• Title/Summary/Keyword: 지연 모델

Search Result 1,479, Processing Time 0.024 seconds

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Implementation and Performance Evaluation of the Wireless Transaction Protocol Using UML/SDL (UML과 SDL을 이용한 무선 트랜잭션 프로토콜의 구현과 성능 평가)

  • 정호원;임경식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1064-1073
    • /
    • 2002
  • In this paper, we design and implement the Wireless Transaction Protocol (WTP) proposed by the Wireless Application Protocol (WAP) forum using a protocol development tool, SDL Development Tool (SDT). And we conduct a comparative performance evaluation of the WTP implementation with other three implementations that are based on different implementation models respectively: the server model, the coroutine model, and the activity-thread model. To implement WTP, we first use Unified Modeling Language (UML) for analyzing the protocol requirement and defining the protocol engine architecture. Next, we use Software Development Language (SDL) to design the protocol engine in details and then generate the WTP implementation automatically with the aid of SDT The code size of the WTP implementation generated by SDT is 62% larger than the other three implementations. However, its throughput and system response time for transaction processing is almost equal to the other three implementations when the number of concurrent clients is less than 3,000. If more than 5,000 concurrent clients tries, the transaction success rate abruptly decreases to 10% and system response time increases to 1,500㎳, due to the increased protocol processing time. But, it comes from the fact that the load overwhelms the capacity of the PC resource used in this experimentation.

A Study on the Prediction Accuracy Bounds of Instruction Prefetching (명령어 선인출 예측 정확도의 한계에 관한 연구)

  • Kim, Seong-Baeg;Min, Sang-Lyul;Kim, Chong-Sang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.8
    • /
    • pp.719-729
    • /
    • 2000
  • Prefetching aims at reducing memory latency by fetching, in advance, data that are likely to be requested by the processor in a near future. The effectiveness of prefetching is determined by how accurate the prediction on the needed instructions and data is. Most previous studies on prefetching were limited to proposing a particular prefetch scheme and its performance evaluation, paying little attention to theoretical aspects of prefetching. This paper focuses on the theoretical aspects of instruction prefetching. For this purpose, we propose a clairvoyant prefetch model that makes use of perfect history information. Based on this theoretical model, we analyzed upper limits on the prefetch prediction accuracies of the SPEC benchmarks. The results show that the prefetch prediction accuracy is very high when there is no cache. However, as the size of the instruction cache increases, the prefetch prediction accuracy drops drastically. For example, in the case of the spice benchmark, the prefetch prediction accuracy drops from 53% to 39% when the cache size increases from 2Kbyte to 16Kbyte (assuming 16byte block size). These results indicate that as the cache size increases, most localities are captured by the cache and that instruction prefetching based on the information extracted from the references that missed in the cache suffers from prediction inaccuracies

  • PDF

A Propose on the Propagation Prediction Model for Service in the Sea of CDMA Mobile Communication (CDMA 이동통신의 해상 서비스를 위한 전파예측모델 제안)

  • Kim, Young-Gon;Park, Chang-Kyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.6
    • /
    • pp.106-112
    • /
    • 2001
  • Unfortunately, the area without economical efficiency, especially the far distance sea, is much lower than that of a urban area-built-up area. It should be promoted the equivalent level to a urban area in the light of future-oriented universal service. Actually, Because propagation environment of mobile communication in the sea is greatly different from that for inland focused on built-up area, a propagation prediction model in the sea should be distinguished from inland-based one. Accordingly, the purpose of this study is to suggest the propagation prediction model for the sea service as a method to minimize unnecessary facilities investment and maintenance caused by additional or new building of a base station. If mobile phone service for far distance sea is provided by expanding limited communication zone of narrow band CDMA mobile communication whose spread band FA is 1.2288MHz. Suggested propagation prediction model includes five parameters to minimize facilities investment of a base station and maximize channel capacity: equivalent line of sight, chip delay by PN code, antenna altitude, power of base station and gain of antennas. Finally, suggested propagation prediction model is simulated and, the results are examined for its utility by comparing with loss of free space.

