• Title/Summary/Keyword: service recovery performance

Search Result 123, Processing Time 0.021 seconds

Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment

  • Park, Chang Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1881-1900
    • /
    • 2014
  • Since 802.11 wireless LANs are so widely used, it has become common for numerous access points (APs) to overlap in a region, where most of those APs are managed individually without any coordinated control. This pattern of wireless LAN usage is called the private OBSS (Overlapping Basic Service Set) environment in this paper. Due to frame collisions across BSSs, each BSS in the private OBSS environment suffers severe performance degradation. This study approaches the problem from the perspective of congestion control rather than noise or collision resolution. The retry limit, one of the 802.11 attributes, could be used for traffic control in conjunction with TCP. Reducing the retry limit causes early discard of a frame, and it has a similar effect of random early drops at a router, well known in the research area of congestion control. It makes the shared link less crowded with frames, and then the benefit of fewer collisions surpasses the penalty of less strict error recovery. As a result, the network-wide performance improves and so does the performance of each BSS eventually. Reducing the retry limit also has positive effects of merging TCP ACKs and reducing HOL-like blocking time at the AP. Extensive experiments have validated the idea that in the OBSS environment, reducing the retry limit provides better performance, which is contrary to the common wisdom. Since our strategy is basically to sacrifice error recovery for congestion control, it could yield side-effects in an environment where the cost of error recovery is high. Therefore, to be useful in general network and traffic environments, adaptability is required. To prove the feasibility of the adaptive scheme, a simple method to dynamically adjust the value of the retry limit has been proposed. Experiments have shown that this approach could provide comparable performance in unfriendly environments.

Protection Scheme Guaranteeing the Recovery Time Defined in Service Level Agreement in WDM Mesh Networks (WDM Mesh 네트워크에서 SLA 복구시간을 만족시키는 보호기법)

  • Hong, Kiwon;Yim, Taihyong;Kyung, Yeonwoong;Park, Jinwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.41-43
    • /
    • 2014
  • In this paper, we proposed a new protection scheme of the WDM mesh networks that can utilize the network resources efficiently while satisfying with the recovery time defined in the SLA (service level agreement). The protection scheme and the backup path are selected based on the comparison of the expected protection time with the SLA recovery time. The superior performance of the proposed protection scheme was demonstrated by comparing with ones of the existing protection schemes.

Mobile Web Service Architecture Using Context-store

  • Oh, Sang-Yoon;Aktas, Mehmet;Fox, Geoffrey C.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.836-858
    • /
    • 2010
  • Web Services allow a user to integrate applications from different platforms and languages. Since mobile applications often run on heterogeneous platforms and conditions, Web Service becomes a popular solution for integrating with server applications. However, because of its verbosity, XML based SOAP messaging gives the possible overhead to the less powerful mobile devices. Based on the mobile client's behavior that it usually exchanges messages with Web Service continuously in a session, we design the Handheld Flexible Representation architecture. Our proposed architecture consists of three main components: optimizing message representation by using a data format language (Simple_DFDL), streaming communication channel to reduce latency and the Context-store to store context information of a session as well as redundant parts of the messages. In this paper, we focus on the Context-store and describe the architecture with the Context-store for improving the performance of mobile Web Service messaging. We verify our approach by conducting various evaluations and investigate the performance and scalability of the proposed architecture. The empirical results show that we save 40% of transit time between a client and a service by reducing the message size. In contrast to solutions for a single problem such as the compression or binarization, our architecture addresses the problem at a system level. Thus, by using the Context-store, we expect reliable recovery from the fault condition and enhancing interoperability as well as improving the messaging performance.

Adaptive Error Recovery in cdma2000 1xEV-DO Broadcast and Multicast Networks (cdma2000 1xEV-DO를 위한 모바일 브로드캐스트/멀티캐스트 네트워크에서의 능동적인 에러 교정 방법에 관한 연구)

  • Kang Kyungtae;Park Hosang;Cho Yongwoo;Shin Heonshik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.91-102
    • /
    • 2006
  • We analyze the performance of MAC-layer Reed-Solomon error recovery in the cdma2000 1xEV-DO Broadcast and Multicast Services (BCMCSs) environment, with respect to the size of the ECB (Error Control Block) and the air-channel condition, and establish the relationship between ECB size, error recovery capacity and service latency. From this we propose an adaptive error recovery scheme which adjusts the size of the ECB to reflect the environment of the mobile nodes so as to meet the required service quality (target bit error-rate), while reducing the latency of real-time applications. Extensive simulation results show the effectiveness of our approach compared to the current static scheme. Proposed adaptive schemes achieves near optimal solution with respect to service latency while satisfying the required service quality.

