• Title/Summary/Keyword: End-to-End Delay

Search Result 762, Processing Time 0.025 seconds

A Study on the 'Extended' DSM Programs in Korean LNG Market (산업용 천연가스 수요관리 프로그램 최적화를 위한 동태적 시뮬레이션에 관한 연구)

  • Chang, Han-Soo;Choi, Ki-Ryun
    • Environmental and Resource Economics Review
    • /
    • v.11 no.2
    • /
    • pp.211-231
    • /
    • 2002
  • This paper summarizes the results of a study that assess how a demand side management (DSM) system addresses key economic and environmental challenges facing in the Korean natural gas sector considering; ${\bullet}$ high discrepancies of seasonal consumption volume and of load factor in unmatured domestic LNG market, ${\bullet}$ unfavorable and volatile international LNG market, imposing with the contestable "take-or-pay" contract terms, ${\bullet}$ low profile of LNG and existence of market barriers against an optimal fuel mix status in the industrial energy sector. A particular focus of this study is to establish an 'extended' DSM system in the unmatured gas market, especially in industry sector, that could play a key role to assure an optimum fuel mix scheme. Under the concept of 'extended' DSM, a system dynamics modeling approach has been introduced to explore the option to maximize economic benefits in terms of the national energy system optimization, entailing different ways of commitments accounting for different DSM measures and time delay scenarios. The study concludes that policy options exist that can reduce inefficiencies in gas industry and end-use system at no net costs to national economy. The most scenarios find that, by the year 2015, it is possible to develop a substantial potential of increased industrial gas end-uses under more reliable and stable load patterns. Assessment of sensitivity analysis suggests that time delay factor, in formulating DSM scenarios, plays a key role to overcome various market barriers in domestic LNG market and provides a strong justification for the policy portfolios 'just in time' (time accurateness), which eventually contribute to establish an optimum fuel mix strategy. The study indicates also the needs of advanced studies based on SD approach to articulate uncertainty in unmatured energy market analysis, including gas.

  • PDF

Performance Analysis of Flow Control Method Using Virtual Switchs on ATM (ATM에서 가상 스위치를 이용한 흐름 제어 방식의 성능 분석)

  • 조미령;양성현;이상훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.85-94
    • /
    • 2002
  • EMRCA(Explicit Max_min Rate Control Algorithm) switch, which has been proposed in the ATM(Asychronous Transfer Mode) standard, controls the ABR(Available Bit Rate) service traffic in the ATM networks. The ABR service class of ATM networks uses a feedback control mechanism to adapt to varying link capacities. The VS/VD(Virtual Source/Virtual Destination) technique offers the possibility to segment the otherwise end-to-end ABR control loop into separate loops. The improved feedback delay and the control of ABR traffic inside closed segments provide a better performance and QoS(Quality of Service) for ABR connections with respect to throughput, delay, and jitter. This paper is study of an ABR VS/VD flow control method. Linear control theory offers the means to derive correct choices of parameters and to assess performance issues, like stability of the system, during the design phase. The performance goals are a high link utilization, fair bandwidth distribution and robust operation in various environments, which are verified by discrete event simulations. The major contribution of this work is the use of linear control theory to model and design an ABR flow control method tailored for the special layout of a VS/VD switch, the simulation shows that this techniques better than conventional method.

  • PDF

A Study on TRANSYT Model-embedded Parameters (TRANSYT 모델의 내재 모개변수에 관한 연구)

  • 도철웅
    • Journal of Korean Society of Transportation
    • /
    • v.6 no.1
    • /
    • pp.55-64
    • /
    • 1988
  • Prior to using any computer model, the program-embedded palameters showing significant differences from real world should be calibrated. This is especially true when the model is expected to be used fro various roadway and traffic condition. The calibration of TRANSYT model was conducted for the parameters of start-up delay, and lag, stop penalty(K), platoon dispersion factor, and saturation flow rate. The values of the parameters were obtained by theoretical methods from actual field measurements for discharging and arrival pattern. The sites elected for the study was an intersection of Dongil-Ro and Hwarang-Ro, and a 334 meter downstrean section from the intersection stop line on westbound Hwarang-Ro. The study results showed that the start-up delay was 2.6 sec, end lag was 1.0 sec, saturation flow rate was 2287 pcphgpl, platoon dispersion factor was 0.2-03, and stop penalty(K) was 32. However, since these parameters re apt to depend on traffic and roadway condition, it is doubtful whether the obtained values will be applicable to the area-wide situation other than this particular site.

