• Title/Summary/Keyword: 자기유사 트래픽

Search Result 55, Processing Time 0.018 seconds

The Model of Estimating Spectrum Requirements in Mobile Networks with Data Traffic (데이터 서비스를 위주로 하는 이동통신 망에서의 주파수 소요량 산출 모델)

  • Kim, Dae-Keuk;Yang, Eun-Sam;Kim, Hwa-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.364-369
    • /
    • 2009
  • Today, as various access technologies appear, for example WiMax, WiBro, the demand for spectrum is increasing rapidly. Spectrums are a national resource with scarcity value so that we need to a]locate them effectively for the national economy and industry. Accordingly, In the paper, we proposed several factors and new model for estimating spectrum requirements of a next generation mobile network with multimedia data services. These are self-similarity characteristics of data traffic, engineered capacity considering QoS, structure of FA increase, asymmetry of data traffic between uplink and downlink, handoff traffic, and uneven traffic pattern among base stations. It can applied mobile WiMax or other wireless broadband systems in general.

A Performance Evaluation on Optical Burst Switched Networks and Wavelength Routed Networks (광 버스트 스위칭 네트워크와 파장 라우팅 네트워크의 성능 비교)

  • 유명식;정연미;홍현하
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.404-413
    • /
    • 2003
  • Optical Internet consists of IP domain and optical (WDM) domain, where the wavelength routing (WR) and optical burst switching (OBS) are the promising switching technologies in the optical domain. In this paper, we perform the simulations on the WR network and the OBS network, and compare their performances. It is verified from our simulations that the OBS network performs better than the WR network when the same network resources are given.

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

Development of Femtocell Simulator Based on LTE Systems for Interference and Performance Evaluation (간섭 및 성능 분석을 위한 LTE 시스템 기반 펨토셀 시뮬레이터 개발)

  • Kim, Chang-Seup;Choi, Bum-Gon;Koo, Bon-Tae;Lee, Mi-Young;Chung, Min-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.107-116
    • /
    • 2011
  • Recently, femtocell has been concerned as one of effective solutions to relieve shadow region and provide high quality services to users in indoor environments. Even though femtocell offers various benefits to cellular operators and users, many technical issues, such as interference coordination, network synchronization, self-configuration, self-optimization, and so on, should be solved to deploy the femtocell in current network. In this paper, we develop a simulator for evaluating performance of long term evolution (LTE) femtocell systems under various interference scenarios. The simulator consists of a main-module and five sub-modules. The main-module connects and manages five sub-modules which have the functionality managing user mobility, packet scheduling, call admission control, traffic generation, and modulation and coding scheme (MCS). To provide user convenience, the simulator adopts graphical user interface (GUI) which can observes simulation results in real time. We expect that this simulator can contribute to developing effective femtocell systems by supporting a tool for analyzing the effect of interference between macrocell and femtocell.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.