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

A Study on the Performance Improvement of TCP using ABR/UBR Services (ABR/UBR 서비스를 이용한 TCP 성능개선에 관한 연구)

  • 김명희;박봉주;박승섭
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.643-651
    • /
    • 2000
  • ATM network technology is generally used for the integration of multimedia services in high-speed Internet. ABR (Available Bit Rate) and UBR (Unspecified Bit Rate) service classes have been developed specifically to support data application. In this paper, through the result of simulation, we analyzed the effect of TCP data transmission performance by using FRR (Fast Retransmission and Recovery) and Nagle's Algorithm on the UBR service, and by adjusting EFCI switch parameter on the ABR service. As a result of our study, performance improvement of TCP over ATM network is observed by adjusting TCP parameters and setting of effective switch parameter.

  • PDF

Performance Improvement Methods of Multicast using FEC and Local Recovery based on Sever in Mobile Host (이동 호스트에서 FEC와 서버기반 지역복구를 이용한 멀티캐스트 성능 향상 방안)

  • Kim, Hoe-Ok;Yang, Hwan-Seok;Lee, Ung-Gi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.589-596
    • /
    • 2002
  • Tn the data transmission service of the mobile host, it is needed to reduce the bandwidth and to make a reliable error recovery. there are two appropriate methods in that. One is FEC which retransmits the parity of error recovery, in case of happening of the loss after forming the parity of error recovery by grouping original data. The other is local recovery based on server which can block the implosion of transmission. The use of FEC and local recovery based on server at the same time enables the reliable multicast. This paper suggests algorithm that recovers the loss by FEC and local recovery based on server through the solution of the problems about triangle routing, tunnel convergence by dividing mobile host into two parts-the sender and the receiver. This model about the loss of algorithm tested the efficiency of performance by the homogeneous independent loss, the heterogeneous independent loss, the shared source link loss model. The suggested algorithm confirms effectiveness in the environment where there are much data and many receivers in mobile host.

CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment

  • Hung, Pham Phuoc;Aazam, Mohammad;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1282-1301
    • /
    • 2015
  • Traditional infrastructure has been superseded by cloud computing, due to its cost-effective and ubiquitous computing model. Cloud computing not only brings multitude of opportunities, but it also bears some challenges. One of the key challenges it faces is recovery of computing nodes, when an Information Technology (IT) failure occurs. Since cloud computing mainly depends upon its nodes, physical servers, that makes it very crucial to recover a failed node in time and seamlessly, so that the customer gets an expected level of service. Work has already been done in this regard, but it has still proved to be trivial. In this study, we present a Cost-Time aware Genetic scheduling algorithm, referred to as CTaG, not only to globally optimize the performance of the cloud system, but also perform recovery of failed nodes efficiently. While modeling our work, we have particularly taken into account the factors of network bandwidth and customer's monetary cost. We have implemented our algorithm and justify it through extensive simulations and comparison with similar existing studies. The results show performance gain of our work over the others, in some particular scenarios.

Various Algorithms of Service Recovery in IP Network (IP 네트워크 상의 다양한 서비스 복구 알고리즘)

  • Han Jeong Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10B
    • /
    • pp.841-848
    • /
    • 2004
  • In case of failure in the IP network services should be provided via a backup path which fully meets QoS requirements. In this regard, we in this paper suggest simple-PFC(5-PFC) to restore single link failure, iterative-PFC(i-PFC) for multiple link failures, and fault_node Avoidance-PFC(a-PFC) for failures of nodes such as routers. Taking the minimum cost rerouting problem into account, we compare and analyze performance of those three mechanisms carrying out Direct_destination Rerouting(DR).

Graceful Degradation FEC Layer for Multimedia Broadcast/Multicast Service in LTE Mobile Systems

  • Won, Seok Ho
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1068-1074
    • /
    • 2013
  • This paper proposes an additional forward error correction (FEC) layer to compensate for the defectiveness inherent in the conventional FEC layer in the Long Term Evolution specifications. The proposed additional layer is called a graceful degradation (GD)-FEC layer and maintains desirable service quality even under burst data loss conditions of a few seconds. This paper also proposes a non-delayed decoding (NDD)-GD-FEC layer that is inherent in the decoding process. Computer simulations and device-based tests show a better loss recovery performance with a negligible increase in CPU utilization and occupied memory size.