  • PDF

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Multiple Sink Nodes to Improve Performance in WSN

  • Dick, Mugerwa;Alwabel, Mohammed;Kwon, Youngmi
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.676-683
    • /
    • 2019
  • Wireless Sensor Networks (WSNs) consist of multiple tiny and power constrained sensors which use radio frequencies to carry out sensing in a designated sensor area. To effectively design and implement reliable WSN, it is critical to consider models, protocols, and algorithms that can optimize energy consumption of all the sensor nodes with optimal amount of packet delivery. It has been observed that deploying a single sink node comes with numerous challenges especially in a situation with high node density and congestion. Sensor nodes close to a single sink node receive more transmission traffic load compared to other sensors, thus causing quick depletion of energy which finally leads to an energy hole and sink hole problems. In this paper, we proposed the use of multiple energy efficient sink nodes with brute force technique under optimized parameters to improve on the number of packets delivered within a given time. Simulation results not only depict that, deploying N sink nodes in a sensor area has a maximum limit to offer a justifiable improvement in terms of packet delivery ratio but also offers a reduction in End to End delay and reliability in case of failure of a single sink node, and an improvement in the network lifetime rather than deploying a single static sink node.

IRSML: An intelligent routing algorithm based on machine learning in software defined wireless networking

  • Duong, Thuy-Van T.;Binh, Le Huu
    • ETRI Journal
    • /
    • v.44 no.5
    • /
    • pp.733-745
    • /
    • 2022
  • In software-defined wireless networking (SDWN), the optimal routing technique is one of the effective solutions to improve its performance. This routing technique is done by many different methods, with the most common using integer linear programming problem (ILP), building optimal routing metrics. These methods often only focus on one routing objective, such as minimizing the packet blocking probability, minimizing end-to-end delay (EED), and maximizing network throughput. It is difficult to consider multiple objectives concurrently in a routing algorithm. In this paper, we investigate the application of machine learning to control routing in the SDWN. An intelligent routing algorithm is then proposed based on the machine learning to improve the network performance. The proposed algorithm can optimize multiple routing objectives. Our idea is to combine supervised learning (SL) and reinforcement learning (RL) methods to discover new routes. The SL is used to predict the performance metrics of the links, including EED quality of transmission (QoT), and packet blocking probability (PBP). The routing is done by the RL method. We use the Q-value in the fundamental equation of the RL to store the PBP, which is used for the aim of route selection. Concurrently, the learning rate coefficient is flexibly changed to determine the constraints of routing during learning. These constraints include QoT and EED. Our performance evaluations based on OMNeT++ have shown that the proposed algorithm has significantly improved the network performance in terms of the QoT, EED, packet delivery ratio, and network throughput compared with other well-known routing algorithms.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

EPOB Based Transcode Scheduling Method of a Multimedia Presentation for Mobile Terminals in a Mobile Internet (이동 단말기에서 멀티미디어 프리젠테이션을 재생하기 위한 EPOB 기반의 트랜스코드 스케줄링 기법)

  • 홍마리아;윤준성;임영환
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.496-504
    • /
    • 2004
  • This paper preposes a various policies and experiment results to select streams in a presentation to be transcoded for mobileterminals after distinguishing the characteristics of streams in the presentation. This applies to the presentation composed of various data streams on a PC server. The rationale of the research is that the stream selection polices for transcoding enhances the speed of presentation in mobile terminals considerably faster than in the case when every stream has to be transcoded. Thus, the thesis suggests a stream selection polices for transcoding based on EPOB (End Point of Over Bandwidth) and aims to lower the requiring bandwidth of the presentation to the network bandwidth as well as to minimize early delay time for the presentation to be played in mobile terminals.

  • PDF

Clustering-Based Mobile Gateway Management in Integrated CRAHN-Cloud Network

  • Hou, Ling;Wong, Angus K.Y.;Yeung, Alan K.H.;Choy, Steven S.O.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.2960-2976
    • /
    • 2018
  • The limited storage and computing capacity hinder the development of cognitive radio ad hoc networks (CRAHNs). To solve the problem, a new paradigm of cloud-based CRAHN has been proposed, in which a CRAHN will make use of the computation and storage resources of the cloud. This paper envisions an integrated CRAHN-cloud network architecture. In this architecture, some cognitive radio users (CUs) who satisfy the required metrics could perform as mobile gateway candidates to connect other ordinary CUs with the cloud. These mobile gateway candidates are dynamically clustered according to different related metrics. Cluster head and time-to-live value are determined in each cluster. In this paper, the gateway advertisement and discovery issues are first addressed to propose a hybrid gateway discovery mechanism. After that, a QoS-based gateway selection algorithm is proposed for each CU to select the optimal gateway. Simulations are carried out to evaluate the performance of the overall scheme, which incorporates the proposed clustering and gateway selection algorithms. The results show that the proposed scheme can achieve about 11% higher average throughput, 10% lower end-to-end delay, and 8% lower packet drop fractions compared with the existing scheme.