• Title/Summary/Keyword: Network traffic

Search Result 4,296, Processing Time 0.031 seconds

Development and Analysis of the Interchange Centrality Evaluation Index Using Network Analysis (네트워크 분석을 이용한 거점평가지표 개발 및 특성분석)

  • KIM, Suhyun;PARK, Seungtae;WOO, Sunhee;LEE, Seungchul
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.6
    • /
    • pp.525-544
    • /
    • 2017
  • With the advent of the big data era, the interest in the development of land using traffic data has increased significantly. However, the current research on traffic big data lingers around organizing or calibrating the data only. In this research, a novel method for discovering the hidden values within the traffic data through data mining is proposed. Considering the fact that traffic data and network structures have similarities, network analysis algorithms are used to find valuable information in the actual traffic volume data. The PageRank and HITS algorithms are then employed to find the centralities. While conventional methods present centralities based on uncomplicated traffic volume data, the proposed method provides more reasonable centrality locations through network analysis. Since the centrality locations that we have found carry detailed spatiotemporal characteristics, such information can be used as an objective basis for making policy decisions.

Design of An Abstraction Technique of Road Network for Adapting Dynamic Traffic Information (동적 교통 정보를 적용하기 위한 도로망 추상화기법의 설계)

  • Kim, Ji-Soo;Lee, Ji-wan;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.199-202
    • /
    • 2009
  • The optimal path on real road network has been changed by traffic flow of roads frequently. Therefore a path finding system to find the optimal path on real network should consider traffic flow of roads that is changed on real time. The most of existing path finding methods do not consider traffic flow of roads and do not also perform efficiently if they use traffic information. In this paper, we propose an abstraction method of real road network based on the Terminal Based Navigation System (TBNS) with technique such as TPEG. TBNS can be able to provides quality of path better than before as using traffic information that is transferred by TPEG. The proposed method is to abstract real network as simple graph in order to use traffic information. It is composed boundary nodes based on real nodes, all boundary nodes that have the same of connection are merged together. The result of path finding on an abstract graph diminishes the search space.

  • PDF

A Study on MEC Network Application Functions for Autonomous Driving (자율주행을 위한 MEC 적용 기능의 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.427-432
    • /
    • 2023
  • In this study, MEC (: Multi-access Edge Computing) proposes a cloud service network configuration for various tests of autonomous vehicles to which V2X (: Vehicle to Everything) is applied in Wave, LTE, and 5G networks and MEC App (: Application) applied V2X service function test verification of two domains (operator (KT, SKT, LG U+), network type (Wave, LTE (including 3G), 5G)) in a specific region. In 4G networks of domestic operators (SKT, KT, LG U+ and Wave), MEC summarized the improvement effects through V2X function blocks and traffic offloading for the purpose of bringing independent network functions. And with a high level of QoS value in the V2X VNF of the 5G network, the traffic steering function scenario was demonstrated on the destination-specific traffic path.

Privacy Preserving Sequential Patterns Mining for Network Traffic Data (사이트의 접속 정보 유출이 없는 네트워크 트래픽 데이타에 대한 순차 패턴 마이닝)

  • Kim, Seung-Woo;Park, Sang-Hyun;Won, Jung-Im
    • Journal of KIISE:Databases
    • /
    • v.33 no.7
    • /
    • pp.741-753
    • /
    • 2006
  • As the total amount of traffic data in network has been growing at an alarming rate, many researches to mine traffic data with the purpose of getting useful information are currently being performed. However, network users' privacy can be compromised during the mining process. In this paper, we propose an efficient and practical privacy preserving sequential pattern mining method on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model and the retention replacement technique. In addition, our method accelerates the overall mining process by maintaining the meta tables so as to quickly determine whether candidate patterns have ever occurred. The various experiments with real network traffic data revealed tile efficiency of the proposed method.

Long-Range Dependence and 1/f Noise in a Wide Area Network Traffic (광역 네트워크 트래픽의 장거리 상관관계와 1/f 노이즈)

  • Lee, Chang-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.27-34
    • /
    • 2010
  • In this paper, we examine a long-range dependence in an active measurement of a network traffic which has been a well known characteristic from analyses of a passive network traffic measurement. To this end, we utilize RTT(Round Trip Time), which is a typical active measurement measured by PingER project, and perform a relevant analysis to a time series of both RTT and its volatilities. The RTT time series exhibits a long-range dependence or a 1/f noise. The volatilities, defined as a higher-order variation, follow a log-normal distribution. Furthermore, volatilities show a long-range dependence in relatively short time intervals, and a long-range dependence and/or 1/f noise in long time intervals. From this study, we find that the long-range dependence is a characteristic of not only a passive traffic measurement but also an active measurement of network traffic such as RTT. From these findings, we can infer that the long-range dependence is a characteristic of network traffic independent of a type of measurements. In particular, an active measurement exhibits a 1/f noise which cannot be usually found in a passive measurement.

