• Title/Summary/Keyword: QoS(Quality of Service) Level

Search Result 173, Processing Time 0.023 seconds

Optimal Link Allocation and Revenue Maximization

  • Joutsensalo, Jyrki;Hamalainen, Timo
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.136-147
    • /
    • 2002
  • In this paper, the maximal capacity of the data network link has attempted to be exploited by using the dynamic allocation strategy. We propose a new methodology based on the economic models for competing traffic classes (classes of sessions) in packet networks. As the demand for network services accelerates, users' satisfaction to the service level might decrease due to the congestion at the network nodes. To prevent this, efficient allocation of a networks resources, such as available bandwidth and switch capacity, is needed. By using the so-called user profile as well as the utility (e.g., data rate) functions, it is possible to allocate data rates and other utilities using the arbitrary number of QoS classes, say $0.01,...,$10.

Improved SIR-based call admission control for DS-CDMA cellular system (DS-CDMA 셀룰라 시스템을 위한 SIR기반의 개선된 호 수락 제어)

  • 김호준;박병훈;이진호;황금찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.957-966
    • /
    • 1998
  • In this paper an imrpoved Signal-to-Interference ratio(SIR)-based call admission control(CAC) algorithm for DS-CDMA cellular system is proposed and its performance is analyzed. This algorithm uses Residual-Capacity defined asthe additional number of initial calls that a base station can accept such that system-wide outage probability will guaranteed to remain below a certain level. the residual capcity at each cell is calculated according to the reverse-link SIR measured not only at the home cell but also the adjacent cells. Then the adjacent cell interference-coupling coefficient .betha. is used. In this work we propose an improved algorithm that .betha. varies according to the traffic load of the home cell. The influence of traffic condition on system performance, namely blocking probability and outage probability, is then examined via simulation. The performance of the improved algorithm is evaluated both under homogeneous and hot spot traffic loads. The results show that the improved algorithm outperforms conventional algorithms under all load values. Under over-load situation, especially, the improved algorithm gives almost constant outage performance the QoS(quality of service) can be guranted.

  • PDF

An Optimal Power-Throughput Tradeoff Study for MIMO Fading Ad-Hoc Networks

  • Yousefi'zadeh, Homayoun;Jafarkhani, Hamid
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.334-345
    • /
    • 2010
  • In this paper, we study optimal tradeoffs of achievable throughput versus consumed power in wireless ad-hoc networks formed by a collection of multiple antenna nodes. Relying on adaptive modulation and/or dynamic channel coding rate allocation techniques for multiple antenna systems, we examine the maximization of throughput under power constraints as well as the minimization of transmission power under throughput constraints. In our examination, we also consider the impacts of enforcing quality of service requirements expressed in the form of channel coding block loss constraints. In order to properly model temporally correlated loss observed in fading wireless channels, we propose the use of finite-state Markov chains. Details of fading statistics of signal-to-interference-noise ratio, an important indicator of transmission quality, are presented. Further, we objectively inspect complexity versus accuracy tradeoff of solving our proposed optimization problems at a global as oppose to a local topology level. Our numerical simulations profile and compare the performance of a variety of scenarios for a number of sample network topologies.

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

  • Wang, Hong;Song, Rongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1424-1441
    • /
    • 2014
  • Two-tier femtocell networks, consisting of a conventional cellular network underlaid with femtocell hotspots, play an important role in the indoor coverage and capacity of cellular networks. However, the cross- and co-tier interference will cause an unacceptable quality of service (QoS) for users with universal frequency reuse. In this paper, we propose a novel downlink interference mitigation strategy for spectrum-shared two-tier femtocell networks. The proposed solution is composed of three parts. The first is femtocells clustering, which maximizes the distance between femtocells using the same slot resource to mitigate co-tier interference. The second is to assign macrocell users (MUEs) to clusters by max-min criterion, by which each MUE can avoid using the same resource as the nearest femtocell. The third is a novel adaptive power control scheme with femtocells downlink transmit power adjusted adaptively based on the signal to interference plus noise ratio (SINR) level of neighboring users. Simulation results show that the proposed scheme can effectively increase the successful transmission ratio and ergodic capacity of femtocells, while guaranteeing QoS of the macrocell.

