• Title/Summary/Keyword: traffic performance

Search Result 3,481, Processing Time 0.032 seconds

HSR Traffic Reduction Algorithms for Real-time Mission-critical Military Applications

  • Nguyen, Xuan Tien;Rhee, Jong Myung
    • Information and Communications Magazine
    • /
    • v.32 no.10
    • /
    • pp.31-40
    • /
    • 2015
  • This paper investigates several existing techniques to reduce high-availability seamless redundancy (HSR) traffic. HSR is a redundancy protocol for Ethernet networks that provides duplicated frames for separate physical paths with zero recovery time. This feature makes it very useful for real-time and mission-critical applications, such as military applications and substation automation systems. However, the major drawback of HSR is that it generates too much unnecessary redundant traffic in HSR networks. This drawback degrades network performance and may cause congestion and delay. Several HSR traffic reduction techniques have been proposed to reduce the redundant traffic in HSR networks, resulting in the improvement of network performance. In this paper, we provide an overview of these HSR traffic reduction techniques in the literature. The operational principles, advantages, and disadvantages of these techniques are investigated and summarized. We also provide a traffic performance comparison of these HSR traffic reduction techniques.

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC

  • Habiba, Ummy;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.119-131
    • /
    • 2014
  • In recent literature on traffic scheduling, the combination of the two-dimensional discrete-time Markov chain (DTMC) and the Markov modulated Poisson process (MMPP) is used to analyze the capacity of VoIP traffic in the cognitive radio system. The performance of the cognitive radio system solely depends on the accuracy of spectrum sensing techniques, the minimization of false alarms, and the scheduling of traffic channels. In this paper, we only emphasize the scheduling of traffic channels (i.e., traffic handling techniques for the primary user [PU] and the secondary user [SU]). We consider the following three different traffic models: the cross-layer analytical model, M/G/1(m) traffic, and the IEEE 802.16e/m scheduling approach to evaluate the performance of the VoIP services of the cognitive radio system from the context of blocking probability and throughput.

Transmission Performance of Video Traffic on Underwater MANET (수중 MANET에서 비디오 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.49-54
    • /
    • 2019
  • Since the underwater communication environment, which is used mainly in acoustic channel, is different from terestrial communication, it needs to analyze the appropriate transmission performance in underwater environment to implement the communication services. Appropriate traffic process method for a communication service is required through transmission performance of object traffic for the communication service. In this paper, transmission performance of video traffic on underwater MANET(Mobile Ad-hoc Network) is analyzed and video traffic configuration scheme on underwater MANET with results of performance analysis is suggested, This study is done with computer simulation based on NS(Network Simulator)-3. throughput, transmission delay, packet loss rate is used for transmission performance.

PERFORMANCE ANALYSIS OF AAL MULTIPLEXER WITH CBR TRAFFIC AND BURSTY TRAFFIC

  • Park, Chul-Geun;Han, Dong-Hwan
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.1
    • /
    • pp.81-95
    • /
    • 2001
  • This paper models and evaluates the AAL multiplexer to analyze AAL protocol in ATM networks. We consider an AAL multiplexer in which a single periodically determinsitic CBR traffic stream and several variable size bursty background traffic streams are multiplexed and one ATM cell stream goes out. We model the AAL multiplexer as a B/sup X/ + D/D/1/K queue and analyze this queueing system. We represent various performance measures such as loss probability and waiting time in the basis of cell and packet.

Dynamic response of railway vehicles under unsteady aerodynamic forces caused by local landforms

  • Chen, Zhengwei;Liu, Tanghong;Li, Ming;Yu, Miao;Lu, Zhaijun;Liu, Dongrun
    • Wind and Structures
    • /
    • v.29 no.3
    • /
    • pp.149-161
    • /
    • 2019
  • When a railway vehicle runs in crosswinds, the unsteady aerodynamic forces acting on the train induced by the vehicle speed, crosswind velocity and local landforms are a common problem. To investigate the dynamic performance of a railway vehicle due to the influence of unsteady aerodynamic forces caused by local landforms, a vehicle aerodynamic model and vehicle dynamic model were established. Then, a wind-loaded vehicle system model was presented and validated. Based on the wind-loaded vehicle system model, the dynamic response performance of the vehicle, including safety indexes and vibration characteristics, was examined in detail. Finally, the effects of the crosswind velocity and vehicle speed on the dynamic response performance of the vehicle system were analyzed and compared.

