• Title/Summary/Keyword: network capacity

Search Result 1,905, Processing Time 0.03 seconds

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Analysis on the Performance Elements of Web Server Cluster Systems (웹서버 클러스터 시스템의 성능 요소 분석)

  • Park, Jin-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.91-98
    • /
    • 2010
  • This paper is on the research result for analyzing the performance of GLORY(GLobal Resource management sYstem) used for Web Server Cluster system, which was developed at ETRI(Electronic and Telecommunication Research Institute). The paper includes the definition of Web Server Cluster System, the characteristics of the system, user oriented system performance, current performance enhancement methods, computer simulation model for GLORY and its experimental results for the performance of GLORY. GLORY is composed of 2048~1,000,000 units of PCs, and is used for Internet servers. From the results of the simulation experiments, we notice that GLORY has enough capacity to fully serve the appropriate level of Internet services. Also, the results show that Web server service time is longer than that for network transmission time but requires more DNS than expected, and that 100Mbps LAN is good enough for directly connecting Internet to the Web servers while not affecting the total system performance.

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Analysis of Performance of Creative Education based on Twitter Big Data Analysis (트위터 빅데이터 분석을 통한 창의적 교육의 성과요인 분석)

  • Joo, Kilhong
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.215-223
    • /
    • 2019
  • The wave of the information age gradually accelerates, and fusion analysis solutions that can utilize these knowledge data according to accumulation of various forms of big data such as large capacity texts, sounds, movies and the like are increasing, Reduction in the cost of storing data accordingly, development of social network service (SNS), etc. resulted in quantitative qualitative expansion of data. Such a situation makes possible utilization of data which was not trying to be existing, and the potential value and influence of the data are increasing. Research is being actively made to present future-oriented education systems by applying these fusion analysis systems to the improvement of the educational system. In this research, we conducted a big data analysis on Twitter, analyzed the natural language of the data and frequency analysis of the word, quantitative measure of how domestic windows education problems and outcomes were done in it as a solution.

On the Availability of Han river as Water Transport Route (수상운송로로서 한강의 이용가능성에 관한 연구)

  • Choi, K.I.;Roh, H.S.;Lee, C.Y.
    • Journal of Korean Port Research
    • /
    • v.7 no.2
    • /
    • pp.37-60
    • /
    • 1993
  • Because of the rapid growing traffic volumes of cargo, especially between Seoul and Inchon, and lack of investment into transport infrastructure in the past, in Kyong-in area have suffered from the serious traffic congestion in the public-road and the express-way network, But the further expansion of the traffic volume in near future is difficult due to burden of the higher expansion of the traffic volume in near future is difficult due to burden of the higher construction cost. Although the traffic congestion on the Kyung-in railway, is not very serious comparing with the road sector, the shortage of capacity on some main lines becomes emerged as a problem as railway traffic has increased. Unlike these two modes, the water transport, which has been paid relatively less attention for commodity transport in Kyong-in area, has not any constaint in this respect. Han river has been used as a water transport route in Chosun Dynasty which is called Cho-wun. This paper therefore aims to propose the availability of Han river as the alternative water transportation mode, in order to decrease the congestion between Seoul-Inchon by considering the construction of Kyong-in artificial water channel in near future. In this paper, we investigate the availability of Nanji-do as the physical distribution depot connecting with the circulation express way in the national capital distribution depot connecting with the circulation express way in the national capital. We also estimate the traffic volume by using the push-barge carrier (300DWT) in the same channel through the simulation under some assumptions such as ship's turnaround time, speed, etc.

  • PDF

Management Techniques of Interest Area Utilizing Subregions in MMORPG based on Cloud and P2P Architecture (클라우드와 P2P 구조 기반의 MMORPG에서 소영역을 활용하는 관심 구역의 관리 기법)

  • Jin-Hwan Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.99-106
    • /
    • 2023
  • In this paper, we propose subregion-based area of interest management techniques for MMORPG(massively multiplayer online role playing games) integrating P2P(peer-to-peer) networking and cloud computing. For the crowded region, the proposed techniques partition it into several subregions and assign a player to manage each subregion as a coordinator. These techniques include a load balancing mechanism which regulates communication and computation overhead of such player below the specified threshold. We also provide a mechanism for satisfying the criterion, where subregions overlapped with each player's view must be switched quickly and seamlessly as the view moves around in the game world. In the proposed techniques where an efficient provisioning of resources is realized, they relieve a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the players effectively. Simulation results show that the MMORPG based on cloud and P2P architecture can reduce the considerable bandwidth at the server compared to the client server architecture as the available resources grow with the number of players in crowding or hotspots.