Efficient DBA Algorithm for Supporting CBR Service on EPON with Traffic Burstiness (트래픽이 급증하는 EPON 환경에서 고정비트율 서비스를 효율적으로 지원하는 DBA 알고리즘)

  • Lee, Jin-Hee;Lee, Tae-Jin;Chung, Min-Young;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.61-68
    • /
    • 2008
  • Ethernet passive optical network (EPON) is the next-generation technology mitigating the bottleneck between high-capacity local area networks (LANs) and a backbone network. The bottleneck is aggrevated depending on burstiness and long range dependence (LRD) of traffic characteristics as well as amount of outgoing traffic from the high-capacity LANs. The proposed scheme decreases average packet delay for data upstreaming by considering such traffic characteristics to dynamically allocate bandwidth to multiple optical network units (ONUs). In addition, it can appropriately support delay-sensitive traffic such as constant bit ratio (CBR) traffic by making maximum cycle time fix regardless of the number of ONUs. The comprehensive simulation results indicate that the proposed scheme acheives up to 77% and 82% lower than previous schemes in terms of average packet delay and average queue size while it limits the maximum cycle time to twice of the basic cycle time.

  • PDF

Network Coding for Bidirectional Traffic in IEEE 802.16 Systems (IEEE 802.16 시스템에서 양방향 트래픽을 위한 네트워크 코딩 기법)

  • Park, Jung-Min;Hwang, June;Ko, Seung-Woo;Hwang, Young-Ju;Kim, Seong-Lyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12A
    • /
    • pp.975-983
    • /
    • 2011
  • In this paper, we investigate how the IEEE 802.16 based wireless system can adopt the network coding. To avoid the problem of overhearing, we focus on the bidirectional traffic, where each end node exchanges network coded data over a relay node. The bidirectional traffic is usually observed in Internet, where TCP makes congestion control and error recovery based on the acknowledgement from the opposite direction. Thus, enhancing the spectral efficiency of wireless Internet through the network coding is expected. Our simulation with realistic radio characteristics and TCP-like traffic shows that the network coding improves the throughput by an average of 36 percent compared to the simple relay case.

Fast Detection Scheme for Broadband Network Using Traffic Analysis (트래픽 분석에 의한 광대역 네트워크 조기 경보 기법)

  • 권기훈;한영구;정석봉;김세헌;이수형;나중찬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.111-121
    • /
    • 2004
  • With rapid growth of the Internet, network intrusions have greatly increased and damage of attacks has become more serious. Recently some kinds of Internet attacks cause significant damage to overall network performance. Current Intrusion Detection Systems are not capable of performing the real-time detection on the backbone network In this paper, we propose the broadband network intrusion detection system using the exponential smoothing method. We made an experiment with real backbone traffic data for 8 days. The results show that our proposed system detects big jumps of traffic volume well.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

Intelligent Modelling Techniques Using the Neuro-Fuzzy Logic Control in ATM Traffic Controller (ATM 트랙픽 제어기에서 신경망-퍼지 논리 제어를 이용한 지능형 모델링 기법)

  • 이배호;김광희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.683-691
    • /
    • 2000
  • In this paper, we proposed the cell multiplexer using Hopfield neural network and the bandwidth predictor using the backpropagation neural network in order to make an accurate call setup decision. The cell multiplexer controls heterogeneous traffic and the bandwidth predictor estimates minimum bandwidth which satisfies traffic's QoS and maximizes throughput in network. Also, a novel connection admission controller decides on connection setup using the predicted bandwidth from bandwidth predictor and available bandwidth in networks. And then, we proposed a fuzzy traffic policer, when traffic sources violate the contract, takes an appropriate action and aim proved traffic shaper, which controls burstness which is one of key characteristics in multimedia traffic. We simulated the proposed controller. Simulation results show that the proposed controller outperforms existing controller.

  • PDF