• Title/Summary/Keyword: traffic generation

Search Result 582, Processing Time 0.03 seconds

Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON (상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법)

  • Seo, Chang-Jin;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.265-270
    • /
    • 2012
  • The subscriber access network is cause of the bottleneck phenomenon because equipment and infrastructure were not originally designed for busty high-bandwidth traffic between MAN(Metro Area Network) and LAN(Local Area Network). Whether riding on shorter copper drops or optical fiber, Ethernet is emerging as the future broadband protocol of choice, offering plug and play simplicity, and low cost. EPON(Ethernet Passive Optical Network) combines point-to-multipoint optical infrastructure with low-cost high-bandwidth Ethernet. The future broadband access network will be a combination of point-to-point and point-to-multipoint Ethernet, optimized for transporting IP data, as well as time critical voice and video. EPON is being considered as a novel communications infrastructure for next-generation broadband access network for the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. But, EPON has a problem with duplex multimedia services. It is the insufficiency of bandwidth for upstream. Because all ONUs use a shared transmission media for upstream. In this paper, we addressed the problem of upstream bandwidth in EPONs. We presented a wavelength division EPON supporting QoS in the differentiated services framework.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Active ITS Infrastructure Management Strategy for Enhanced ITS Service (기존 ITS 서비스의 성능 강화를 위한 능동형 ITS 인프라 관리 전략)

  • Choi, Dongwon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.45-53
    • /
    • 2014
  • In this study, we analyzed the next generation ITS (C-ITS) technology trends, focusing on the national and international C-ITS projects. Based on the promotion practices of developed countries, we pointed out the lack of linkages with the existing ITS infrastructure. As a way to overcome this problem, we proposed the three-direction to enable the existing ITS infrastructure corresponding to the C-ITS. First one is developing a technique to improve the performance of the existing ITS infrastructure and automate the performance management (Performance-enhanced ITS). Second, developing active sensors or fusion sensor which along with V2X communication technology implement of an active safety driving support system (Safety-enhanced ITS). Third, we need to develop a technology that generate the new advanced traffic data by integrating the collected data from existing ITS infrastructure and nomadic device (Cloud-ITS). By improving the function of the existing ITS infrastructure for adaptation to the new V2X communication environment, we enhanced the efficiency of maintenance performance and would maximize the benefit of the introduction of C-ITS.

Development of Femtocell Simulator Based on LTE Systems for Interference and Performance Evaluation (간섭 및 성능 분석을 위한 LTE 시스템 기반 펨토셀 시뮬레이터 개발)

  • Kim, Chang-Seup;Choi, Bum-Gon;Koo, Bon-Tae;Lee, Mi-Young;Chung, Min-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.107-116
    • /
    • 2011
  • Recently, femtocell has been concerned as one of effective solutions to relieve shadow region and provide high quality services to users in indoor environments. Even though femtocell offers various benefits to cellular operators and users, many technical issues, such as interference coordination, network synchronization, self-configuration, self-optimization, and so on, should be solved to deploy the femtocell in current network. In this paper, we develop a simulator for evaluating performance of long term evolution (LTE) femtocell systems under various interference scenarios. The simulator consists of a main-module and five sub-modules. The main-module connects and manages five sub-modules which have the functionality managing user mobility, packet scheduling, call admission control, traffic generation, and modulation and coding scheme (MCS). To provide user convenience, the simulator adopts graphical user interface (GUI) which can observes simulation results in real time. We expect that this simulator can contribute to developing effective femtocell systems by supporting a tool for analyzing the effect of interference between macrocell and femtocell.

Structure Analysis of Optical Internet Network and Optical Transmission Experiments Using UNI Signaling Protocol (광인터넷망 구조 분석과 UNI 시그널링 프로토콜을 이용한 광전송 실험)

  • Lee, Sang-Wha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.47-54
    • /
    • 2013
  • In this paper, the structural design of optical Internet is analyzed and by using UNI (User Network Interface) signaling protocol an optical transmission experiment was performed. The hierarchical structure of the basic optical Internet consists of the backbone network, the service network and the access network. The necessary functions for each layer were described as follows: Control structure of the optical transport layer, network operation and management structure, internetworking technology of sub networks, routing and signaling technology. By using UNI signaling protocol from OIF (Optical Internetworking Forum), the optical transmission in the proposed structure of the optical Internet network was experimented. By the traffic generation of LSP (Label Switched Path) data packets along the route-configuration was delivered to UNI. Finally, by showing the value of TCP (Transmission Control Protocol) packets the optical transmission was completely and successfully demonstrated.

Fast Distributed Network File System using State Transition Model in the Media Streaming System (미디어 스트리밍 시스템에서의 상태 천이 모델을 활용한 고속 분산 네트워크 파일 시스템)

  • Woo, Soon;Lee, Jun-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.145-152
    • /
    • 2012
  • Due to the large sizes of streaming media, previous delivery techniques are not providing optimal performance. For this purpose, video proxy server is employed for reducing the bandwidth consumption, network congestion, and network traffic. This paper proposes a fast distributed network file system using state transition model in the media streaming system for efficient utilization of video proxy server. The proposed method is composed of three steps: step 1. Training process using state transition model, step 2. base and decision probability generation, and step 3. storing and deletion based on probability. In addition, storage space of video proxy server is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, the proposed method provides the lowest user start-up latency and the highest bandwidth saving significantly.

