• Title/Summary/Keyword: Traffic Monitoring

Search Result 729, Processing Time 0.029 seconds

Database Designs for u-Healthcare System and Magi Network Traffic Management System (u-헬스케어 시스템과 네트워크 트래픽 매니지먼트 시스템의 데이터베이스 설계 및 구현)

  • Yong, Ki-Tak;Laine, Teemu H.;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.103-112
    • /
    • 2008
  • In this paper we present two databases for two different systems each having novel implementation ideas: a u-Healthcare system with a mobile gateway and MAGI network monitoring system. u-Healthcare system is capturing and monitoring vital sign data without restrictions of location and time using body sensor network and a mobile gateway. MAGI is a system which has a dynamic firewall function and solves problems of existing traffic monitoring tools. In addition to presenting the design principles behind these two systems, we describe the respective database schemas together with detailed information of the data stored within the databases. We will also show and discuss performance measurements and calculations for both systems. Based on the performance data we will discuss the systems' suitability for their intended uses.

Implementation of Network Traffic and QoS Monitoring System based on User Agent (사용자 에이전트 기반의 네트워크 트래픽 및 QoS 모니터링 시스템 구현)

  • Lee, Do-Hyeon;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.41-50
    • /
    • 2008
  • Recently amount of traffic into the network rapidly increase since multimedia streaming services is generally adopted for application. In addition, various network management systems have been suggested for providing a stable service and QoS guarantee. It is necessary for such systems to have QoS monitoring module in order to evaluate acceptance or violation of QoS requirements by analogizing a state information of each node within network. In this paper, we suggest a network management system to evaluate QoS level between end-to-end agents and analysis traffics transmitted between them. The proposed system is implemented for the purpose of collecting network traffic information and monitoring of the view. The proposed system makes user easily understand information of QoS parameters such as throughput, delay and jitter by adopting a method of visual and numerical representation. To achieve this, we purportedly generate test packet into network for confirming acceptance or violation of QoS requirements from point of view of multimedia application service.

  • PDF

Development of a Traffic Condition Index (TCI) on Expressways (고속도로 소통상태지수 개발에 관한 연구)

  • Bok, Gi-Chan;Lee, Seung-Jun;Choe, Yun-Hyeok;Gang, Jeong-Gyu;Lee, Seung-Hwan
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.85-95
    • /
    • 2009
  • Congestion on expressways is increasing in spite of continuous road construction. In enlargement of expressway capacity to lessen congestion, a long period is needed and in the case of traffic congestion, it would be impossible to avoid long periods of traffic congestion. So, it is necessary to cope with traffic congestion through continuous traffic condition monitoring, analysis of the causes of congestion and the development of alternatives before traffic conditions worsen. A congestion index that can express traffic operating conditions measurably is needed to monitor those conditions. Thus, in this research, a new congestion index, the Traffic Condition Index (TCI), is developed. TCI is able to evaluate roads that have different grades (or design speeds) and to judge traffic condition as good, fair and poor (congested). In addition, TCI has merits in that it can strengthen the function of existing Freeway Traffic Management Systems (FTMS) and can be applied to congestion management easily: TCI calculates congestion intensity and severity using data obtained from existing FTMS. In order to validate TCI, it was applied to the Kyungbu Expressway and the Seohaean Expressway. As a result, TCI shows a good performance in the aspect of applicability and ability of presentation of traffic conditions compared with travel speed and Travel Time Index (TTI).

