• Title/Summary/Keyword: traffic scenarios

Search Result 312, Processing Time 0.038 seconds

A Case Study of the Implementation and Verification of VLAN-applied Network Based on a Five-step Scenario (5단계 시나리오에 기반한 VLAN이 적용된 네트워크 구현 및 검증 사례연구)

  • Kim, No-Whan;Park, Jin-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.25-36
    • /
    • 2021
  • This paper presents a topology based on packet tracer and a five-step scenario model to make it easier for students to understand the network on which VLANs are applied. Virtual LAN (VLAN), developed as an alternative solution to the Routers that distribute broadcast traffic, is a virtual local area network that logically configured regardless of the physical network. The VLAN prevents the network performance degradation resulting from the broadcast traffic by dividing the broadcast domain so that the bandwidth can be used more efficiently. In addition, it enhances the security because on communication between the devices belonging to different VLANs is impossible. The five-step scenarios in this paper presented an efficient implementation case for students to understand and validate the various functions of VLANs through ping/telnet/tracert test and simulation, after setting up each step of programming switches and routers in the virtual network.

Analysis of time-series user request pattern dataset for MEC-based video caching scenario (MEC 기반 비디오 캐시 시나리오를 위한 시계열 사용자 요청 패턴 데이터 세트 분석)

  • Akbar, Waleed;Muhammad, Afaq;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.20-28
    • /
    • 2021
  • Extensive use of social media applications and mobile devices continues to increase data traffic. Social media applications generate an endless and massive amount of multimedia traffic, specifically video traffic. Many social media platforms such as YouTube, Daily Motion, and Netflix generate endless video traffic. On these platforms, only a few popular videos are requested many times as compared to other videos. These popular videos should be cached in the user vicinity to meet continuous user demands. MEC has emerged as an essential paradigm for handling consistent user demand and caching videos in user proximity. The problem is to understand how user demand pattern varies with time. This paper analyzes three publicly available datasets, MovieLens 20M, MovieLens 100K, and The Movies Dataset, to find the user request pattern over time. We find hourly, daily, monthly, and yearly trends of all the datasets. Our resulted pattern could be used in other research while generating and analyzing the user request pattern in MEC-based video caching scenarios.

Development of Safety Evaluation Scenario for Autonomous Vehicle Take-over at Expressways (고속도로 자율주행자동차 제어권 전환 안전성 평가를 위한 시나리오 개발)

  • Park, Sungho;Jeong, Harim;Kim, Kyung Hyun;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.142-151
    • /
    • 2018
  • In the era of the 4th Industrial Revolution, research and development on autonomous vehicles have been actively conducted all over the world. Under these international trends, the Ministry of Land, Infrastructure and Transport is actively promoting the development of autonomous vehicles aiming at commercialization of autonomous vehicles at level 3 or higher by 2020. In the level 3 autonomous vehicle, it is essential to transfer control between the driver and the vehicle according to driving situations. Prior to the full-fledged autonomous vehicle age, this study developed a representative scenario for the safety evaluation on take-over on expressways. To accomplish this, we developed a highway driving scenario first, and then developed six control transition scenarios based on 2014 highway traffic accident data and take-over data. The variables to be considered in the developed scenarios are divided into drivers, vehicles, and environmental factors. A total of 36 variables are selected.

A Study on the Safety Improvement of Vessel Traffic in the Busan New Port Entrance (부산신항 진출입 항로 내 선박 통항 안전성 향상에 관한 연구)

  • Choi, Bong-kwon;Park, Young-soo;Kim, Nieun;Kim, Sora;Park, Hyungoo;Shin, Dongsu
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.321-330
    • /
    • 2022
  • Busan New Port manages the largest volume of traffic among Korean ports, and accounts for 68.5% of the total volume of the Busan port. Due to this increase in volume, ultra large container ships call at Busan New Port. When the additional south container terminal as well as ongoing construction project of the west container terminal are completed, various encounters may occur at the Busan New Port entrance, which may cause collision risk.s Thus, the purpose of this study was to provide a plan to improve the safety of vessel traffic, in the in/out bound fairway of Busan New Port. For this purpose, the status of arrivals and departures of vessels in Busan New Port, was examined through maritime traffic flow analysis. Additionally, risk factors and safety measures were identified, by AHP analysis with ship operators of the study area. Also, based on the derived safety measures, scenarios were set using the Environmental Stress model (ES model), and the traffic risk level of each safety measure was identified through simulation. As a result, it is expected that setting the no entry area for one-way traffic would have a significant effect on mitigating risks at the Busan New Port entrance. This study can serve as a basis for preparing safety measures, to improve the navigation of vessels using Busan New Port. If safety measures are prepared in the future, it is necessary to verify the safety by using the traffic volume and flow changes according to the newly-opened berths.

Analysis of Autonomous Vehicles Risk Cases for Developing Level 4+ Autonomous Driving Test Scenarios: Focusing on Perceptual Blind (Lv 4+ 자율주행 테스트 시나리오 개발을 위한 자율주행차량 위험 사례 분석: 인지 음영을 중심으로)

  • Seung min Oh;Jae hee Choi;Ki tae Jang;Jin won Yoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.173-188
    • /
    • 2024
  • With the advancement of autonomous vehicle (AV) technology, autonomous driving on real roads has become feasible. However, there are challenges in achieving complete autonomy due to perceptual blind areas, which occur when the AV's sensory range or capabilities are limited or impaired by surrounding objects or environmental factors. This study aims to analyze AV accident patterns and safety issues of perceptual blind area that may occur in urban areas, with the goal of developing test scenarios for Level 4+ autonomous driving. It utilized AV accident data from the California Department of Motor Vehicles (DMV) to compare accident patterns and characteristics between AVs and conventional vehicles based on activation status of autonomous mode. It also categorized AV disengagement data to identify types and real-world cases of disengagements caused by perceptual blind areas. The analysis revealed that AVs exhibit different accident types due to their safe driving maneuvers, and three types of perceptual blind area scenarios were identified. The findings of this study serve as crucial foundational data for developing Level 4+ autonomous driving test scenarios, enabling the design of efficient strategies to mitigate perceptual blind areas in various scenarios. This, in turn, is expected to contribute to the effective evaluation and enhancement of AV driving safety on real roads.

oneM2M Standard based Low Altitude Drone/UAV Traffic Management System (oneM2M 표준 기반 저고도 무인기 관리 및 운영시스템)

  • Ahn, Il-Yeop;Park, Jong-Hong;Sung, Nak-Myoung;Kim, Jaeho;Choi, Sung-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.2
    • /
    • pp.301-307
    • /
    • 2018
  • Unmanned Aerial Vehicles (i.e., drone) are gaining a lot of interest from a wide range of application domains such as infrastructure monitoring and parcel delivery service. In those service scenarios, multiple UAVs are involved and should be reliably operated by so-called UAV management system. For that, we propose oneM2M standard based UAV management and control system which is specifically targeted at traffic management of low-altitude UAVs. In this paper, we include oneM2M platform architecture and its implementation for UAV management system in conjunction with UAV interworking procedure.

The influence of vehicles on the flutter stability of a long-span suspension bridge

  • Han, Yan;Liu, Shuqian;Cai, C.S.;Zhang, Jianren;Chen, Suren;He, Xuhui
    • Wind and Structures
    • /
    • v.20 no.2
    • /
    • pp.275-292
    • /
    • 2015
  • The presence of traffic on a slender long-span bridge deck will modify the cross-section profile of the bridge, which may influence the flutter derivatives and in turn, the critical flutter wind velocity of the bridge. Studies on the influence of vehicles on the flutter derivatives and the critical flutter wind velocity of bridges are rather rare as compared to the investigations on the coupled buffeting vibration of the wind-vehicle-bridge system. A typical streamlined cross-section for long-span bridges is adopted for both experimental and analytical studies. The scaled bridge section model with vehicle models distributed on the bridge deck considering different traffic flow scenarios has been tested in the wind tunnel. The flutter derivatives of the modified bridge cross section have been identified using forced vibration method and the results suggest that the influence of vehicles on the flutter derivatives of the typical streamlined cross-section cannot be ignored. Based on the identified flutter derivatives, the influence of vehicles on the flutter stability of the bridge is investigated. The results show that the effect of vehicles on the flutter wind velocity is obvious.

Resilient Reduced-State Resource Reservation

  • Csaszar Andras;Takacs Attila;Szabo Robert;Henk Tamas
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.509-524
    • /
    • 2005
  • Due to the strict requirements of emerging applications, per-flow admission control is gaining increasing importance. One way to implement per-flow admission control is using an on­path resource reservation protocol, where the admission decision is made hop-by-hop after a new flow request arrives at the network boundary. The next-steps in signaling (NSIS) working group of the Internet engineering task force (IETF) is standardising such an on-path signaling protocol. One of the reservation methods considered by NSIS is reduced-state mode, which, suiting the differentiated service (DiffServ) concept, only allows per-class states in interior nodes of a domain. Although there are clear benefits of not dealing with per-flow states in interior nodes-like scalability and low complexity-, without per-flow states the handling of re-routed flows, e.g., after a failure, is a demanding and highly non-trivial task. To be applied in carrier-grade networks, the protocol needs to be resilient in this situation. In this article, we will explain the consequences of a route failover to resource reservation protocols: Severe congestion and incorrect admission decisions due to outdated reservation states. We will set requirements that handling solutions need to fulfill, and we propose extensions to reduced-state protocols accordingly. We show with a set of simulated scenarios that with the given solutions reduced-state protocols can handle re-routed flows practically as fast and robust as stateful protocols.

A Novel SDN-based System for Provisioning of Smart Hybrid Media Services

  • Jeon, Myunghoon;Lee, Byoung-dai
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.33-41
    • /
    • 2018
  • In recent years, technology is rapidly changing to support new service consumption and distribution models in multimedia service systems and hybrid delivery of media services is a key factor for enabling next generation multimedia services. This phenomenon can lead to rapidly increasing network traffic and ultimately has a direct and aggravating effect on the user's quality of service (QOS). To address the issue, we propose a novel system architecture to provide smart hybrid media services efficiently. The architecture is designed to apply the software-defined networking (SDN) method, detect changes in traffic, and combine the data, including user data, service features, and computation node status, to provide a service schedule that is suitable for the current state. To this end, the proposed architecture is based on 2-level scheduling, where Level-1 scheduling is responsible for the best network path and a computation node for processing the user request, whereas Level-2 scheduling deals with individual service requests that arrived at the computation node. This paper describes the overall concept of the architecture, as well as the functions of each component. In addition, this paper describes potential scenarios that demonstrate how this architecture could provide services more efficiently than current media-service architectures.

An Efficient Downlink MAC Protocol for Multi-User MIMO WLANs

  • Liu, Kui;Li, Changle;Guo, Chao;Chen, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4242-4263
    • /
    • 2017
  • Multi-User Multiple-Input Multiple-Output (MU-MIMO) technology has recently attracted significant attention from academia and industry because of it is increasingly important role in improving networks' capacity and data rate. Moreover, MU-MIMO systems for the Fifth Generation (5G) have already been researched. High Quality of Service (QoS) and efficient operations at the Medium Access Control (MAC) layer have become key requirements. In this paper, we propose a downlink MU-MIMO MAC protocol based on adaptive Channel State Information (CSI) feedback (called MMM-A) for Wireless Local Area Networks (WLANs). A modified CSMA/CA mechanism using new frame formats is adopted in the proposed protocol. Specifically, the CSI is exchanged between stations (STAs) in an adaptive way, and a packet selection strategy which can guarantee a fairer QoS for scenarios with differentiated traffic is also included in the MMM-A protocol. We then derive the expressions of the throughput and access delay, and analyze the performance of the protocol. It is easy to find that the MMM-A protocol outperforms the commonly used protocols in terms of the saturated throughput and access delay through simulation and analysis results.