Flow based Sequential Grouping System for Malicious Traffic Detection

  • Park, Jee-Tae;Baek, Ui-Jun;Lee, Min-Seong;Goo, Young-Hoon;Lee, Sung-Ho;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3771-3792
    • /
    • 2021
  • With the rapid development of science and technology, several high-performance networks have emerged with various new applications. Consequently, financially or socially motivated attacks on specific networks have also steadily become more complicated and sophisticated. To reduce the damage caused by such attacks, administration of network traffic flow in real-time and precise analysis of past attack traffic have become imperative. Although various traffic analysis methods have been studied recently, they continue to suffer from performance limitations and are generally too complicated to apply in existing systems. To address this problem, we propose a method to calculate the correlation between the malicious and normal flows and classify attack traffics based on the corresponding correlation values. In order to evaluate the performance of the proposed method, we conducted several experiments using examples of real malicious traffic and normal traffic. The evaluation was performed with respect to three metrics: recall, precision, and f-measure. The experimental results verified high performance of the proposed method with respect to first two metrics.

Performance Analysis of Multi-Media Traffic in Nonhirerachical Structures (비계층적 구조를 갖는 종합정보 통신망에서 다원트래픽 성능분석)

  • 김제숭
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.103-112
    • /
    • 1997
  • In this paper, a nonhierarchial integrated information network with circuit switched and packet switched traffic is considered. It is assumed that circuit switched traffic is allowed to attempt an alternate path if the direct path is blocked, whereas packet switched traffic is not. The network uses a movable boundary scheme to allocate bandwidth dynamically. To analyze the performance of this type of network, EEBP(End to End Blocking Probability) is selected as a measure for circuit switched traffic and average time delay for packet switched traffic, respectively. EEBP and average time delay are derived analytically. Using the two proposed measure, the performance of the network under various bandwidth allocations and arrival patterns are observed. Moreover, the arrival rate of one link for circuit switched traffic is obtained from an approximation formula. Simulation results reveal the validity of the proposed approximation method.

  • PDF

Link Quality Estimation in Static Wireless Networks with High Traffic Load

  • Tran, Anh Tai;Mai, Dinh Duong;Kim, Myung Kyun
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.370-383
    • /
    • 2015
  • Effective link quality estimation is a vital issue for reliable routing in wireless networks. This paper studies the performance of expected transmission count (ETX) under different traffic loads. Although ETX shows good performance under light load, its performance gets significantly worse when the traffic load is high. A broadcast packet storm due to new route discoveries severely affects the link ETX values under high traffic load, which makes it difficult to find a good path. This paper presents the design and implementation of a variation of ETX called high load - ETX (HETX), which reduces the impact of route request broadcast packets to link metric values under high load. We also propose a reliable routing protocol using link quality metrics, which is called link quality distance vector (LQDV). We conducted the evaluation of the performance of three metrics - HETX, ETX and minimum hop-count. The simulation results show that HETX improves the average route throughput by up to 25% over ETX under high traffic load. Minimum hop-count has poor performance compared with both HETX and ETX at all of the different traffic loads. Under light load, HETX and ETX show the same performance.

A Study on the Performance Analysis of Broadband ISDN Traffic (광대역 ISDN의 트래픽 성능분석에 관한 연구)

  • 구창회;박광채;이재호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.7
    • /
    • pp.980-988
    • /
    • 1993
  • In this paper, performance of 8-ISDN traffic for the buffer size which is requested of important parameters in switch/multiplexer of B-ISDN with multimedia traffic is analyzed. Multimedia traffic is modeled as a traffic, which is composed of poisson distribution traffic and burst traffic with exponential/geometric ON time duration(Burst duration) Performance of traffic which is modeled as a multimedia traffic is analysed and buffer size, can provide the high quality service, is presented for the cell loss probability. It is simulated using event scheduling approach method which is provided by simulation package, PC SIMSCRIPT II.5. Simulation program is composed of PREAMBLE, MAIN, INITIAL, ARRIVAL, DEPARTURE and STOP·SIM modules. Specially, in case of mixed traffic simulation, ARRIVAL module is composed of ARRIVAL I and ARRIVAL II, and cells are generated independently by each module.

  • PDF

Efficient Abnormal Traffic Detection Software Architecture for a Seamless Network

  • Lee, Dong-Cheul;Rhee, Byung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.313-329
    • /
    • 2011
  • To provide a seamless network to customers, Internet service providers must promptly detect and control abnormal traffic. One approach is to shorten the traffic information measurement cycle. However, performance degradation is inevitable if traffic measurement servers merely shorten the cycle and measure all traffic. This paper presents a software architecture that can measure traffic more frequently without degrading performance by estimating the level of abnormal traffic. The algorithm in the architecture estimates the values of the interface group objects in MIB by using the IP group objects thereby reducing the number of measurements and the size of measured data. We evaluated this architecture on part of Internet service provider's IP network. When the traffic was measured 5 times more than before, the CPU usage and TPS of the proposed scheme was 7% and 41% less than that of the original scheme while the false positive rate and false negative rate were 3.2% and 2.7% respectively.