• Title/Summary/Keyword: 트래픽제어

Search Result 1,089, Processing Time 0.026 seconds

A Rule for Reducing Error Remains in Multicopy Transmission ARQ

  • Shin, Woo-Cheol;Park, Jin-Kyung;Ha, Jun;Choi, Cheon-Won
    • Journal of IKEEE
    • /
    • v.7 no.1 s.12
    • /
    • pp.97-106
    • /
    • 2003
  • In ARQ based error control, imperfect error detection leaves error remains on a packet. Aiming for a reduction of error remains in multicopy transmission ARQ system, we propose a rule of requesting a retransmission and deciding a correct copy, (identified as $(m, \;{\sigma})$rule). While the probability of error remains is reduced by the employment of the $(m, \;{\sigma})$ rule at multicopy transmission ARQ, delay and throughput performance may be degraded in comparison with those of conventional single copy transmission ARQ. Thus, we develop an analytical method to evaluate the performance trade-off in multicopy transmission ARQ following the $(m, \;{\sigma})$ rule. From the numerical results obtained by the analytical method, we investigate the effect of channel characteristics on the performance of error remains, packet loss, throughput, and packet delay, and confirm that the adaptability of the $(m, \;{\sigma})$ rule to conform to various QoS requirements with ease.

  • PDF

A Routing Protocol with Fast-Recovery of Failures Using Backup Paths on MANETs (MANET에서 백업경로를 이용한 빠른 경로복구 능력을 가진 라우팅 프로토콜)

  • Thai, Ahn Tran;Kim, Myung-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1541-1548
    • /
    • 2012
  • This paper proposes a new multipath-based routing protocol on MANETs with Fast-Recovery of failures. The proposed protocol establishes the primary and secondary paths between a source and a destination considering the end-to-end packet reception reliability of routes. The primary path is used to transmit messages, and the secondary path is used to recover the path when detecting failures on the primary path. If a node detects a link failure during message transmission, it can recover the path locally by switching from the primary to the secondary path. By allowing the intermediate nodes to recover locally the route failure, the proposed protocol can reduce the number of packet loss and the amount of control packets for setting up new paths. The simulation result using QualNet simulator shows that the proposed protocol was about 10-20% higher than other protocols in terms of end-to-end message delivery ratio and the fault recovery time in case of link fault was about 3 times faster than the other protocols.

Packet Lossless Fast Rerouting Scheme without Buffer Delay Problem in MPLS Networks (MPLS망에서 버퍼지연 문제가 발생하지 않는 무손실 Fast Rerouting 기법)

  • 신상헌;신해준;김영탁
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.233-241
    • /
    • 2004
  • In this paper, we propose a packet-lossless fast rerouting scheme at a link/node fault in MPLS (Multiprotocol Label Switching) network with minimized accumulated buffer delay problem at ingress node. The proposed scheme uses a predefined, alternative LSP (Label Switched Path) In order to restore user traffic. We propose two restoration approaches. In the first approach, an alternative LSP is initially allocated with more bandwidth than the protected working LSP during the failure recovery phase. After the failure recovery, the excessively allocated bandwidth of the alternative LSP is readjusted to the bandwidth of the working LSP. In the second approach, we reduce the length of protected working LSP by using segment-based restoration. The proposed approaches have merits of (ⅰ) no buffer delay problem after failure recovery at ingress node, and (ⅱ) the smaller required buffer size at the ingress node than the previous approach.

Analysis of Cell Stream Scheme and Service Transmission using Time-Stamp Method in the Wireless ATM (무선 ATM에서 타임스탬프 방식을 이용한 셀 스트림 구조와 서비스전송 해석)

  • Kim, Jeong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2179-2187
    • /
    • 1999
  • To privide multimedia mobile communication services for the users in scattered locations, the application ATM cells efficiently in wireless communications, it is effective to the use TDMA method. However, it is necessary to have methods to compensate the CDV(cell delay variation) caused by the difference between TDMA-ATM and cell stream multiplexing of the users. This paper optimizes the cell control time(Tc) when VBR traffic inputs have MMPP by applying CDV characteristics of time stamp method, which has the most advantages among compensation methods of CDV. This paper suggests a cell stream multiplex method employing time stamp techniques to reduce CDV for wireless suggest method shows that CDV distribution and cell stream multiples rangd can be controlled to 1.2${\times}$Tc which reduced over the VBR service in the TDMA-WATM transmission. This paper also presents evaluation of the suggested architecture obtained simulation.

