• Title/Summary/Keyword: Network Overload

Search Result 238, Processing Time 0.033 seconds

On the Comparison of Call Overload Control Methodologies in ATM Networks (ATM 통신망에서의 호 과부하 제어방식 비교)

  • Song, Ki-Sang;Lee, Jean
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.168-179
    • /
    • 1996
  • Automatic repeated recalling from individual computing equipments such as PC and workstations, to access ATM networks may result in call overload to networks. Call overload causes to waste network resources and fail to meet user call processing QoS requirements. We evaluate two call connection request methods: the back-off recall method(BRM) which makes recall with random waiting time after rejection, and the direct recall method(DRM) which repeats call connection request whenever call request is rejected. We evaluate their performances by simulation and it shows that as the total number of attached terminals to each access node increases, BRM performs better than DRM in terms of the call acceptance level and effective network bandwidth utilization.

  • PDF

Exploring the Effect of Overload on the Discontinuous Intention of SNS: The Moderating Effect of Gender

  • Yu Xiang Xia;Seong Wook Chae
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.5
    • /
    • pp.61-70
    • /
    • 2021
  • With the proliferation of smartphones and 5G networks, mobile social network service (SNS) has become an indispensable part of people's daily lives. However, with the use of SNS, fatigue and withdrawal behavior gradually emerged. Based on The Transactional Theory of Stress and Coping (TTSC), we explored the mechanism of SNS overload on users' discontinuous intention under the framework of "stressor-strain-outcome". And we also investigated the moderating effects of gender in this process. We hope that through our research, we can help SNS users to reduce unnecessary fatigue, and provide better suggestions for platform designers to adjust product design to improve user experience.

An Extended Service Filtering Technique for Mass Calling-Type Services Using Intelligent Peripheral in an SCP-Bound Network

  • Jeong, Kwang-Jae;Kim, Tae-Il;Choi, Go-Bong
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.115-132
    • /
    • 1998
  • This paper proposes an extended service filtering technique to prevent overload in service control point (SCP) due to televoting (VOT) or mass calling (MAS) services with the heavy traffic characteristics. Also, this paper compares this extended technique with the existing overload control techniques, and calculates steady state call blocking probabilities in intelligent network (IN) under overload conditions. The proposed technique considers SCP overload and IN Capability Set (CS)-1 services (such as VOT or MAS service) that have to use the specialized resources of intelligent peripheral (IP). This technique uses first an activating step in which SCP requests service filtering to service switching point (SSP). Then, in the filtering step, SSP sends filtering results to SCP periodically or each N-calls. Also, when filtering time-out expires, SSP stops service filtering, and sends service filtering response to SCP in the deactivating step. This paper applies this technique to VOT/MAS service, and calculates SCP and SSP-IP (circuit) call blocking probabilities by using an analytical VOT/MAS service model. With the modeling and analyzing of this new technique, it shows that this technique reduces the traffic flow into SCP from SSP and IP prominently.

  • PDF

Overload Control for Random Access in Cellular Machine-to-Machine Communications (셀룰러 기반의 사물 간 통신을 위한 임의접근 채널의 부하 제어 알고리즘)

  • Tribudi, Dimas;Choi, Kae-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.181-186
    • /
    • 2014
  • In this paper, we propose an overload control scheme to resolve an overload problem in a random access channel of cellular machine-to-machine (M2M) communication networks. The M2M applications are characterized by small-sized data intermittently transmitted by a massive number of machines. Due to this characteristics, an overload situation in random access channel (RACH) can happen when a large number of devices try to send a signal via the RACH. To address this overload problem, we propose a scheme in which a base station estimates the total load in the network and controls the load by using a p-persistent method based on the estimated load.

A Study on the Stress of Social Network Service and Using Reluctant Intention (SNS 스트레스와 이용의도저하에 관한 연구)

  • Park, Hyun-Sun;Kim, Sang-Hyun
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.53-72
    • /
    • 2015
  • Purpose The purpose of this study was to investigate the factors affecting the users' stress and using reluctant intention to use social network service(SNS). This study especially focused on stress of SNSs' user. Because SNS has led to negative effects such as invasion of privacy, addiction and social overload recently. In addition, adverse effects of SNS had caused SNSs' user to feel stress and fatigue. Design/methodology/approach This study developed hypotheses to empirically examine the factors that affect SNS users' stress and using reluctant intention. In order to verify research hypotheses, this study collected data from 362 users who currently use the SNS in Korea. Further, we used the smartPLS analysis. Findings The results of this study are as follows; First, reputation perception, unwanted relation burden, privacy concern, information overload and interaction overload had a significant positive effect on SNS users' stress. But international influence had no significant positive effect on SNS users' stress. Second, SNS users' stress had a significant positive effect on using reluctant intention. The results of this study provides theoretical foundations on the research for dark side of SNS and implies that SNS providers are in need of exerting an effort to minimize the negative aspects.

A Route Selection Scheme for WLAN Offloading with Cloud Server in EPC Network (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택 방안)

  • Kim, Su-hyun;Min, Sang-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.603-606
    • /
    • 2013
  • Mobile and wireless communication technologies to the development of a variety of next-generation mobile networks such as smart phones, tablet PC and mobile terminals will coexist various access networks. In a variety of network service continuity and quality of service degradation due to network conditions, and the EPC network traffic overload phenomenon still remains a problem. In this paper, the EPC network traffic overload in distributed cloud servers is proposed to select. Our proposed scheme using an efficient network handover can provide optimal service according to the network condition.

  • PDF

An Onboard Printer Server Based on Embedded Linux (Embedded Linux 기반의 내장형 프린터 서버)

  • Cha, Kyung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.309-314
    • /
    • 2009
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other People in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the of ice to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Overload Surge Investigation Using CFD Data

  • Flemming, Felix;Foust, Jason;Koutnik, Jiri;Fisher, Richard K.
    • International Journal of Fluid Machinery and Systems
    • /
    • v.2 no.4
    • /
    • pp.315-323
    • /
    • 2009
  • Pressure oscillations triggered by the unstable interaction of dynamic flow features of the hydraulic turbine with the hydraulic plant system - including the electrical design - can at times reach significant levels and could lead to damage of plant components or could reduce component lifetime significantly. Such a problem can arise for overload as well as for part load operation of the turbine. This paper discusses an approach to analyze the overload high pressure oscillation problem using computational fluid dynamic (CFD) modeling of the hydraulic machine combined with a network modeling technique of the hydraulic system. The key factor in this analysis is the determination of the overload vortex rope volume occurring within the turbine under the runner which is acting as an active element in the system. Two different modeling techniques to compute the flow field downstream of the runner will be presented in this paper. As a first approach, single phase flow simulations are used to evaluate the vortex rope volume before moving to more sophisticated modeling which incorporates two phase flow calculations employing cavitation modeling. The influence of these different modeling strategies on the simulated plant behavior will be discussed.

A Failover Method in CCTV Network Video Recording Environment (CCTV 네트워크 영상 녹화 환경에서 장애 조치 기법)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.1-6
    • /
    • 2019
  • CCTV video recording system is recognized as evidence value of video data, and is widely used in real life for the purpose of security of facilities or security control, and it is developing in order to process high-resolution and high-capacity data in real time through network. However, there is no description of redundancy to prevent the loss of image data due to defects of unexpected equipment or external attack, and even if the redundancy is implemented, a high-capacity video stream is transmitted through the network, network overload can not avoided. In this paper, we propose and verify a failover method based on rules that can operate the redundancy scheme without inducing network overload in CCTV network video recording environment.