• Title/Summary/Keyword: Offered load

Search Result 123, Processing Time 0.025 seconds

Dynamic timer-controlled algorithm and its performance analysis on the token bus network (토큰 버스 네트워크의 동적 타이머 제어방식 및 성능해석에 관한 연구)

  • 정범진;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.55-60
    • /
    • 1992
  • The IEEE 802.4 priority mechanism can be used to handle multiple data access classes of traffic. Several timers are used to realize the priority mechanism. The performance and stability of a token bus network depend on the assignment of such timers. In this peper, we present a dynamic timer assignment algorithm for the token passing bus network. The presented algorithm has simple structure for real-time applications and adaptively controls the set of initial timer values according to the offered traffic load. The assignment of the set of timers becomes easy due to the presented algorithm. Based on the iterative algorithm, some solutions such as mean waiting time are derived.

  • PDF

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

A Study on 3-D Standard Posture of Korean Adults for VDT Task

  • Choi, Yong-Hyuk;Park, Jong-Sik;Kim, Tae-Gu;Lee, Seong-Beom
    • International Journal of Safety
    • /
    • v.7 no.1
    • /
    • pp.35-38
    • /
    • 2008
  • The purpose of this study is to extract typical body shape of Korean VDT workers based on the three-dimensional Korean shape data and recommendation supported by Korea Occupational Safety & Health Agency during VDT task. Desirable desk heights and chair heights for the selection of the VDT working posture is proposed by analyzing moment, compression and joint shear for lumbar and spine of Korean adult(male and female). The desirable heights for desk and chair can be selected by the least load method during VDT tasks. In the current work the figures of Korean 50th percentile offered by CATIA-HUMAN are used as the average body type of the grown-ups and this research is accomplished with the recommended size of all working attitude such as the height of a monitor except for the height of desk and chair and the degree of watching the monitor.

Study on the Measurement-Based Packet Loss Rates Assuring for End-to-End Delay-Constrained Traffic Flow (지연 제한 트래픽 흐름에 대한 측정 기반 패킷 손실률 보장에 관한 연구)

  • Kim, Taejoon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1030-1037
    • /
    • 2017
  • Traffic flows of real-time multimedia services such as Internet phone and IPTV are bounded on the end-to-end delay. Packets violating their delay limits will be dropped at a router because of not useful anymore. Service providers promise the quality of their providing services in terms of SLA(Service Level Agreement), and they, especially, have to guarantee the packet loss rates listed in the SLA. This paper is about a method to guarantee the required packet loss rate of each traffic flow keeping the high network resource utilization as well. In details, it assures the required loss rate by adjusting adaptively the timestamps of packets of the flow according to the difference between the required and measured loss rates in the lossy Weighted Fair Queuing(WFQ) scheduler. The proposed method is expected to be highly applicable because of assuring the packet loss rates regardless of the fluctuations of offered traffic load in terms of quality of services and statistical characteristics.

Packet Delay and Energy Consumption of S-MAC Protocol in Single-Hop Wireless Sensor Network (단일 홉 무선 센서 네트워크에서 S-MAC 프로토콜의 패킷 지연 및 에너지 소비)

  • Sung, Seok-Jin;Woo, Seok;Kim, Chung-San;Kim, Ki-Seon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.53-54
    • /
    • 2006
  • In this paper, we analytically evaluate packet delay and energy consumption of S-MAC protocol with a modified Markov chain model. Although some models, based on IEEE 802.11 MAC protocol, to analyze the S-MAC protocol in wireless sensor network (WSN) have been proposed, they fail to consider the differences in architecture between the S-MAC and the 802.11 MAC. Therefore, by reflecting the significant features in the S-MAC function, we model the operation of S-MAC protocol, and derive its packet delay and energy consumption in single-hop WSN. Numerical results show the delay and the dissipated energy at various duty cycle values according to offered load, where a practical mote is used.

  • PDF

A Numerical Study on The Three Point Bending Behavior of Aluminum Foam Filled Stainless Steel Tube (알루미늄 폼으로 충진된 스테인레스 관의 3 점 굽힘 특성에 관한 수치적 연구)

  • Ha, San;Kim, Am-Kee;Cheon, Seong-Sik;Lee, Chang-Hun;Lee, Hyo-Jin;Cho, Seong-Seock
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.388-393
    • /
    • 2004
  • A comprehensive numerical study on the three point bending behavior of Aluminum foam-filled stainless steel tube has been performed. Aluminium alloy foams with various densities were produced and their mechanical properites were evaluated. Finite element(FE) analysis of three point bending test was performed to evaluate bending behavior of foam filled cylindrical structures. Results showed that foam filling offered remarkable increase of bending resistance and enhanced the crashworthiness of the structure. It turned out to prevent the inward fold formation at the compression flange, resulted into the multiple propagating folds and increased the load carrying capacity.

  • PDF

Explicit Formulae for Characteristics of Finite-Capacity M/D/1 Queues

  • Seo, Dong-Won
    • ETRI Journal
    • /
    • v.36 no.4
    • /
    • pp.609-616
    • /
    • 2014
  • Even though many computational methods (recursive formulae) for blocking probabilities in finite-capacity M/D/1 queues have already been produced, these are forms of transforms or are limited to single-node queues. Using a distinctly different approach from the usual queueing theory, this study introduces explicit (transform-free) formulae for a blocking probability, a stationary probability, and mean sojourn time under either production or communication blocking policy. Additionally, the smallest buffer capacity subject to a given blocking probability can be determined numerically from these formulae. With proper selection of the overall offered load ${\rho}$, the approach described herein can be applicable to more general queues from a computational point of view if the explicit expressions of random vector $D_n$ are available.

A Performance Analysis on the Scope/Filter of OSI Network Management Protocol (표준망관리 프로토콜의 Scope/Filter에 대한 성능분석)

  • 변옥환;진용옥
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.29A no.7
    • /
    • pp.10-18
    • /
    • 1992
  • In this paper, a simulation model for scope and filter parameters in CMIS/CMIP, OSI management protocol, has been discussed and the suitable scope type was represented by analyzing optimal polling time in network management system, queue size and response time. Scope and filter parameters in MGet, M-Set, M-Action, and =M-Delete services provide a scheme to select some managed objects, and the results are largely varied according to a scope type requested and the outcome of filtering. It has been simulated each scope type and all scope type mixed in a network by varying the offered load and a polling time. On the same time, the response time, queue size of the managing system and a delay time have been measured. As a results, the suitable scope type and polling time enhancing the network performance on the OSI network management is proposed.

  • PDF

A Retransmission Power Adjustment Scheme for Performance Enhancement in DS/SSMA ALOHA with Packet Combining

  • Seo Hanbyul;Park Seongyong;Lee Byeong Gi
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.36-44
    • /
    • 2005
  • In this paper, we present a retransmission power adjustment (RPA) scheme for DS/SSMA ALOHA packet radio systems with packet combining. In the proposed RPA scheme, retransmission power is adjusted in such a way that the erroneously-received packet can be recovered with a minimized interference to other user packets. We analyze the performance of the system with the RPA by employing the equilibrium point analysis (EPA), and confirm that the results obtained from the EPA are very close to the simulation results in low power cases. Simulation results demonstrate that the RPA scheme brings forth performance gain in the throughput and the average delay while saving a significant amount of transmission power. We also investigate the stability of the system from the EPA results, and conclude that the system becomes stable as the offered load increases or the level of retransmission power decreases.

Optimal Offset-Time Decision for QoS in Optical Burst Switching Networks

  • Kim, Sung-Chang;Choi, Jin-Seek;Yoon, Bin-Yeong;Kang, Min-Ho
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.312-318
    • /
    • 2007
  • In this paper, we propose the optimal offset-time decision (OOD) algorithm which can effectively reduce the pre-transmission delay compared to the perfect isolation model, and can also be extended to general n priority classes while the target loss probability of each class is guaranteed for the variable offered load. In order to drive the OOD algorithm, we first analyze the loss probability of each priority class through class aggregation and iteration method; the analytic results obtained through the proposed algorithm are then validated with results garnered from extensive simulation tests.