• Title/Summary/Keyword: Generated traffic

Search Result 445, Processing Time 0.021 seconds

Performance Analysis of a Packet Voice Multiplexer Using the Overload Control Strategy by Bit Dropping (Bit-dropping에 의한 Overload Control 방식을 채용한 Packet Voice Multiplexer의 성능 분석에 관한 연구)

  • 우준석;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.1
    • /
    • pp.110-122
    • /
    • 1993
  • When voice is transmitted through packet switching network, there needs a overload control, that is, a control for the congestion which lasts short periods and occurrs in local extents. In this thesis, we analyzed the performance of the statistical packet voice multiplexer using the overload control strategy by bit dropping. We assume that the voice is coded accordng to (4,2) embedded ADPCM and that the voice packet is generated and transmitted according to the procedures in the CCITT recomendation G. 764. For the performance analysis, we must model the superposed packet arrival process to the multiplexer as exactly as possible. It is well known that interarrival times of the packets are highly correlated and for this reason MMPP is more suited for the modelling in the viewpoint of accuracy. Hence the packet arrival process in modeled as MMPP and the matrix geometric method is used for the performance analysis. Performance analysis is similar to the MMPP IG II queueing system. But the overload control makes the service time distribution G dependent on system status or queue length in the multiplexer. Through the performance analysis we derived the probability generating function for the queue length and using this we derived the mean and standard deviation of the queue length and waiting time. The numerical results are verified through the simulation and the results show that the values embedded in the departure times and that in the arbitrary times are almost the same. Results also show bit dropping reduces the mean and the variation of the queue length and those of the waiting time.

  • PDF

Individual Presence-and-Preference-Based Local Intelligent Service System and Mobile Edge Computing (개인 프레즌스-선호 기반 지능형 로컬 서비스 시스템과 모바일 엣지 컴퓨팅 환경에서의 적용 방안)

  • Kim, Kilhwan;Jang, Jin-San;Keum, Changsup;Chung, Ki-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.523-535
    • /
    • 2017
  • Local intelligent services aim at controlling local services such as cooling or lightening services in a certain local area, using Internet-of-Things (IoT) sensor data in the area. As the IoT paradigm has evolved, local intelligent services have gained increasing attention. However, most of the local intelligent service mechanism proposed so far do not directly take the users' presence and service preference information into account for controlling local services. This study proposes an individual presence-and-preference-based local service system (IPP-LISS). We present a intelligent service control algorithm and implement a prototype system of IPP-LISS. Typically, the intelligence part of IPP-LISS including the prediction models, is generated on remote server in the cloud because of their compute-intense aspect. However, this can cause huge data traffic between IoT devices and servers in the cloud. The emerging mobile edge computing technology will be a promising solution of this challenge of IPP-LISS. In this paper, we implement IPP-LISS in the cloud, and then, based on the implementation result, we discuss applying the mobile edge computing technology to the IPP-LISS application.

Human Health Risk Assessment of Polycyclic Aromatic Hydrocarbons (PAHs) from Road Dust Sediments in Korea (국내 도로 노면 퇴적입자 내 PAHs의 인체 위해성 평가)

  • Lee, Gain;Kim, Hongkyoung;Ji, Seungmin;Jang, Yong-Chul
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.4
    • /
    • pp.286-297
    • /
    • 2020
  • This research studied human health risk assessment of PAHs (Polycyclic Aromatic Hydrocarbons) in road dust sediments collected from 6 sites in four different cities in Korea. PAHs are well known to be human carcinogens and toxic compounds that are commonly generated from incomplete combustion of fuels and energy products. Such compounds which is absorbed by atmospheric suspended dust can be emitted into air in gaseous form and often deposited on road dust sediments. The PAHs which is deposited on sediment particles can also be re-dispersed by vehicles or winds on the road surface. It can be harmful for humans when exposed via breathing, ingestion and dermal contact. This study examined human health risk assessment of PAHs in deposited road dust sediments. Results showed that the excess cancer risk estimates were above 1.0×10-6 at main traffic roads and resident area in Ulsan city. According to the result of deterministic risk assessment, dermal-contact was the major pathway, while the contribution of the risk from inhalation was less than 1%. The probabilistic risk assessment showed similar levels of cancer risk derived from the deterministic risk assessment. The result of sensitivity analysis reveal that exposure time is the most contributing factor (69%). Since the values of carcinogenic risk assessment were higher than 1.0 × 10-6, further detailed monitoring and refined risk assessment for PAHs may be required to identify more reliable and potential cancer risks for those who live in the study locations in Ulsan city.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

Optimizing Multi-way Join Query Over Data Streams (데이타 스트림에서의 다중 조인 질의 최적화 방법)

  • Park, Hong-Kyu;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A data stream which is a massive unbounded sequence of data elements continuously generated at a rapid rate. Many recent research activities for emerging applications often need to deal with the data stream. Such applications can be web click monitoring, sensor data processing, network traffic analysis. telephone records and multi-media data. For this. data processing over a data stream are not performed on the stored data but performed the newly updated data with pre-registered queries, and then return a result immediately or periodically. Recently, many studies are focused on dealing with a data stream more than a stored data set. Especially. there are many researches to optimize continuous queries in order to perform them efficiently. This paper proposes a query optimization algorithm to manage continuous query which has multiple join operators(Multi-way join) over data streams. It is called by an Extended Greedy query optimization based on a greedy algorithm. It defines a join cost by a required operation to compute a join and an operation to process a result and then stores all information for computing join cost and join cost in the statistics catalog. To overcome a weak point of greedy algorithm which has poor performance, the algorithm selects the set of operators with a small lay, instead of operator with the smallest cost. The set is influenced the accuracy and execution time of the algorithm and can be controlled adaptively by two user-defined values. Experiment results illustrate the performance of the EGA algorithm in various stream environments.

Emergence of Social Networked Journalism Model: A Case Study of Social News Site, "wikitree" (소셜 네트워크 저널리즘 모델의 출현: 소셜 뉴스사이트, "위키트리" 사례연구)

  • Seol, Jinah
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.83-90
    • /
    • 2015
  • This paper examines the rising value of social networked journalism and analyzes the case of a social news site based on the theory of networked journalism. Social networked journalism allows the public to be involved in every aspect of journalism production through crowd-sourcing and interactivity. The networking effect with the public is driving journalism to transform into a more open, more networked and more responsive venue. "wikitree" is a social networking news service on which anybody can write news and disseminate it via Facebook and Twitter. It is operated as an open sourced program which incorporates "Google Translate" to automatically convert all its content, enabling any global citizen with an Internet access to contribute news production and share either their own creative contents or generated contents from other sources. Since its inception, "wikitree global" site has been expanding its coverage rapidly with access points arising from 160 countries. Analyzing its international coverage by country and by news category as well as by the unique visit numbers via SNS, the results of the case study imply that networking with the global public can enhance news traffic to the social news site as well as to specific news items. The results also suggest that the utilization of Twitter and Facebook in social networked journalism can break the boundary between local and global public by extending news-gathering ability while growing audience's interest in the site, and engender a feasible business model for a local online journalism.

A Design and Implementation of WML Compiler for WAP Gateway for Wireless Internet Services (무선 인터넷 서비스를 위한 WAP 게이트웨이용 WML 컴파일러의 설계 및 구현)

  • Choi, Eun-Jeong;Han, Dong-Won;Lim, Kyung-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.165-182
    • /
    • 2001
  • In this paper, we describe a design and implementation of the Wireless Markup Language(WML) compiler to deploy wireless Internet services effectively. The WML compiler translates textual WML decks into binary ones in order to reduce the traffic on wireless links that have relatively low bandwidth to wireline links and mitigate the processing overhead of WML decks on, wireless terminals that have relatively low processing power to fixed workstations. In addition, it takes over the overhead of eXtensible Markup Language(XML) well-formedness and validation processes. The WML compiler consists of the lexical analyzer and parser modules. The granunar for the WML parser module is LALR(1) context-free grammar that is designed based on XML 1.0 and WML 1.2 DTD(Document Type Definition) with the consideration of the Wireless Application Protocol Binary XML grammar. The grammar description is converted into a C program to parse that grammar by using parser generator. Even though the tags in WML will be extended or WML DTD will be upgraded, this approach has the advantage of flexibility because the program is generated by modifying just the changed parts. We have verified the functionality of the WML compiler by using a WML decompiler in the public domain and by using the Nokia WAP Toolkit as a WAP client. To measurethe compressibility gain of the WML compiler, we have tested a large number of textual WML decks and obtained a maximum 85 %. As the effect of compression is reduced when the portion of general textual strings increases relative to one of the tags and attributes in a WML deck, an extended encoding method might be needed for specific applications such as compiling of the WML decks to which the Hyper Text Markup Language document is translated dynamically.

