsible for handling a saperate RAN slice. The type of internet traffic is identified by the FlexRAN crontroller and is sent to the respective CN through OAI-RAN. CN handles the traffic according to the allocated bandwidth and in this way the internet traffic is sliced inside the EPC component.