Congestion Control for Burst Loss Reduction in Labeled OBS Network (Labeled OBS 망에서의 버스트 손실 감소를 위한 혼잡 제어)

  • Park Jonghun;Yoo Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.331-337
    • /
    • 2005
  • The optical Internet is considered as a feasible solution for transporting huge amount of traffic volume in the future Internet. Among optical switching technology for the optical Internet, OBS becomes one of the most promoting solution. Recently, a lebeled OBS(LOBS) architecture is considered for an efficient control on OBS network. Given that a data burst may contain few thousands of IP packets, a single loss of data burst results in a serious throughput degradation in LOBS network. In this paper, we improve the performance of LOBS network by introducing the burst congestion control mechanism. More specifically, the OBS router at the network core detects the network congestion by measuring the loss probability of burst control packet. The OBS router at the network edge reduces the burst generation according to the network condition repored by the OBS router at the network core. Through the simulations, it is shown that the proposed congestion control mechanism can reduce the burst loss probability and improve the LOBS network throughput.

Hierarchical Power Management Architecture and Optimal Local Control Policy for Energy Efficient Networks

  • Wei, Yifei;Wang, Xiaojun;Fialho, Leonardo;Bruschi, Roberto;Ormond, Olga;Collier, Martin
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.540-550
    • /
    • 2016
  • Since energy efficiency has become a significant concern for network infrastructure, next-generation network devices are expected to have embedded advanced power management capabilities. However, how to effectively exploit the green capabilities is still a big challenge, especially given the high heterogeneity of devices and their internal architectures. In this paper, we introduce a hierarchical power management architecture (HPMA) which represents physical components whose power can be monitored and controlled at various levels of a device as entities. We use energy aware state (EAS) as the power management setting mode of each device entity. The power policy controller is capable of getting information on how many EASes of the entity are manageable inside a device, and setting a certain EAS configuration for the entity. We propose the optimal local control policy which aims to minimize the router power consumption while meeting the performance constraints. A first-order Markov chain is used to model the statistical features of the network traffic load. The dynamic EAS configuration problem is formulated as a Markov decision process and solved using a dynamic programming algorithm. In addition, we demonstrate a reference implementation of the HPMA and EAS concept in a NetFPGA frequency scaled router which has the ability of toggling among five operating frequency options and/or turning off unused Ethernet ports.

A Connection Management Protocol for Stateful Inspection Firewalls in Multi-Homed Networks

  • Kim, Jin-Ho;Lee, Hee-Jo;Bahk, Sae-Woong
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.455-464
    • /
    • 2008
  • To provide network services consistently under various network failures, enterprise networks increasingly utilize path diversity through multi-homing. As a result, multi-homed non-transit autonomous systems become to surpass single-homed networks in number. In this paper, we address an inevitable problem that occurs when networks with multiple entry points deploy firewalls in their borders. The majority of today's firewalls use stateful inspection that exploits connection state for fine-grained control. However, stateful inspection has a topological restriction such that outgoing and incoming traffic of a connection should pass through a single firewall to execute desired packet filtering operation. Multi-homed networking environments suffer from this restriction and BGP policies provide only coarse control over communication paths. Due to these features and the characteristics of datagram routing, there exists a real possibility of asymmetric routing. This mismatch between the exit and entry firewalls for a connection causes connection establishment failures. In this paper, we formulate this phenomenon into a state-sharing problem among multiple fire walls under asymmetric routing condition. To solve this problem, we propose a stateful inspection protocol that requires very low processing and messaging overhead. Our protocol consists of the following two phases: 1) Generation of a TCP SYN cookie marked with the firewall identification number upon a SYN packet arrival, and 2) state sharing triggered by a SYN/ACK packet arrival in the absence of the trail of its initial SYN packet. We demonstrate that our protocol is scalable, robust, and simple enough to be deployed for high speed networks. It also transparently works under any client-server configurations. Last but not least, we present experimental results through a prototype implementation.

Analytical Approach of Global Mobility Support Schemes in IP-based Heterogeneous Mobile Networks (IP기반 이종 모바일 네트워크에서 글로벌 이동성 지원기법의 분석적 접근법)

  • Won, Younghoon;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.205-218
    • /
    • 2012
  • Mobility management of the mobile nodes and provision of seamless handover is crucial to an efficient support for the global roaming of the mobile nodes in next-generation wireless networks. Mobile IPv6 and mobility management in extended IP layer, which highly depend on traffic characteristics and user mobility models, were proposed by the IETF. Therefore, to evaluate the in-depth performance about these factors is important. Generally, the performance of IPv6-based mobility management protocol is evaluated through simulation. This paper shows the correlation between network parameters and performance metrics through numerical results, which is investigated how influence handoff latency and packet loss. And this paper uses mathematical analysis of the system parameters, such as the subnet residence time, the packet arrival rate and delay in wireless connection through the analytical framework which evaluate the performance of IPv6-based mobility management protocol.