A Study on the Convergence of Monitoring and Control System with Geographic Information System (지리정보시스템과 관제시스템의 융합에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo;Lee, Jae-Sung;Lee, Cheol-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.703-709
    • /
    • 2011
  • State-based infrastructure on IT-based network are prone to numerous cyber attack including subsequent hacking and internet infringement. These acts of terrorism are increasing because of the expanding IT convergence technology. Recently, the trend on cyber security monitoring and control researches focus on combining the general idea of security monitoring and control along with IT field and other control systems. This convergence trend has been increasing in both the use and importance. This research analyzes the state-based infrastructure monitoring and control system, its vulnerability as well as its improvement by incorporating the cyber convergence systems to existing systems. The subject of this research is for extensive use of CCTV systems which is expanded for 'CCTV Monitoring and Control Field' as well as 'Traffic Monitoring and Control Field' operated by 'Intelligent Traffic Information System' and Disaster Management Area which is studied in various fields. Eventually, the objective of the paper is to solve these issues, to apply related systems and to suggest improvement on the convergence system.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

A Study on Optimum Control of Marine Traffic(II) - In the Domain of Passage - (해상 교통량의 효율적 관리 방안에 관하여 (II) - 일반 수로의 경우 -)

  • 윤명오;이철영
    • Journal of the Korean Institute of Navigation
    • /
    • v.15 no.3
    • /
    • pp.1-11
    • /
    • 1991
  • As increasing needs of marine transportation , world merchant fleet and ship's size were enlarged and it caused frequent disasters in human lives and natural environment. By the reason of the above, they started to establish the Vessel Traffic System (VTS) at the European coast in 1960' and most of advanced contries established and managed it to prevent the sea traffic accidents in these days. The concept of traffic control at sea can be divided into three types. First, the initial gathering of informations about ship's identity and movement etc.. Second, monitoring of the traffic flow and amendment of instructions. Third , organization and direction of ships by allocating routes and speeds. Where the goal of traffic control is safety of traffics and developing effectiveness of navigation channel, if traffic volume is less tan channel capacity then the above first or second level of control would be sufficient but if it is bigger than that , more positive policy of control should be adopted as same as third type of the above. In this paper where the strategy of VTS is focused on the control of traffic density to be spread equality, as possible , all over the navigation channels and also improvement of effectiveness , it suggests algorithm to assign the vessels to the channels with balanced traffic density , and other algorithms using D.P. to sequence the vessels assigned to one channel in optimum order which decreases the mean waiting time in sense of channel effectiveness with numerical examples.

  • PDF

Harmful Traffic Detection by Web Traffic Analysis (웹 트래픽 분석을 통한 유해 트래픽 탐지)

  • Shin, Hyun-Jun;Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.221-229
    • /
    • 2007
  • Security of the port TCP/80 has been demanded by reason that the others besides web services have been rapidly increasing use of the port. Existing traffic analysis approaches can't distinguish web services traffic from application services when traffic passes though the port. monitoring method based on protocol and port analysis were weak in analyzing harmful traffic using the web port on account of being unable to distinguish payload. In this paper, we propose a method of detecting harmful traffic by web traffic analysis. To begin, traffic Capture by real time and classify by web traffic. Classed web traffic sorts each application service details and apply weight and detect harmful traffic. Finally, method propose and implement through coding. Therefore have a purpose of these paper to classify existing traffic analysis approaches was difficult web traffic classified normal traffic and harmful traffic and improved performance.

  • PDF

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

A Study on the Development the Maritime Safety Assessment Model in Korea Waterway

  • Park, Young-Soo;Kim, Jong-Sung;Aydogdu, Volkan
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.567-574
    • /
    • 2013
  • Although Korea coastal area has the increasing potential marine accident due to frequent ship's encounter, increased vessel traffic and large vessel, there is no specific model to evaluate the navigating vessel's risk considering the domestic traffic situation. The maritime transport environmental assessment is necessary due to the amended maritime traffic law. However, marine safety diagnosis is now carried out by foreign model. In this paper, therefore, we suggest a domestic traffic model reflecting the characteristics of korea coastal area and navigator's risk as we named PARK(Potential Assessment of Risk) model. We can evaluate the subjective risk by establishing the model and model output into maritime risk exposure system. To evaluate this model's effectiveness, we used ship handling simulation and applied, analyzed collision accident which occurred in korea coastal area. And also, we applied integrated to an ECDIS program for monitoring traffic risk of vessels with real time based AIS data and apply to evaluate traffic risk in busan harbor waterway. As a result, we could evaluate busan harbor waterway risk effectively.

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF