• Title/Summary/Keyword: Available Network Traffic

Search Result 193, Processing Time 0.027 seconds

Initial Investigation on Consolidation with Adaptive Dynamic Threshold for ABR Multicast Connections in ATM Networks (비동기 전송모드 망의 점대다중점연결을 위한 적응동적임계치기반 병합알고리즘)

  • Shin, Soung-Wook;Cho, Kwang-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.11
    • /
    • pp.962-966
    • /
    • 2001
  • The major problem at a branch point for point-to-multipoint available bit rate(ABR) services in asynchronous transfer mode (ATM) networks is how to consolidate backward resource management(BRM) cells from each branch for a multicast connection. In this paper, we propose an efficient feedback consolidation algorithm based on an adaptive dynamic threshold(ADT) to eliminate the consolidation noise and the reduce the consolidation delay. The main idea of the ADT algorithm lies in that each branch point estimates the ABR traffic condition of the network through the virtual queue estimation and the transmission threshold of the queue level in branch points is adaptively controlled according to the estimation. Simulation results show that the proposed ADT algorithm can achieve a faster response in congestion status and a higher link utilization compared with the previous works.

  • PDF

Joint Load Balancing and Radio Resource Management in Cross Layer Architecture

  • Kim, Cheol-Seung;Ryu, Kyu-Tea
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.205-206
    • /
    • 2008
  • We propose load balancing algorithm based on cross layer designing for MIMO OFDM system. When there are many users using data service, base station(BS) should distribute traffic. Moreover, cross layer design gives benefit managing radio resource and network bandwidth management. Proposed cross layer load balancing technique manages both BS's bandwidth allocation and MS’s power control. One BS request bandwidth to other BSes and other BSes reduce each bandwidth. And BSes reduce power of sub carriers for reserving available bandwidth of backhaul. MSes that didn't get service can be served by obtaining bandwidth from other BSes. The simulation result shows more users can be served and cell throughput was increased

  • PDF

Design of Optimal Controller for the Congestion in ATM Networks (ATM망의 체증을 해결하기 위한 최적 제어기 설계)

  • Jung Woo-Chae;Kim Young-Joong;Lim Myo-Taeg
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.6
    • /
    • pp.359-365
    • /
    • 2005
  • This paper presents an reduced-order near-optimal controller for the congestion control of Available Bit Rate (ABR) service in Asynchronous Transfer Mode (ATM) networks. We introduce the model, of a class of ABR traffic, that can be controlled using a Explicit Rate feedback for congestion control in ATM networks. Since there are great computational complexities in the class of optimal control problem for the ABR model, the near-optimal controller via reduced-order technique is applied to this model. It is implemented by the help of weakly coupling and singular perturbation theory, and we use bilinear transformation because of its computational convenience. Since the bilinear transformation can convert discrete Riccati equation into continuous Riccati equation, the design problems of optimal congestion control can be reduced. Using weakly coupling and singular perturbation theory, the computation time of Riccati equations can be saved, moreover the real-time congestion control for ATM networks can be possible.

Predicting required licensed spectrum for the future considering big data growth

  • Shayea, Ibraheem;Rahman, Tharek Abd.;Azmi, Marwan Hadri;Han, Chua Tien;Arsad, Arsany
    • ETRI Journal
    • /
    • v.41 no.2
    • /
    • pp.224-234
    • /
    • 2019
  • This paper proposes a new spectrum forecasting (SF) model to estimate the spectrum demands for future mobile broadband (MBB) services. The model requires five main input metrics, that is, the current available spectrum, site number growth, mobile data traffic growth, average network utilization, and spectrum efficiency growth. Using the proposed SF model, the future MBB spectrum demand for Malaysia in 2020 is forecasted based on the input market data of four major mobile telecommunication operators represented by A-D, which account for approximately 95% of the local mobile market share. Statistical data to generate the five input metrics were obtained from prominent agencies, such as the Malaysian Communications and Multimedia Commission, OpenSignal, Analysys Mason, GSMA, and Huawei. Our forecasting results indicate that by 2020, Malaysia would require approximately 307 MHz of additional spectrum to fulfill the enormous increase in mobile broadband data demands.

Congestion Degree Based Available Bandwidth Estimation Method for Enhancement of UDT Fairness (UDT 플로우 간 공평성 향상을 위한 혼잡도 기반의 가용대역폭 추정 기법)

  • Park, Jongseon;Jang, Hyunhee;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.63-73
    • /
    • 2015
  • In the end to end data transfer protocols, it is very important to correctly estimate available bandwidth. In UDT (UDP based Data Transfer), receiver estimates the MTR (Maximum Transfer Rate) of the current link using pair packets transmitted periodically from sender and, then sender finally decides the MTR through EWMA (Exponential Weighted Moving Average) algorithm. Here, MTR has to be exactly estimated because available bandwidth is calculated with difference of MTR and current transfer rate. However, when network is congested due to traffic load and where competing flows are coexisted, it bring about a severe fairness problem. This paper proposes a congestion degree based MTR estimation algorithm. Here, the congestion degree stands a relative index for current congestion status on bottleneck link, which is calculated with arriving intervals of a pair packets. The algorithm try to more classify depending on the congestion degree to estimate more actual available bandwidth. With the network simulation results, our proposed method showed that the fairness problem among the competing flows is significantly resolved in comparison with that of UDT.

A Novel Scheme for Seamless Hand-off in WMNs

  • Vo, Hung Quoc;Kim, Dae-Sun;Hong, Choong-Seon;Lee, Sung-Won;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.399-422
    • /
    • 2009
  • Although current wireless mesh network (WMN) applications experience a perceptually uninterrupted hand-off, their throughput after the hand-off event may be significantly degraded due to the low available bandwidth of the mobile client's new master. In this paper, we propose a novel mobility management scheme for 802.11-based WMNs that enables both seamless hand-off for transparent communications, and bandwidth awareness for stable application performance after the hand-off process. To facilitate this, we (i) present a new buffer moment in support of the fast Layer-2 hand-off mechanism to cut the packet loss incurred in the hand-off process to zero and (ii) design a dynamic admission control to grant joining accepts to mesh clients. We evaluate the benefits and drawbacks of the proposal for both UDP and TCP traffic, as well as the fairness of the proposal. Our results show that the new scheme can not only minimize hand-off latency, but also maintain the current application rates of roaming users by choosing an appropriate new master for joining.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

The Implement of small inter-networking by using MPLS (MPLS 이용한 small inter-networking 구현)

  • 송창안;하윤식;김동현;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.145-148
    • /
    • 2003
  • MPLS is one of the most important technics for the growth of the next generation network. MPLS is a kind of third layers switching technics which is combined with second layers switching speed and third layers routing ability. And a simple label switching paradigm which uses short and fired lengths of lables is available in MPLS, too. Like this way, MPLS not only can keep its competitive price but also keep its merits such as second layers speed, third layers expansion, and compatibility with existing protocols. That means the traffic engineering, VPN, QoS ran be supported easily in MPLS. In this thesis, therefore, we will implement a small inter-networking based on MPLS and analyze its performance.

  • PDF

Performance Analysis of MAC Protocols for Ethernet PON (이더넷 PON을 위한 MAC 프로토콜 성능 분석)

  • 안계현;이봉주;한경은;강동국;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.457-465
    • /
    • 2003
  • In this paper, we analyze the performances of variable MAC (Medium Access Control) protocols and present an efficient MAC protocol for Ethernet PON (Passive Optical Network). We consider three MAC protocols: static TDMA, dynamic TDMA, and Interleaved polling. Static TDMA assigns an equal amount of bandwidth to all ONUs regardless of the request information but Dynamic TDMA dynamically allocates the bandwidth to each ONU considering its request. Interleaved Polling operates a cycle with variable time period and a polling method for informing a uplink transmission chance to each ONU. This paper theoretically analyzes the available bandwidth for each of three protocols. We also implement the simulation models for them by using OPNET and evaluates the performances under various bursty traffic environments. The results are compared and analyzed in terms of channel utilization and queueing delay.

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).