Excess Bandwidth Hierarchical Fair Queueing Using Excess Bandwidth Consumer Queue (잉여 대역폭 소비 큐를 이용한 계층적 잉여 대역폭 페어 큐잉)

  • 김영한;추호철
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.1-8
    • /
    • 2003
  • Scheduling technology is one of the most important elements required to support the Quality of service (QoS) in the Internet and a lot of scheduling algorithms have been developed. However, most of these algorithms ire not flexible to distribute the excess bandwidth. In order to provide flexibility for distributing the excess bandwidth, we proposed excess bandwidth fair queueing (EBFQ) algorithm with relatively low complexity. In this paper, we propose the new extension to this EBFQ algorithm for the hierarchical fair queueing system. This extension can be naturally applied to the existing hierarchical algorithm and simultaneously provide the same level of fairness. Through the simulation and analysis, we verify it.

Providing Fairness in Diffserv Architecture using Buffer Management Method (차등서비스 구조에서 버퍼관리기법을 이용한 공평성 제공)

  • 김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.05a
    • /
    • pp.8-13
    • /
    • 2003
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements. The DiffServ architecture, proposed by the Internet Engineering Task Force(IETF), has become the most viable solution for provising QoS over IP networks. The DiffServ architecture does not specify any handling method between AF out-profile packets and BE packets. This paper propose a mechanism for supporting inter class fairness in the DiffServ architecture. Ⅰ proposed a modified Weighted Round Robin method to protect the BE traffic from AF out-profile packets in the core routers. The proposed technique is evaluated through simulation. Simulation results indicate that the proposed method provides better protection not only for BE packets from AF out-profile packets, but also for the AF in-profile packets in congested networks.

  • PDF

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

A Design and Implementation of IPv6 LAN (IPv6 프로토콜 LAN 설계 및 구축)

  • 김상범;김두석
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.481-484
    • /
    • 2000
  • In this paper, we describe the design and implementation of IPv6 LAN. The legacy protocol for Internet is IPv4(IP version 4). The ability of IPv4 is not enough for modern real time multimedia communication services. So IPv6(IP version 6) protocol was suggested to resolve the problems of IPv4. We implemented IPv6 LAN using sTLA(sub Top Level Aggregation identifier) address and KOREN(KOrea Research and Experimental Network). Our IPv6 LAN is connected with 6TAP(Chicago), WIDE(Tokyo), and SingAREN(Singapore). We used a dedicated router, Windows 2000 PC host FreeBSD PC host, Solaris 7 workstation and Solaris 8 workstation for IPv6 NDP(Neighbor Discovery Protocol) protocol test. To support all data services including voice and video, IP protocol should be enhanced because the characteristics of modern network services are requiring QoS(Quality of Service) functions, auto-configuration, security, mobility and so on. So a new IP protocol, IPv6, has been developing to meet the requirements. In this paper, we introduce the implementation method and configuration information of IPv6 LAN.

  • PDF

Spanning Tree Aggregation Using Attribute of Service Boundary Line (서비스경계라인 속성을 이용한 스패닝 트리 집단화)

  • Kwon, So-Ra;Jeon, Chang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.441-444
    • /
    • 2011
  • In this study, we present a method for efficiently aggregating network state information. It is especially useful for aggregating links that have both delay and bandwidth in an asymmetric network. Proposed method reduces the information distortion of logical link by integration process after similar measure and grouping of logical links in multi-level topology transformation to reduce the space complexity. It is applied to transform the full mesh topology whose Service Boundary Line (SBL) serves as its logical link into a spanning tree topology. Simulation results show that aggregated information accuracy and query response accuracy are higher than that of other known method.