• Title/Summary/Keyword: Network traffic monitoring

Search Result 264, Processing Time 0.028 seconds

The Dynamic Channel Allocation Algorithm for Collision Avoidance in LR-WPAN (LR-WPAN에서 충돌회피를 위한 동적 채널할당 알고리즘)

  • Lim, Jeong-Seob;Yoon, Wan-Oh;Seo, Jang-Won;Choi, Han-Lim;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.6
    • /
    • pp.10-21
    • /
    • 2010
  • In the cluster-tree network which covers wide area network and has many nodes for monitoring purpose traffic is concentrated around the sink. There are long transmit delay and high data loss due to the intensive traffic when IEEE 802.15.4 is adapted to the cluster-tree network. In this paper we propose Dynamic Channel Allocation algorithm which dynamically allocates channels to increase the channel usage and the transmission success rate. To evaluate the performance of DCA, we assumed the monitoring network that consists of a cluster-tree in which sensing data is transmitted to the sink. Analysis uses the traffic data which is generated around the sink. As a result, DCA is superior when much traffic is generated. During the experiment assuming the least amount of traffic, IEEE 802.15.4, has the minimum length of active period and 90% data transmission success rate. However DCA maintains 11.8ms of active period length and results in 98.9% data transmission success rate.

Implementation of Communication Network Utilizing AIS Technology

  • Park, Soo-Hong;Lee, Jong-Nyen
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.370-375
    • /
    • 2008
  • Automatic Identification System (AIS) is recently introduced to the maritime navigation systems. It is aimed to increase safety of vessels at sea by exchanging information to coastal monitoring stations. This article presents a ship traffic monitoring system by using the AIS information communication system using MS Visual C++. Then, the mobile Internet AIS introduced here is considerably improving and extending AIS functionalities compared to VHF AIS. When each ship is connected to the Internet network through the developed AIS system with her own client ID, all of her AIS information is surely sent to a server at her own base station by processing the information via the Internet network.

Selection of a Competent Wireless Access Point for High Wireless Bandwidth

  • Park, Ji-Yeon;Hwang, Ki-Tae
    • Journal of Information Processing Systems
    • /
    • v.2 no.3 s.4
    • /
    • pp.159-162
    • /
    • 2006
  • Wireless LANs are becoming more widespread because of the rapid advance of wireless technologies and mobile computers. In this paper, we present the design and implementation of a system to help mobile users to select the most competent AP. By monitoring the network traffic of APs within the local LAN in real time, this system offers the mobile user the network utilizations, locations, and signal strengths of APs online. Based on the information, the user can select a competent AP with a high wireless bandwidth. Finally, we verified the accuracy of monitoring and calculating with regard to the utilizations of APs through real experiments.

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

Analysis of Vessel Traffic in Tokyo Bay Observed by New Remote Radar Network System

  • Okano, Tadashi;Ohtsu, Kohei;Hagiwara, Hideki;Shoji, Ruri;Tamaru, Hitoi;Liu, Shun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.208-216
    • /
    • 2004
  • Since 2000, the authors have been developing remote radar network system to observe the vessel traffic in Tokyo Bay. In December 2002, the first operational remote radar station was set at the National Defense Academy in Yokosuka, and vessel traffic observation was started. However, it was impossible to perform accurate observation in the northern part of Tokyo Bay by this Yokosuka radar station only. In September 2003, the second remote radar station and AIS receiving station were installed at Higashi Ogishima in Kawasaki. This second radar enabled us to carry out accurate observation in that area. Both radars can be remotely controlled from the monitoring station in Tokyo University of Marine Science and Technology. On September 30 and October 1,2003, the vessel traffic observation was carried out using both radars. Combining radar images observed by both radars, the ships' tracks were taken and the dangerous ships were extracted by using SJ value and Bumper Model. The time changes of dangerous ship density in some areas in Tokyo Bay and utilization ratio of the traffic routes were also investigated. In addition, analyzing the AIS date received at Kawasaki station, the positions and speed vectors of the ships equipped with AIS were shown.

  • PDF

An Efficient Update Algorithm for Packet Classification With TCAM (TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘)

  • Jeong Haejin;Song Ilseop;Lee Yookyoung;Kwon Taeckgeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.79-85
    • /
    • 2006
  • Generally, it is essential that high-speed routers, switches, and network security appliances should have an efficient packet classification scheme in order to achieve the high-speed packet forwarding capability. For the multi-gigabit packet-processing network equipment the high-speed content search hardware such as TCAM and search engine is recently used to support the content-based packet inspection. During the packet classification process, hundreds and thousands of rules are applied to provide the network security policies regarding traffic screening, traffic monitoring, and traffic shaping. In addition, these rules could be dynamically changed during operations of systems if anomaly traffic patterns would vary. Particularly, in the high-speed network, an efficient algorithm that updates and reorganizes the packet classification rules is critical so as not to degrade the performance of the network device. In this paper, we have proposed an efficient update algorithm using a partial-ordering that can relocate the dynamically changing rules at the TCAM. Experimental results should that our algorithm does not need to relocate existing rules feature until 70$\%$ of TCAM utilization.

Design and Implementation of Receiver Network Elements for Real-Time Precise GPS/GNSS (실시간 정밀 GPS/GNSS를 위한 위성항법 수신기 망 구성 요소 설계 및 구현)

  • Kim, Hee-Sung;Lee, Hyung-Keun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.126-133
    • /
    • 2010
  • Due to the deployment of various wireless networks originating from CDMA, GSM, and WLAN, it became very convenient to exchange information from one place to another. As compared with the traditional environments for one-way information distribution based on fixed radio frequency bands, the convenient wireless network environments will bring about many changes in positioning technologies based on global navigation satellites. Among the many changes to come, the reconfigurable receiver network is one of the most attractive concepts since it can be tailored to a specific application area among networked robots, formation flying, bridge monitoring, and traffic monitoring. As an initial study to develop a reconfigurable receiver network, this paper deals with the design and implementation of the key elements of the reconfigurable receiver netowork; server, broadcaster, and client. In the designed receiver network, a sever receives and decodes measurements from a reference receiver installed at a known location, a broadcaster processes and transfers the messages from servers to clients and manages connections with servers and clients, a client receives the messages from the broadcaster and performs differential positioning. A real-time experiment result is demonstrated to validate the functionalities of each network element.

Performance Evaluation of Real-time Voice Traffic over IEEE 802.15.4 Beacon-enabled Mode (IEEE 802.15.4 비컨 가용 방식에 의한 실시간 음성 트래픽 성능 평가)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.43-52
    • /
    • 2007
  • IEEE 802.15.4 specification which defines low-rate wireless personal area network(LR-WPAN) has application to home or building automation, remote control and sensing, intelligent management, environmental monitoring, and so on. Recently, it has been considered as an alternative technology to provide multimedia services such as automation via voice recognition, wireless headset and wireless camera for surveillance. In order to evaluate capability of voice traffic on the IEEE 802.15.4 LR-WPAN, we supposed two scenarios, voice traffic only and coexistence of voice and sensing traffic. For both cases we examined delay and packet loss rate in case of with and without acknowledgement, and various beacon period varying with beacon and superframe order values. In LR-WPAN with voice devices only, total 5 voice devices could be applicable and in the other case, i.e., coexisted cases of voice and sensor devices, a voice device was able to coexist with about 60 sensor devices.

  • PDF

Comparison Study of Nitrogen Dioxide and Asthma Doctor's Diagnosis in Seoul - Base on Community Health Survey 2012~2013 - (서울시 대기 중 이산화질소 농도와 천식증상의 비교 연구 - 2012~2013년 지역사회건강조사 자료를 중심으로 -)

  • Lee, Sang-Gyu;Lee, Yong-Jin;Lim, Young-Wook;Kim, Jung-Su;Shin, Dong-Chun
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.32 no.6
    • /
    • pp.575-582
    • /
    • 2016
  • Seoul city has high population density as well as high traffic congestion, which are vulnerable to exposure of environmental pollutions caused by car traffic. However, recent studies are only on local regions about road traffic and air pollution or health effect of road traffic on residents. Thus, comprehensive study data are needed in terms of overall Seoul regions. In this study utilized the nitrogen dioxide concentration through the national air pollution monitoring network data, 2012 to 2013. It also divided regions into high and low exposure districts via the Origin destination data developed by the Korea transport institute to quantify and evaluate the effect of transport policies and analyzed a correlation of asthma symptoms with high and low exposure districts through raw data of community health survey from the Korea centers for disease control and prevention. Based on the collected data, the pearson's correlation analysis was conducted between air pollution substance concentration and high exposure district and multiple logistic regression analysis was conducted to determine the effect of traffic environment and factors on asthma symptoms of residents. Accordingly, the following results were derived. First, the high exposure district was higher concentrations of nitrogen dioxide ($NO_2$) as per time compared to those of the low exposure district (p<0.01). Second, analysis on correlation between average daily environmental concentration in the air pollution monitoring network and road traffic showed that nitrogen dioxide had a significant positive correlation (p<0.01) with car traffic and total traffic as well as with truck traffic (p<0.05) statistically. Third, an adjusted odds ratio about asthma doctor's diagnosis in the high and low exposure districts was analyzed through the logistic regression analysis. With regard to an adjusted model 2 (adjusted gender, age, health behavior characteristics, and demographic characteristics) odds ratio of asthma doctor's diagnosis in the high exposure district was 1.624 (95% CI: 1.269~2.077) compared to that of the low exposure district, which was significant statistically (p<0.001).

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.