  • PDF

Maximum Delay-Aware Admission Control for Machine-to-Machine Communications in LTE-Advanced Systems (LTE-Advanced 시스템에서 M2M 통신의 최대 지연시간을 고려한 호 수락 방법)

  • Jun, Kyungkoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1113-1118
    • /
    • 2012
  • Smart grid and intelligent transportation system draw significant interest since they are considered as one of the green technologies. These systems require a large number of sensors, actuators, and controllers. Also, machine-to-machine (M2M) communications is important because of the automatic control. The LTE-Advanced networks is preparing a set of functions that facilitate the M2M communications, and particularly the development of an efficient call admission control mechanism is critical. A method that groups MTC devices according to QoS constraints and determines the admission depending on the QoS satisfaction is limitedly applied only if the data transmission period and the maximum delay are identical. This paper proposed a call admission control that is free from such limitation and also optimizes the admission process under the certain condition of the transmission period and maximum delay. The theorems regarding the proposed method are presented with the proofs. The simulations confirms its validity and shows it is better in call admission probability than existing works.

An Architecture of ISP-based P2P IPTV Services and Its Characteristics (계층 구조형 ISP 기반 P2P IPTV 서비스 구조 및 특성)

  • Sung, Moo-Kyung;Han, Chi-Moon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.659-669
    • /
    • 2010
  • The P2P IPTV will create a new paradigm for the Internet services. However, it cannot guarantee the reliability of their server and QoS because of using common Internet users(peers) for SIP server or relay server, though the infrastructural cost is low. This paper proposes the ISP-based P2P IPTV architecture which can solute the limitations of conventional P2P-based IPTV. In this model, ISP can build P2P overlay network with ISP servers and directly manage each server needed for session connection. So, the servers have higher performance and better reliability than previous one. Besides, robustness is improved because each sever is set by P2P overlay network. To evaluate the characteristics of the ISP-based P2P IPTV architecture, we simulate it for some parameters which are end-to-end streaming delay time, connection delay time and traffic amount. We compared the proposed architecture with the conventional P2P architecture about video service and confirmed that the performance of ISP-based P2P IPTV is better than conventional P2P based IPTV.

An Adaptive Resource Allocation Scheme based on Renegotiation for QoS Provisioning in Wireless Mobile Netwerks (무선 이동 통신망에서 QoS 제공을 위한 재할당 기반의 적응적인 자원 할당 기법)

  • Hong, Jung-Pyo;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9A
    • /
    • pp.1067-1074
    • /
    • 2004
  • In the wireless mobile networks, it IS important to provide the quality-of-service (QoS) guarantees as they are increasingly expected to support the multimedia applications Although the QoS provisioning problem arises in the wire-line networks as well, the mobility of hosts and the scarcity of bandwidth make QoS provisioning a challenging task in wireless mobile networks. The resource allocation to multimedia applications of varying QoS reqUlrement 15 a complex issue. In this paper, we propose a new adaptive resource allocation scheme based on the concept of the resource reservation and the renegotiation in order to guarantee the QoS of the real-tune traffic. The proposed scheme is aimed at improving the perfonnance in terms of the new call blocking rate, the bandoff dropping rate, and the bandwIdth utilization.

TCP CAE : Improving Wireless TCP under Reverse Background Congestion through Comparative ACK-based Estimator (TCP CAE: ACK기반 역방향 네트워크의 혼잡 감지기법)

  • Kim, Jae-Hyun;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2008
  • TCP receivers deliver ACK packets to senders for reliable end-to-end transfer. When ACK packets are not transferred properly because of network congestion, the performance of TCP degrades. This paper proposes a reverse congestion warning mechanism and a congestion handling mechanism in heterogeneous networks with heavy background traffic in the backward direction. Help from TCP receivers or hardware such as routers and gateways other than the ACK packets themselves is not necessary. TCP senders compare the arrival intervals of ACK data passed from receivers and the difference in t imestamp values echoed by receivers. According to the simulation results using the NS-2 network simulator, the proposed scheme shows a performance elevation of 20% greater than Reno, 150% greater than New Reno, and 450% greater than Westwood, respectively, under heterogeneous networks and that the error rate of the radio link is 1% when the backward network is congested.

  • PDF

An asymmetric WDM-EPON structure for the convergence of broadcast and communication (방송통신 통합을 위한 비대칭 WDM-EPON 구조에 관한 연구)

  • Hur Jung;Koo Bon-Jeong;Park Youngil
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.182-189
    • /
    • 2005
  • In this paper, an asymmetric WDM-EPON transmission scheme is proposed to be used in a high speed access network system, which is required to implement the convergence of broadcast and communication. WDM is used for downstream transmission from OLT to access nodes, satisfying wide bandwidth requirement for broadcasting and various multimedia services. And an EPON scheme, which is cheaper than WDM, is applied to upstream transmission where less bandwidth is required. A transmission test in physical layer was performed successfully and the results are provided. If ONUs are to be used in a home gateway, its protocol should be appropriate to its traffic pattern. Voice is sensitive to a time delay while data is not. A new dynamic bandwidth assignment protocol for PON system, which can cope with various types of data in access network is proposed and its performance is analysed. A maximum cycle time is specified to achieve the QoS of signals sensitive to time delay. And a minimum window is specified to prevent the downstream control signals from uprising. It is shown by simulation that the proposed EPON protocol can provide a better performance than previous ones.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF