• Title/Summary/Keyword: Network traffic control

Search Result 1,094, Processing Time 0.024 seconds

A Cross-layer Link Adaptive HD Video Transmission Scheme in WiMedia D-MAC based UWB Systems

  • Joo, Yang-Ick
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.12
    • /
    • pp.1464-1474
    • /
    • 2012
  • In this paper, we propose a QoS (Quality of Service)-aware and cooperative resource reservation scheme using cross-layer link adaptation for wireless high definition video transmission through UWB (Ultra Wide Band) network with D-MAC (Distributed Medium Access Control). A wireless high definition video transmission system usually requires stable high throughput even without line-of-sight, e.g., a destination device in another room separated by a wall. Since the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme causes lots of DRP resource reservation conflicts due to failure of beacon detection in wireless channel environment, overall performances of the WiMedia D-MAC can be deteriorated. And the current WiMedia MAC standard has not considered QoS provisioning even though QoS parameters such as a range of service rates are provided to each traffic stream. Therefore, we propose Relay DRP protocol with QoS-based relay node selection criterion, which makes a relay path to avoid DRP resource reservation conflicts and guarantee QoS more stably through cross-layer link adaptation of cooperative relay transmission scheme and is compliant with the current WiMedia D-MAC protocol. Simulation results demonstrate performance improvements of the proposed method for throughput and QoS provisioning.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems

  • Senthil Kumar, P.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.225-237
    • /
    • 2016
  • In conventional transportation problem (TP), all the parameters are always certain. But, many of the real life situations in industry or organization, the parameters (supply, demand and cost) of the TP are not precise which are imprecise in nature in different factors like the market condition, variations in rates of diesel, traffic jams, weather in hilly areas, capacity of men and machine, long power cut, labourer's over time work, unexpected failures in machine, seasonal changes and many more. To counter these problems, depending on the nature of the parameters, the TP is classified into two categories namely type-2 and type-4 fuzzy transportation problems (FTPs) under uncertain environment and formulates the problem and utilizes the trapezoidal fuzzy number (TrFN) to solve the TP. The existing ranking procedure of Liou and Wang (1992) is used to transform the type-2 and type-4 FTPs into a crisp one so that the conventional method may be applied to solve the TP. Moreover, the solution procedure differs from TP to type-2 and type-4 FTPs in allocation step only. Therefore a simple and efficient method denoted by PSK (P. Senthil Kumar) method is proposed to obtain an optimal solution in terms of TrFNs. From this fuzzy solution, the decision maker (DM) can decide the level of acceptance for the transportation cost or profit. Thus, the major applications of fuzzy set theory are widely used in areas such as inventory control, communication network, aggregate planning, employment scheduling, and personnel assignment and so on.

A Hybrid UPC Algorithm Combining Leaky Bucket and EWMA Algorithms on ATM Networks (ATM 망에서 리키버켓과 EWMA 방식을 결합한 복합형 UPC 알고리즘)

  • Yun, Seok-Hyeon;Seong, Yeong-Rak;O, Ha-Ryeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1382-1390
    • /
    • 1999
  • 본 논문에서는 ATM 망에서 대표적 사용 파라미터 제어(UPC) 알고리즘인 리키버켓 알고리즘과 윈도우 알고리즘의 하나인 EWMA 알고리즘을 결합한 복합형 UPC 알고리즘을 제안하고 그 성능을 평가 분석하였다.제안된 알고리즘은 최대전송율을 제어하는 리키버켓과 평균전송율을 제어하는 EWMA를 병렬로 결합하여, 최대전송율과 평균전송율을 동시에 고려하였다. ON/OFF 트래픽 소스 모델을 적용, BONeS를 이용하여 모의실험한 결과 제안 알고리즘이 기존의 리키버켓 알고리즘에 비해 셀 손실율과 버퍼 크기면에서 우수한 성능을 나타냈다.Abstract In this paper, a hybrid UPC algorithm is proposed, which combines the representative Leaky Bucket UPC algorithm with the EWMA window algorithm in the ATM network and then its performance is evaluated. The hybrid UPC algorithm is made up of Leaky Bucket and EWMA, which control the peak bit rate and the mean bit rate, respectively. According to the result of the simulation using BONeS with the On/Off traffic source model, it is revealed that the proposed UPC algorithm has superior performance to the existing Leaky Bucket UPC algorithm with regard to both the cell loss rate and the buffer size.

A Study on the Transmission Delay of Internet Broadcasting Service using Overlay Multicast (오버레이 멀티캐스트기법을 이용한 인터넷 방송 서비스의 전송지연에 대한 개선 연구)

  • Cho, Hye-ran;Song, Bok-sub;Kim, Jeong-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.270-273
    • /
    • 2007
  • The overlay multicast that has been recently presented as an alternative for the IP multicast has been getting much persuasion by the advancement of the network techniques to enforce routing in application-level. But, The overlay multicast is a problem of delay and the load of the traffic control. In this paper, we suggested to an effective transmission routing tree between users based on overlay multicast of Internet broadcasting Service. And we evaluated an optimal value of transmission delay about Internet broadcasting using this suggest model.

  • PDF

Design and Implementation of A Policy based QoS Management System to Support Dynamically Differentiated QoS (차등적인 QoS의 동적인 제공을 위한 정책기반 QoS 관리 시스템의 설계 및 구현)

  • Si-Ho, Cha;Kyu-Ho, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.139-147
    • /
    • 2004
  • To provide Internet QoS, the IETF Proposed two models of Integrated Services (IntServ) and Differentiated Services (DiffServ) Unlike IntServ where resource reservation and admission control is Per-flow based using RSVP. DiffServ supports aggregated traffic classes to provide various QoS to different classes of traffics. However a dynamic QoS management system is required to dynamically provide differentiated QoS for customers who require dynamic QoS change. This paper designed and implemented therefore a policy-based QoS management system to manage effectively and configure dynamically QoS of DiffServ networks. The validity of the system has been verified by the experimentation on the Linux-based DiffServ network.

  • PDF

Advanced Receiver for Interference Cancellation in 3GPP LTE-A (3GPP LTE-A에서의 진화된 간섭 제거 수신기)

  • Hwang, Jin-Yup;Lee, Sang-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.389-397
    • /
    • 2014
  • This paper focuses on advanced receiver for interference suppression or cancellation from neighbor cells in the 3GPP Rel-12 standard. From UE (User Equipment) perspective, the advanced receiver which can manage inter-cell interference of adjacent cell is required to support and manage fast-growing wireless data traffic. In 3GPP standard, NAICS which is one of approaches to improve SINR and receiver performance by directly suppression or cancellation of data (PDSCH) and control (PDCCH) signal from interference cells is discussed. In this paper, we briefly introduce the concept and candidate receivers for NAICS (Network Assisted Interference Cancellation and Suppression) based on 3GPP Rel-12 standard, and simulation results for basic NAICS receiver performance are provided.

A study on the extended TCP/IP protocol for real-time communication (실시간 통신을 위한 확장된 TCP/IP 프로토콜 개발에 관한 연구)

  • Yoon, Young-Chan;Park, Jae-Hyun
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.42-52
    • /
    • 1998
  • This paper proposes an extended TCP/IP protocol, LAN/TCP, that can be used for the distributed soft real-time systems connected through the Ethernet-based local area network. Since LAN/TCP shows soft real-time performance with keeping compatibility and interoperability with the standard TCP/IP, the existing application software can be used without any modification. LAN/TCP also provides the periodic transmission mode(PTM) with which the periodical data collection and updating the control signals can be efficiently implemented with relatively small traffic overhead. This paper includes the computer simulation and experimental results of the proposed protocol.

  • PDF

Impact of Duty Cycle in Wireless Sensor Networks (무선 센서 네트워크에서 Duty Cycle의 영향)

  • Sthapit, Pranesh;Pyun, Jae-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.854-857
    • /
    • 2008
  • Wireless sensor consists of an internal power source which has limited life time. Several MAC protocols have exploited scheduled sleep/listen cycles to conserve energy in sensor networks. Duty cycle is a user-adjustable parameter in low duty cycle MAC protocols, which determines the length of the sleep period in a frame. The sire of duty cycle has direct effect on the Performance of MAC Protocols. In this Paper, we simulated TEEM (A Traffic Aware, Energy Efficient MAC) and S-MAC in NS-2 with different duty cycle values and analyze how duty-cycle effects on the performance and energy consumption of both the protocols.

  • PDF

Algorithm Based on Texture for the Recognition of Vehicles' Model (질감을 이용한 차량모델 인식 알고리즘)

  • Lee Hyo Jong
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.257-264
    • /
    • 2005
  • The number of vehicles are rapidly increased as our society is developed. The vehicle recognition has been studied for a while because many people acknowledged it has critical functions to solve the problems of traffic control or vehicle-related crimes. In this paper a novel method is proposed to recognize vehicle models corresponding makers. Vehicles' models are recognized based on the texture parameters from segmented radiator region above a number plate. A three-layer neural network was built and trained with the texture features for recognition. The proposed method shows $93.7\%$ of recognition rate and $99.7\%$ of specificity for vehicles' model.