  • PDF

A generation method of ASF mapping by the predicted ASF with the measured one in the Yeongil Bay (ASF 예측모델과 실측치를 이용한 영일만 해상 ASF 맵 생성기법)

  • Hwang, Sang-Wook;Shin, Mi Young;Choi, Yun Sub;Yu, Donghui;Park, Chansik;Yang, Sung-Hoon;Lee, Chang-Bok;Lee, Sang Jeong
    • Journal of Navigation and Port Research
    • /
    • v.37 no.4
    • /
    • pp.375-381
    • /
    • 2013
  • In order to establish eLoran system it needs the betterment of a receiver and a transmitter, the add of data channel to loran pulse for loran system information and the differential Loran for compensating Loran-c signal. Precise ASF database map is essential if the Loran delivers the high absolute accuracy of navigation demanded at maritime harbor entrance. In this study we developed the ASF mapping method using predicted ASFs compensated by the measured ASFs for maritime in the harbor. Actual ASF is measured by the legacy Loran signal transmitted from Pohang station in the GRI 9930 chain. We measured absolute propagation delay between the Pohang transmitting station and the measurement points by comparing with the cesium clock for the calculation of the ASFs. Monteath model was used for the irregular terrain along the propagation path in the Yeongil Bay. We measured the actual ASFs at the 12 measurement points over the Yeongil Bay. In our ASF-mapping method we estimated that the each offsets between the predicted and the measured ASFs at the 12 spaced points in the Yeongil. We obtained the ASF map by adjusting the predicted ASF results to fit the measured ASFs over Yeungil bay.

Stress Evaluation Procedure for Connection of Steel Frame Pier (강제라멘교각 접합부의 응력평가법)

  • Hwang, Won Sup;Kim, Young Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.10 no.3 s.36
    • /
    • pp.327-338
    • /
    • 1998
  • This paper presents the elastic behavior for panel zone and flange of connection in steel frame pier. The results of stress distributions on a series of experiments and FEM analysis models are reported herein. The investigations show that the shear stresses in the panel zone are varied with sectional-area ratio$(A_f/A_w)$ and also indicate that the nomal stresses in the flange due to the shea lag are significantly higher than the current design procedure. Based on the results, some new proposals considering the design parameters affecting connecting behavior are presented for the evaluations of stresses of panel zone and flange in connection.

  • PDF

Method for Reduction of Power Consumption using Buffer Processing Time Control in Home Gateway (홈 게이트웨이에서 서비스 특성에 따른 버퍼 동작 시간 제어를 통한 전력 소비 감소 방안)

  • Yang, Hyeon;Yu, Gil-Sang;Kim, Yong-Woon;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.8
    • /
    • pp.69-76
    • /
    • 2012
  • This paper proposes an efficient power consumption scheme using sleep mode in home gateway. The scheme by this paper classifies incoming real time packet and non-real time packet in home gateway and delay non-real time packet. Therefore, the home gateway can have longer sleep time because non-real time packet can get additional delay time by proposing mechanism using timer. We use non-preemptive two priority queueing model for performance analysis. As a results, we verify that power consumption of proposed scheme is reduced more than existing scheme by delay of non-real time traffic.

Improved MOG Algorithm for Periodic Background (주기성 배경을 위한 개선된 MOG 알고리즘)

  • Jeong, Yong-Seok;Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2419-2424
    • /
    • 2013
  • In a conventional MOG algorithm, a small threshold for background decision causes the background recognition delay in a periodic background and a large threshold makes it recognize passing objects as background in a stationary background. This paper proposes the improved MOG algorithm using adaptive threshold. The proposed algorithm estimates changes of weight in the dominant model of the MOG algorithm both in the short and long terms, classifies backgrounds into the stationary and periodic ones, and assigns proper thresholds to them. The simulation results show that the proposed algorithm decreases the maximum number of frame in background recognition delay from 137 to 4 in the periodic background keeping the equal performance with the conventional algorithm in the stationary background.

Path Control Algorithm for AGV Using Right of Path Occupation (경로 점유권을 이용한 AGV의 경로 제어 알고리즘)

  • Joo, Young-Hoon;Kim, Jong-Seon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.592-598
    • /
    • 2008
  • This paper presents collision prediction and avoidance method for AGVS (Automatic Guide Vehicle System). Also, we propose the PO(Right of Path Occupying) with decentralized delay time for collision avoidance. Classified essential element of AGV's working environment is modeled in this paper. Using this model, we propose a new shortest path algorithm using A* search algorithm and obtain the information on AGVs travel time, coordinates and rotation vector. Finally, we use the AGVs information data as input for simulation program. The simulation practice is used in order to evaluate a collision prediction and avoidance, and it has been presented to demonstrate the applicability of the minimize delay time.

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF