• Title/Summary/Keyword: Network traffic data

Search Result 1,555, Processing Time 0.033 seconds

Spectrum Requirements Prediction for WLAN Considering Frequency Interference (간섭을 고려한 무선 LAN 주파수 소요량 예측)

  • Jang, Byung-Jun;Park, Duk-Kyu;Yoon, Hyun-Goo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.900-908
    • /
    • 2012
  • Owing to the proliferation of smart phone users, a proactive spectrum policy is needed in order to deal with increasing data traffic. Therefore, the prediction of frequency requirements for future wireless local area network (WLAN) as well as a licensed cellular communication is necessary. In this paper, we proposed a new prediction method for WLAN spectrum requirements. This method includes both a traditional prediction method and an offloading percentage from cellular network, Also, it can consider a frequency interference between access points using a statistical approach. Based on these approaches, we can predict the spectrum requirements of future domestic WLAN services considering the frequency interference. Finally, we suggest the spectrum policy for WLAN which can prevent spectrum shortage of future WLAN services.

The Study of End-to-End QoS Providing Technique in Mobile IPv6 Network Based on IEEE 802.11e (IEEE 802.11e기반 Mobile IPv6망에서 End-to-End QoS 보장 기술에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Son, Sung-Chan;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.573-577
    • /
    • 2005
  • Recently there are increasing needs for Internet and various kinds of contents. These traffics for various contents need more amount of data to provide high-quality information and require various QoS depending on the characteristics of contents. However, current Internet service supports BE (Best Effort) service only, therefore IntServ (Integrated Service) scheme and DiffServ (Differentiated Service) scheme are represented to support QoS in IP layer. Moreover, while wireless Internet is getting popular, MAC(Medium Access Control)is also becoming important. This is due to the fact that wireless access, resource allocation and packet scheduling, which are done in another layers before, are performed in MAC layer in many new wireless systems. This paper describes new scheme that provides QoS taking into account the traffic characteristics over Mobile IPv6 network based on IEEE 802.11e EDCF and evaluates the performance through computer simulation.

  • PDF

Performance Analysis of Collaborative Wideband Sensing Scheme based on Energy Detection with User Selection for Cognitive Radio (에너지검출 기반 협력 광대역 센싱에서 사용자 선택에 따른 센싱 성능 분석)

  • Lee, Mi-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.72-77
    • /
    • 2011
  • Spectrum sensing is a critical functionality of CR network; it allow secondary user to detect spectral holes and to opportunistically use under-utilized frequency bands without causing harmful interference to primary use. Recently, wideband service has been increase for processing abundance of data traffic. So CR network needs a realizable implementation design of spectrum sensing for wideband. To get high resolution performance of wideband sensing must precede algorithm processing for reliability signal detection. By the way, the performance of spectrum sensing can be degraded due to fading and shadowing. In order to overcome this problem, we propose system model of wideband sensing scheme on energy detected collaborative technique. we divide wideband into narrowbands and use narrowbands to detect signal excepting some narrowbands including bad channel through the CSI. And we simulate and analyze in terms of detection probability with various SNR.

User and Antenna Joint Selection Scheme in Multiple User Massive MIMO Networks (다중 사용자 거대 다중 안테나 네트워크에서의 사용자 및 안테나 선택 기법)

  • Ban, Tae-Won;Jeong, Moo-Woong;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.77-82
    • /
    • 2015
  • Recently, multi-user massive MIMO (MU-Massive MIMO) network has attracted a lot of attention as a technology to accommodate explosively increasing mobile data traffic. However, the MU-Massive MIMO network causes a tremendous hardware complexity in a base station and computational complexity to select optimal set of users. In this paper, we thus propose a simple algorithm for selecting antennas and users while reducing the hardware and computational complexities simultaneously. The proposed scheme has a computational complexity of $O((N-S_a+1){\times}min(S_a,K))$, which is significantly reduced compared to the complexity of optimal scheme based on Brute-Force searching, $$O\left({_N}C_S_a\sum_{i=1}^{min(S_a,K)}_KC_i\right)$$, where N, $S_a$, and K denote the number of total transmit antennas, the number of selected antennas, and the number of all users, respectively.

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

A Performance Analysis and Evaluation of Congestion Avoidance Algorithm for ABR service over ATM Networks (ATM망에서 ABR 서비스를 위한 혼잡회피 알고리즘의 성능 분석 및 평가)

  • 하창승;조익성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.80-91
    • /
    • 2002
  • A general goal of the AT%(Asynchronous Transfer Mode) network is to support connect across various network. On ATM networks, ABR services are provided using the remained ban after allocation CBR and VBR traffic. Realtime services such as transmitting audio or video data may be provided using CBR ado VBR which have a constrained transmission delay, but in these cases, the communications bandwidth may be wasted. In this paper a simulation has been performed to compare and evaluate the performance between the ERICA(Explicit Rate Indicate Avoidance) and EPRCA(Enhanced Proportional Rate Control Algorithm) switches which use Explicit Rate switch algorithm for ABR switch. The variation of the ACR at the source end system, the queue length, the utilization rate of the link bandwidth and the share fairness at the transient and steady states are used as the evaluation criteria for the simulation. As a result of simulation, ERICA algorithm switch was ten times long compared to ERPCA switch to achieve assigned fair share. so EPRCA switch is superior to ERICA about load response. For Fair share and stability, ERICA switch is excellent to EPRCA switch.

  • PDF

UDP Flow Entry Management for Software-Defined Networking (사용자 정의 네트워크를 위한 사용자 데이터그램 프로토콜 플로우 엔트리 관리 기법)

  • Choi, Hanhimnara;Raza, Syed Muhammad;Kim, Moonseong;Choo, Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.11-17
    • /
    • 2021
  • Software-defined networking provides a programmable and flexible way to manage the network by separating the control plane from data plane. However, the limited switch memory restricts the number of flow entries in the flow table used to forward packets. This leads to flow table overflow and flow entry reinstallation, which severely degrade the network performance. Therefore, this paper proposes a comprehensive policy for timely eviction of inactive flow entries to optimally maintain flow tables usage. In particular, statistics of user datagram protocol flow entries are periodically sampled to enable the inactive entries to be evicted early. Through traffic-based experiments, we found that the proposed system reduces the number of overflow occurrences and flow entries reinstallation compared to the random and FIFO policies.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

DBSCAN-based Energy-Efficient Algorithm for Base Station Mode Control (에너지 효율성 향상을 위한 DBSCAN 기반 기지국 모드 제어 알고리즘)

  • Lee, Howon;Lee, Wonseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1644-1649
    • /
    • 2019
  • With the rapid development of mobile communication systems, various mobile convergence services are appearing and data traffic is exploding accordingly. Because the number of base stations to support these surging devices is also increasing, from a network provider's point of view, reducing energy consumption through these mobile communication networks is one of the most important issues. Therefore, in this paper, we apply the DBSCAN (density-based spatial clustering of applications with noise) algorithm, one of the representative user-density based clustering algorithms, in order to extract the dense area with user density and apply the thinning process to each extracted sub-network to efficiently control the mode of the base stations. Extensive simulations show that the proposed algorithm has better performance results than the conventional algorithms with respect to area throughput and energy efficiency.

Real-time wireless Audio/video Transmission Technique for Handheld Devices (휴대용 단말기를 위한 실시간 무선 영상 음성 전송 기술)

  • Yoon, Kyung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.111-117
    • /
    • 2009
  • Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.