Bit Register Based Algorithm for Thread Pool Management (스레드 풀 관리를 위한 비트 레지스터 기반 알고리즘)

  • Shin, Seung-Hyeok;Jeon, Jun-Cheol
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.331-339
    • /
    • 2017
  • This paper proposes a thread pool management technique of an websocket server that is applicable to embedded systems. WebSocket is a proposed technique for consisting a dynamic web, and is constructed using HTML5 and jQuery. Various studies have been progressing to construct a dynamic web by Apache, Oracle and etc. Previous web service systems require high-capacity, high-performance hardware specifications and are not suitable for embedded systems. The node.js which is consist of HTML5 and jQuery is a typical websocket server which is made by open sources, and is a java script based web application which is composed of a single thread. The node.js has a limitation on the performance for processing a high velocity data on the embedded system. We make up a multi-thread based websoket server which can solve the mentioned problem. The thread pool is managed by a bit register and suitable for embedded systems. To evaluate the performance of the proposed algorithm, we uses JMeter that is a network test tool.

Exploiting Spatial Reuse Opportunity with Power Control in loco parentis Tree Topology of Low-power and Wide-area Networks (대부모 트리 구조의 저 전력 광역 네트워크를 위한 전력 제어 기반의 공간 재사용 기회 향상 기법)

  • Byeon, Seunggyu;Kim, JongDeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.194-198
    • /
    • 2021
  • LoRa is a physical layer technology that is designed to provide a reliable long-range communication with introducing CSS and with introducing a loco parentis tree network. Since a leaf can utilize multiple parents at the same time with a single transmission, PDR increases logarithmically as the number of gateways increases. Because of the ALOHA-like MAC of LoRa, however, the PDR degrades even under the loco parentis tree topology similarly to the single-gateway environment. Our proposed method is aimed to achieve SDMA approach to reuse the same frequency in different areas. For that purpose, it elaborately controls each TxPower of the senders for each message in concurrent transmission to survive the collision at each different gateway. The gain from this so-called capture effect increases the capacity of resource-hungry LPWAN. Compared to a typical collision-free controlled-access scheme, our method outperforms by 10-35% from the perspective of the total count of the consumed time slots. Also, due to the power control mechanism in our method, the energy consumption reduced by 20-40%.

  • PDF

Corroded and loosened bolt detection of steel bolted joints based on improved you only look once network and line segment detector

  • Youhao Ni;Jianxiao Mao;Hao Wang;Yuguang Fu;Zhuo Xi
    • Smart Structures and Systems
    • /
    • v.32 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Steel bolted joint is an important part of steel structure, and its damage directly affects the bearing capacity and durability of steel structure. Currently, the existing research mainly focuses on the identification of corroded bolts and corroded bolts respectively, and there are few studies on multiple states. A detection framework of corroded and loosened bolts is proposed in this study, and the innovations can be summarized as follows: (i) Vision Transformer (ViT) is introduced to replace the third and fourth C3 module of you-only-look-once version 5s (YOLOv5s) algorithm, which increases the attention weights of feature channels and the feature extraction capability. (ii) Three states of the steel bolts are considered, including corroded bolt, bolt missing and clean bolt. (iii) Line segment detector (LSD) is introduced for bolt rotation angle calculation, which realizes bolt looseness detection. The improved YOLOv5s model was validated on the dataset, and the mean average precision (mAP) was increased from 0.902 to 0.952. In terms of a lab-scale joint, the performance of the LSD algorithm and the Hough transform was compared from different perspective angles. The error value of bolt loosening angle of the LSD algorithm is controlled within 1.09%, less than 8.91% of the Hough transform. Furthermore, the proposed framework was applied to fullscale joints of a steel bridge in China. Synthetic images of loosened bolts were successfully identified and the multiple states were well detected. Therefore, the proposed framework can be alternative of monitoring steel bolted joints for management department.

Development of Urban Flood Analysis Model Adopting the Unstructured Computational Grid (비정형격자기반 도시침수해석모형 개발)

  • Lee, Chang Hee;Han, Kun Yeun;Kim, Ji Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5B
    • /
    • pp.511-517
    • /
    • 2006
  • Flood damage is one of the most important and influential natural disaster which has an effect on human beings. Local concentrated heavy rainfall in urban area yields flood damage increase due to insufficient capacity of drainage system. When the excessive flood occurs in urban area, it yields huge property losses of public facilities involving roadway inundation to paralyze industrial and transportation system of the city. To prevent such flood damages in urban area, it is necessary to develop adequate inundation analysis model which can consider complicated geometry of urban area and artificial drainage system simultaneously. In this study, an urban flood analysis model adopting the unstructured computational grid was developed to simulate the urban flood characteristics such as inundation area, depth and integrated with subsurface drainage network systems. By the result, we can make use of these presented method to find a flood hazard area and to make a flodd evacuation map. The model can also establish flood-mitigation measures as a part of the decision support system for flood control authority.