• Title/Summary/Keyword: Network traffic monitoring

Search Result 264, Processing Time 0.029 seconds

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Traffic Engineering Process Model (트래픽 엔지니어링 프로세스 모델)

  • Lim Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.5 no.2
    • /
    • pp.151-156
    • /
    • 2004
  • This paper presents process model to accomplish traffic engineering in Internet. The process model consists of 4 stages. The first stage is the formulation of a control policy dominated network operation. The second stage is the observation of the network state through a set or monitoring functions. The third stage is the characterization or traffic and analysis or the network state. The final stage is the optimization of network performance. the four stages of the process model defined above are iterated.

  • PDF

A Network Performance Analysis System based on Network Monitoring for Analyzing Abnormal Traffic (비정상 트래픽 분석을 위한 네트워크 모니터링 기반의 네트워크 성능 분석 시스템)

  • Kim, So-Hung;Koo, Ja-Hwan;Kim, Sung Hae;Choi, Jang-Won;An, Sung-Jin
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.1-8
    • /
    • 2004
  • Large distributed systems such as computational and data grids require that a substantial amount of monitoring data be collected for various tasks such as fault detection, performance analysis, performance tuning, performance prediction, security analysis and scheduling. to cope with this problem, they are needed network monitoring architecture which can collect various network characteristic and analyze network security state. In this paper, we suggest network performance and security analysis system based on network monitoring. The System suggest that users can see distance network state with tuning network parameters.

  • PDF

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

HDF: Hybrid Debugging Framework for Distributed Network Environments

  • Kim, Young-Joo;Song, Sejun;Kim, Daeyoung
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.222-233
    • /
    • 2017
  • Debugging in distributed environments, such as wireless sensor networks (WSNs), which consist of sensor nodes with limited resources, is an iterative and occasionally laborious process for programmers. In sensor networks, it is not easy to find unintended bugs that arise during development and deployment, and that are due to a lack of visibility into the nodes and a dearth of effective debugging tools. Most sensor network debugging tools are not provided with effective facilities such as real-time tracing, remote debugging, or a GUI environment. In this paper, we present a hybrid debugging framework (HDF) that works on WSNs. This framework supports query-based monitoring and real-time tracing on sensor nodes. The monitoring supports commands to manage/control the deployed nodes, and provides new debug commands. To do so, we devised a debugging device called a Docking Debug-Box (D2-Box), and two program agents. In addition, we provide a scalable node monitor to enable all deployed nodes for viewing. To transmit and collect their data or information reliably, all nodes are connected using a scalable node monitor applied through the Internet. Therefore, the suggested framework in theory does not increase the network traffic for debugging on WSNs, and the traffic complexity is nearly O(1).

Database Designs for u-Healthcare System and Magi Network Traffic Management System (u-헬스케어 시스템과 네트워크 트래픽 매니지먼트 시스템의 데이터베이스 설계 및 구현)

  • Yong, Ki-Tak;Laine, Teemu H.;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.103-112
    • /
    • 2008
  • In this paper we present two databases for two different systems each having novel implementation ideas: a u-Healthcare system with a mobile gateway and MAGI network monitoring system. u-Healthcare system is capturing and monitoring vital sign data without restrictions of location and time using body sensor network and a mobile gateway. MAGI is a system which has a dynamic firewall function and solves problems of existing traffic monitoring tools. In addition to presenting the design principles behind these two systems, we describe the respective database schemas together with detailed information of the data stored within the databases. We will also show and discuss performance measurements and calculations for both systems. Based on the performance data we will discuss the systems' suitability for their intended uses.

Handover Monitoring with Flow-based Traffic Measurement in Mobile IPv6 Routers (모바일 IPv6 라우터에서 플로우 측정을 이용한 핸드오버 모니터링)

  • Son, Hyeon-Gu;Choi, NaK-Jung;Choi, Yang-Hee;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.397-404
    • /
    • 2009
  • In this paper, we propose a method of monitoring traffic and analyzing information of handover in mobile IPv6 networks. Our proposed method analyzes handover latency through monitoring packets at routers without installing monitoring applications at mobilenodes. For this purpose, we employ a flow-based traffic monitoring standard called IPFIX to perform the traffic measurement function the packets at the routers. Therefore, our method is useful in that we could easily obtain information regarding handover of mobile nodes by only monitoring traffic at the routers. In order to verify the proposed method, we carried out experiments in a real 802.11-based mobile IPv6 network testbed. From our experimental results, it was shown that the calculated handover latency for uploading traffic is accurate with less accuracy of analyzing the handover latency for downloading traffic.

An SDN-based Bandwidth Control Scheme considering Traffic Variation in the Virtualized WLAN Environment (가상화된 WLAN 환경에서 트래픽 변화를 고려한 SDN 기반 대역폭 제어 기법)

  • Moon, Jaewon;Chung, Sanghwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1223-1232
    • /
    • 2016
  • A virtual network technology can provide a network reflecting the requirements of various services. The virtual network can distribute resources of the physical network to each virtual slice. An efficient resource distribution technique is needed to reflect the requirements of various services. Existing bandwidth distribution techniques can only control downlink traffic without taking traffic conditions on the network into account. Downlink and uplink share the same resources in a wireless network. The existing bandwidth distribution techniques assumed that all stations generate saturated traffic. Therefore, the existing bandwidth distribution technique cannot make traffic isolation in a virtual wireless network. In this paper, we proposed a traffic-based bandwidth control techniques to solve these problems. We applied Software-Defined Networking(SDN) to the virtual wireless network, monitored the traffic at each station, and searched for stations that generated unsaturated traffic. We also controlled both uplink and downlink traffics dynamically based on monitoring information. Our system can be implemented with legasy 802.11 clients and SDN-enabled APs. After the actual test bed configuration, it was compared to existing techniques. As a result, the distribution performance of the proposed technique was improved by 14% in maximum.

A Study on Performance Analysis and Improvement Plan of Campus Network (상명대학교 통신망의 성능분석 및 개선방안에 관한 연구)

  • 이한권;이승혁;이성호;서원흥;이은혜;조태경
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.4
    • /
    • pp.340-344
    • /
    • 2004
  • In this paper, We collected the data of communication network construction in Sangmyeong University and analyzed them. Moreover using the analysis instrument of communication network traffic, We tested a process of it, and an efficiency of each equipment. We proved the traffic flow and the load quantity during the register for class. As a result We suggested a efficient communication network design - add and change some equipments in order to break up the traffic.

  • PDF

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.