  • PDF

Development of an Algorithm for Minimization of Passengers' Waiting Time Using Smart Card Data (교통카드 데이터를 이용한 버스 승객 대기시간 최소화 알고리즘 개발)

  • Jeon, Sangwoo;Lee, Jeongwoo;Jun, Chulmin
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.65-75
    • /
    • 2014
  • Bus headway plays an important role not only in determining the passenger waiting time and bus service quality, but also in influencing the bus operation cost and passenger demand. Previous research on headway control has considered only an hourly difference in the distribution of ridership between peak and non-peak hours. However, this approach is too simple to help manage ridership demand fluctuations in a short time scale; thus passengers' waiting cost will be generated when ridership demand exceeds the supply of bus services. Moreover, bus ridership demand varies by station location and traffic situation. To address this concern, we propose a headway control algorithm for minimizing the waiting time cost by using Smart Card data. We also provide proof of the convergence of the algorithm to the desired headway allocation using a set of preconditions of political waiting time guarantees and available fleet constraints. For model verification, the data from the No. 143 bus line in Seoul were used. The results show that the total savings in cost totaled approximately 600,000 won per day when we apply the time-value cost of waiting time. Thus, we can expect that cost savings will be more pronounced when the algorithm is applied to larger systems.

Performance Analysis of AAL2 Packet Dropping Algorithm using PDV on Virtual Buffer (PDV를 이용한 가상 버퍼상의 AAL2 패킷 폐기 알고리즘과 성능분석)

  • Jeong, Da-Wi;Jo, Yeong-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.1
    • /
    • pp.20-33
    • /
    • 2002
  • Usage of ATM AAL2 packets becomes dominant to increase transmission efficiency of voice traffic in the backbone network. In case of voice service that uses AAL2 mechanism, if resources of network are enough, connection of new call is accepted. However, due to packets generated by the new call, transmission delay of packets from old calls can increase sharply. To control this behavior, in this paper we present an AAL2 buffer management scheme that allocates a virtual buffer to each call and after calculating its propagation delay variation(PDV), decides to drop packets coming from each call according to the PDV value. We show that this packet dropping algorithm can effectively prevent abrupt QoS degradation of old calls. To do this, we analyze AAL2 packet composition process to find a critical factor in the process that influences the end-to-end delay behavior and model the process by K-policy M/D/1 queueing system and MIN(K, Tc)-policy M/D/1 queueing system. From the mathematical model, we derive the probability generating function of AAL2 packets in the buffer and mean waiting time of packets in the AAL2 buffer. Analytical results show that the AAL2 packet dropping algorithm can provide stable AAL2 packetization delay and ATM cell generation time even if the number of voice sources increases dramatically. Finally we compare the analytical result to simulation data obtained by using the COMNET Ⅲ package.

The Experimental Study on Transverse Field Joint Method of Precast Road Deck Slab of Double Deck Tunnel in Great Depth (대심도 복층터널 프리캐스트 중간슬래브의 횡방향 현장이음방식에 대한 실험연구)

  • Lee, Doo-Sung;Kim, Bo-Yeon;Bae, Chul-Gi;Hur, Jae-Hun
    • Journal of the Korea Concrete Institute
    • /
    • v.29 no.1
    • /
    • pp.23-32
    • /
    • 2017
  • The joints between precast PSC slabs of the intermediate road slab in double deck tunnel are inevitably generated in the road traffic vehicle traveling direction. Therefore, it is important to make the behavior of parts on the joint in one piece. The imtermediate road slab system of double deck tunnel in great depth proposed in this study will be constructed with precast PSC slab in order to minimize the construction period. And the joint connection between the precast slab has been developed in two methods: the 'Transverse tendon reinforcement method' and 'High strength bolts connection method'. Also, the experiments were performed for the full scale model in order to evaluate the performance of the intermediate road deck slab with two type joints systems, the structural stability was verified through the F.E.M analsysis. The results of static loading test and F.E.M analysis investigated a very stable behavior of intermediate road deck slab in double deck tunnel applying the joint methods developed in this study, in the cracks and deflections to satisfy the design standards of Highway Roads Bridges (2011), it was determined that there is no problem even servicebility.