• Title/Summary/Keyword: Network traffic

Search Result 4,296, Processing Time 0.024 seconds

A Study of Statistical Approach for Detection of Outliers in Network Traffic

  • Kim, Sahm-Yeong;Yun, Joo-Beom;Park, Eung-Ki
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.4
    • /
    • pp.979-987
    • /
    • 2005
  • In this research we study conventional and new statistical methods to analyse and detect outliers in network traffic and we apply the nonlinear time series model to make better performance of detecting abnormal traffic rather the linear time series model to compare the performances of the two models.

  • PDF

A study on the traffic analysis in LAN environment (LAN 환경에서의 트래픽 해석에 관한 연구)

  • 이종영;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.8
    • /
    • pp.1970-1975
    • /
    • 1996
  • The characteristics of data traffic on the Ethernet LAN are investigated on the basis of measurements. The analysis on the arrival pattern of packets on the network is found not to be a Poission process but to be Weibull distributions. An analysis of network traffic, packet arrivals are found to exhibit a 'source locality'. It is observed that file transfers are reponsible for about 92% of the traffic on the network. Our results will be useful for modelling purposes.

  • PDF

Improvement and Performance Evaluation of the Traffic Channel Management of the Radio Network Controller in IMT-2000 Network (IMT-2000 망에서 제어국의 트래픽 채널 관리 방식의 개선 및 성능 평가)

  • Ryu, Byung-Han;Ahn, Jee-Hwan;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.16 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • We propose the improved channel assignment and management methods for an efficient use of traffic channel resource for supporting 12.2 Kbps, 64 Kbps, and 384 Kbps traffic with the different quality of service(QoS) in the radio network controller(RNC) in asynchronous IMT-2000 system. We consider two types of traffic channel block assignments for utilizing the traffic channel efficiently; the Completely Shared(CS) channel assignment and the Partially Dedicated and Partially Shared(PDPS) channel assignment. The former is that all traffic channel blocks are completely shared with all traffic types. The latter is that some traffic channel block is independently assigned to each traffic type and the other blocks are completely shared with some traffic type. We also propose the traffic channel management method which consists of the block and task management step, for efficiently assigning, releasing, and managing the channel resource. Finally, we evaluate the performance through various numerical examples when applying our proposed channel block assignment and resource management methods.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

Performance Evaluation of Network Coding in MANETs for Bidirectional Traffic (MANETs에서 양방향 트래픽에 대한 네트워크 코딩기법의 성능 평가)

  • Kim, Kwan-Woong;Kim, Yong-Kab;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.3
    • /
    • pp.491-497
    • /
    • 2012
  • Network coding is that the nodes can combine and mix the packets rather than merely forward them. Therefore, network coding is expected to improve throughput and channel efficiency in the wireless network. Relevant researches have been carried out to adapt network coding to wireless multi-hop network. In this paper, we designed the network coding for bidirectional traffic service in routing layer and IP layer of Ad-hoc network. From the simulation result, the traffic load and the end to end distance effect the performance of the network coding. As end to end distance and the traffic load become larger, the gain of network coding become more increased.

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

Traffic Congestion Management on Urban Roads using Vehicular Ad-hoc Network-based V2V and V2I Communications (차량 애드혹 네트워크 기반 V2V와 V2I 통신을 사용한 시내 도로에서의 교통 체증 관리)

  • Ryu, Minwoo;Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.9-16
    • /
    • 2022
  • The nodes constituting the vehicle ad hoc network (VANET) are vehicles moving along the road and road side units (RSUs) installed around the road. The vehicle ad hoc network is used to collect the status, speed, and location information of vehicles driving on the road, and to communicate with vehicles, vehicles, and RSUs. Today, as the number of vehicles continues to increase, urban roads are suffering from traffic jams, which cause various problems such as time, fuel, and the environment. In this paper, we propose a method to solve traffic congestion problems on urban roads and demonstrate that the method can be applied to solve traffic congestion problems through performance evaluation using two typical protocols of vehicle ad hoc networks, AODV and GPSR. The performance evaluation used ns-2 simulator, and the average number of traffic jams and the waiting time due to the average traffic congestion were measured. Through this, we demonstrate that the vehicle ad hoc-based traffic congestion management technique proposed in this paper can be applied to urban roads in smart cities.

Big-Data Traffic Analysis for the Campus Network Resource Efficiency (학내 망 자원 효율화를 위한 빅 데이터 트래픽 분석)

  • An, Hyun-Min;Lee, Su-Kang;Sim, Kyu-Seok;Kim, Ik-Han;Jin, Seo-Hoon;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.541-550
    • /
    • 2015
  • The importance of efficient enterprise network management has been emphasized continuously because of the rapid utilization of Internet in a limited resource environment. For the efficient network management, the management policy that reflects the characteristics of a specific network extracted from long-term traffic analysis is essential. However, the long-term traffic data could not be handled in the past and there was only simple analysis with the shot-term traffic data. However, as the big data analytics platforms are developed, the long-term traffic data can be analyzed easily. Recently, enterprise network resource efficiency through the long-term traffic analysis is required. In this paper, we propose the methods of collecting, storing and managing the long-term enterprise traffic data. We define several classification categories, and propose a novel network resource efficiency through the multidirectional statistical analysis of classified long-term traffic. The proposed method adopted to the campus network for the evaluation. The analysis results shows that, for the efficient enterprise network management, the QoS policy must be adopted in different rules that is tuned by time, space, and the purpose.

Development of Network Reconfiguration for Traffic Restrictions and Evolution Program for Multiple Shortest Paths (교통제약을 고려할 수 있는 네트워크재구성과 다수최적경로들을 탐색할 수 있는 진화프로그램의 개발)

  • Kim, Sung-Soo;Min, Seung-Ki;Hong, Soon-Jung
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.15-25
    • /
    • 2008
  • This paper is to develop a network reorganization method to consider the constraints which are turn restrictions, U-turns, and P-turns in two way traffic network for Intelligent Transport System(ITS). Several kinds of traffic constraints can be represented in reorganized network using virtual nodes and arc values. The evolution program is also developed to search the multiple shortest paths in this reorganized traffic network within limited time.

  • PDF