• Title/Summary/Keyword: 트래픽 측정

Search Result 384, Processing Time 0.031 seconds

Haptic Data Transmission in Networked Haptic Collaboration (네트워크 햅틱 협업을 위한 햅틱 데이터 전송)

  • You, Yong-Hee;Sung, Mee-Young;Kim, Nam-Joong;Kang, Jin-Suk;Jun, Kyung-Koo
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.64-69
    • /
    • 2007
  • 이 논문은 촉각 가상 환경(Haptic Virtual Environment)에서 촉각(haptic) 데이터를 촉각 데이터 특성에 맞추어 네트워크에 적응적이고 효율적으로 전송할 수 있는 전송 알고리즘을 제안한다. 촉감 상호작용 측정을 위해 네트워크 햅틱 협업 응용을 작성하였고 지연, 지터, 손실에 따른 변화를 분석하였다. 이를 바탕으로 네트워크 트래픽에 적응할 수 있는 알고리즘을 구성하였다. 손실되거나 지터의 영향을 받은 패킷에는 간단한 선형예측 방법을 사용하여 보상하여 손실과 지터로 인한 오차를 줄였다. 이는 심각한 손실이나 지터에 의해 떨림 현상이 나타나는 햅틱 장치의 문제점을 개선하게 되었다. 또한 네트워크 협업에서 지연이 발생할 때 나타나는 클라이언트들 사이의 비동시성을 해결하기 위하여 완충시간을 두었다. 지연이 큰 클라이언트는 버퍼를 사용하지 않고 실시간으로 처리하고, 지연이 적은 클라이언트는 버퍼를 사용하여 전송받은 좌표를 완충시킨 후에 처리하는 방법을 사용하여 클라이언트들 사이의 햅틱 렌더링을 동기화 하였다. 제안된 알고리즘은 다양한 네트워크 상황에서의 협업에서 개선된 결과를 보였다. 이를 바탕으로 향후 선형예측 방법을 다양하게 적용시키고 서버와 클라이언트 사이의 동기화를 구현하는 알고리즘을 작성할 것이다. 본 논문은 다양한 네트워크 상황 에서 햅틱 데이터를 전송하고 처리하는 연구의 기초자료가 될 수 있을 것이다.

  • PDF

Performance for Radio Access Network in mobile backhaul network (이동 백홀 망에서 Radio Access Network의 성능)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.297-302
    • /
    • 2012
  • RAN in mobile backhaul network connects base station to mobile backhaul network. This the interfaces for several generations mobile communication technologies, such as TDM, ATM, and Ethernet in cell site, and then Ethernet in mobile backhaul site. In near future, the mobile communication network will be changed to all IP/Ethernet one, and then ultimately Ethernet and TDM traffics will be transferred through IP network. So these technologies have to be encapsulated for transferring to the mobile backhaul network. The performances are measured for each encapsulation, such as ATM, MPLS, IP/UDP, and MEF8.

An Efficient Data Traffic Estimation Technique in Defense Information Network through Network Simulation (네트워크 시뮬레이션을 통한 군 통신 정보유통량의 효율적 예측 기법)

  • An, Eun-Kyung;Lee, Seung-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.133-158
    • /
    • 2006
  • The change of information and communications technology affects into many parts of military battlefield as the future warfare will be information-oriented warfare, relying on information technology. The more IT-based military systems are deployed the more multimedia data traffic increase. To accommodate such user's requirements the bandwidth capacity of military communications network must be upgraded. The cost of upgrading network capacity is increasing as well. But there has no systematic estimation approach to analyze the amount of data traffic in the military network. In this paper we suggest an efficient data traffic estimation technique using network simulation with the respect of Input and output, scenario, toolset and technique, and experimental environments.

A Fixed Grid Based Cache Algorithm for Performance Improvement in Internet Geographic Information System (인터넷 지리 정보 시스템에서의 성능 개선을 위한 고정 그리드 기반의 캐쉬 알고리즘)

  • Moon, Jin-Yong;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.27-34
    • /
    • 2000
  • Recently, the use of Geographic Information System in each field of our society is on the increase according to the development of the Internet. But, thereis a problem of the user access latencies, the network traffic, and the server overload in Internet Geographic Information System because spatial data are transferred in large volumes. In this paper, we propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

  • PDF

Secure VPN Performance in IP Layers (IP계층에서의 VPN 전송성능에 관한 연구)

  • 임형진;권윤주;정태명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.102-112
    • /
    • 2001
  • This paper analyzes Security Performance and Processing Performance to measure performance between nodes by using AH and ESP protocol. IPsec VPN provides application with security service implemented in IP Layer while traffic cost and packet processing time it increased by encryption, decryption and authentication in AH and ESP. We measured overall packet processing time and IPsec module processing time. The result of the efficiency test showed that the factors of influencing electrical transmission efficiency were the size of electrical transmission packets, codes used for tunnelling, authentication functions, CPU velocity of host7, and the embodiment of IPsec; for a high capacity traffic, IPsec transmission was not appropriate, because transmission velocity was delayed by more than ten times in comparison with Non-IPsec.

  • PDF

An Efficient Caching Scheme to Enhance the Response Time of Geospatial Web Services (지리공간 웹 기반 서비스에서 응답시간을 향상시키기 위한 효율적인 캐싱 기법)

  • Moon, Jin-Yong
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2009
  • The wide spread of the Internet service has brought in web GIS development. But, there are problems of the user access latencies, the network traffic, and the server overload in Internet Geographic Information System because spatial data are transferred in large volumes. In this paper, I propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

  • PDF

Estimation of CTD and Peak-to-Peak CDV Allocation to Nodes in Domestic Region (국내영역에서 셀전달지연 추정 및 peak-to-peak CDV 노드별 할당)

  • Park, Chun-Kwan;Han, Jong-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.2
    • /
    • pp.6-12
    • /
    • 2001
  • When CBR source traffics are loaded to ATM switch and broadband network termination, CTD values of ATM switch and broadband network termination are measured and then the values of CTD in the domestic region arc estimated. The estimation values of CTD satisfy the objective of CTD in the domestic region allocated by allocation rules of 1.356. The peak-to-peak CDV allocation method based On Chernoff accumulation method is proposed and applied to the nodes of national portion. From the result of numerical analysis, the proposed method is more accurate than the equal allocation method for peak -to-peak CDV in case that the CDVs at each node and the number of ATM nodes on the path increase.

  • PDF

Performance Analysis of ECTP Error Control Mechanism (ECTP 오류복구 성능평가)

  • 박주영;고석주;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.605-609
    • /
    • 2002
  • Reliable multicast data transmission in a 1:N environment needs more sophisticated error control mechanism than that of in 1:1 environment due to ACK implosion and duplicated retransmission. Although there have been many related research on error control in reliable multicast, real implemented protocols are rare. As one of the reliable multicast transport protocols, ECTP is selected as an international standard reliable multicast protocol by ITU-T and ISO and implemented on RedHat 7.2 machine by us. In this paper, we evaluate the performance of the error control mechanism in the respect of throughput and generated control packet numbers with a real implementation code. From the results, it is concluded that the suitable values of error control parameters can be obtained from the local group size and network environments.

  • PDF

Analysis of Delay Time in the Personal Communications Exchange (개인통신교환기의 지연시간 분석)

  • Jang, Hee-Seon;Suh, Jae-Jun;Lim, Seog-Ku;Yu, Jea-Hoon;Lee, Yoon-Ju
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.180-193
    • /
    • 1996
  • 본 논문에서는 시뮬레이션 모델을 통해 호유형뿐만 아니라 개인통신서비스에서 필수적인 핸드오버 및 위치등록 등의 모든 트래픽 유형을 고래했을 때 개인통신교환기(PCX : Personal Commuincations Exchange)에서의 지연시간을 분석하며, 지연시간에 대한 결과와 프로세서의 이용율로부터 개인통신교환기의 호처리 및 이동성처리용량을 분석하고 그에 따른 가입자의 수용능력을 추정한다. IPC(Inter-Processor Communications) 메시지의 송수신시간 및 메시지의 처리시간등 교환기 제어계의 성능분석에 필요한 입력 파라미터 값은 기존 ISDN(Integrated Services Digital Network) 및 CMS-MX(CDMA Mobile System-Mobile Exchange) 교환기의 측정자료를 이용하였다. 시뮬레이션 분석결과 PCX 교환기의 호처리 성능은 주로 번호번역 기능을 담당하는 프로세서인 NTP(Number Translation Processor)의 용량에 의해 결정되며, 가입자 밀도가 1,500명$/km^2$인 경우 호처리용량은 약 42만 BHC(Busy Hour Call Completion)로 추정되었고, 이에 상응하는 핸드오버 및 위치등록 처리용량은 각각 시간당 약 2만 6천히 및 40만 6천회로 나타났다. 이것은 가입자당 호처리 부하가 1.6BHC일 경우, 약 15만 7천 가입자를 수용할 수 있는 용량에 해당한다.

  • PDF

Performance Analysis of the SSCOP in B-ISDN (B-ISDN SSCOP의 성능 분석)

  • 장성철;민상원;정해원;은종관;김용진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.892-900
    • /
    • 1994
  • Recently, ITU-TSS recommends a service specific connection oriented protocol (SSCOP) which assures the successful transmission of signalling information for B-ISDN. In the SSCOP, there is a mechanism to exchange periodically status informations for both error and flow controls. In this paper, we analyze the SSCOP with a discrete-time queueing model. We consider two cases for link-by-link and end-to-end controls. As the performance measures, we investigate delay, throughput, and buffer size of the receiver. The average values of these measures are analyzed with respect to the loss probability of messages, the traffic load, and the exchange period of status information. We also verify the accuracy of this model with simulations.

  • PDF