• Title/Summary/Keyword: Traffic Overload

Search Result 121, Processing Time 0.022 seconds

DISCRETE-TIME ANALYSIS OF OVERLOAD CONTROL FOR BURSTY TRAFFIC

  • Choi, Doo-Il
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.1
    • /
    • pp.285-295
    • /
    • 2001
  • We consider a queueing system under overload control to support bursty traffic. The queueing system under overload control is modelled by MMBP/D1/K queue with two thresholds on buffer. Arrival of customer is assumed to be a Markov-modulated Bernoulli process (MMBP) by considering burstiness of traffic. Analysis is done in discrete-time case. Using the generating function method, we obtain the stationary queue length distribution. Finally, the loss probability and the waiting time distribution of a customer are given.

Multicast Routing Strategy Based on Game Traffic Overload (게임 트래픽 부하에 따른 멀티캐스트 라우팅 전략)

  • Lee Chang-Jo;Lee Kwang-Jae
    • Journal of Game and Entertainment
    • /
    • v.2 no.1
    • /
    • pp.8-16
    • /
    • 2006
  • The development of multicast communication services in the Internet is expected to lead a stable packet transfer even though On-Line Games generate heavy traffic. The Core Based Tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibits two major deficiencies traffic concentration or poor core placement problem. Thus, measuring the bottleneck link bandwidth along a path is important to understand the performance of multicast. We propose a method in which the core router's state is classified into SS(Steady State), NS(Normal State) and BS(Bottleneck State) according to the estimated link speed rate, and also the changeover of multicast routing scheme for traffic overload. In addition, we introduce Anycast routing tree, an efficient architecture for constructing shard multicast trees.

  • PDF

A STUDY ON THE OVERLOAD CONTROL STRATEGY OF NO.1A ESS (No.1A 전자교환기의 과부하 제어에 관한 연구)

  • Koo, Myoung-Wan;Kim, Han-Ho;Hong, Kee-Soo
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.969-973
    • /
    • 1987
  • Ess provides the means to detect, control, and alleviate various system overload conditions. System overload occurs when excessive demands are made on any of the three basic system resources which are hardware, software, and real time. This paper describes the overload control strategy used in No.1A ESS and shows the system status according to traffic load.

  • PDF

Design and Implementation of DHCP with Minimized Broadcasting Traffic (브로드캐스팅 트래픽을 최소화한 DHCP의 설계 및 구현)

  • An, Seong-Jin;Jeong, Jin-Uk;Lee, Sang-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.709-719
    • /
    • 1996
  • DHCP(Dynamic Host Configuration Protocol)is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. But because this protocol uses broadcasting for message exchange, it causes heavy traffic and overload on the network. By avoiding unnecessary broadcasting and using a simple and efficient implementation model, we can reduce such heavy traffic and overload. We have studied on characteristics of the broadcasting the traffic caused by DHCP, and implement the model which can reduce traffic by improving algorithm and unicasting messages.

  • PDF

NetDraino: Saving Network Resources via Selective Packet Drops

  • Lee, Jin-Kuk;Shin, Kang-G.
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.1
    • /
    • pp.31-55
    • /
    • 2007
  • Contemporary end-servers and network-routers rely on traffic shaping to deal with server overload and network congestion. Although such traffic shaping provides a means to mitigate the effects of server overload and network congestion, the lack of cooperation between end-servers and network-routers results in waste of network resources. To remedy this problem, we design, implement, and evaluate NetDraino, a novel mechanism that extends the existing queue-management schemes at routers to exploit the link congestion information at downstream end-servers. Specifically, NetDraino distributes the servers' traffic-shaping rules to the congested routers. The routers can then selectively discard those packets-as early as possible-that overloaded downstream servers will eventually drop, thus saving network resources for forwarding in-transit packets destined for non-overloaded servers. The functionality necessary for servers to distribute these filtering rules to routers is implemented within the Linux iptables and iproute2 architectures. Both of our simulation and experimentation results show that NetDraino significantly improves the overall network throughput with minimal overhead.

Determination of Multicast Routing Scheme for Traffic Overload in On-Line Game (온라인 게임에서 트래픽 부하 상태에 따른 멀티캐스트 라우팅 방식의 결정)

  • Lee, Kwang-Jae;Doo, Gil-Soo;Seol, Nam-O
    • Journal of Korea Game Society
    • /
    • v.2 no.1
    • /
    • pp.30-35
    • /
    • 2002
  • The deployment of multicast communication services in the Internet is expected to lead a stable packet transfer even in heavy traffic as in On-Line Game environment. The Core Based Tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibit two major deficiencies such as traffic concentration or poor core placement problem. So, measuring the bottleneck link bandwidth along a path is important for understanding the performance of multicast. We propose not only a definition of CBT's core link state that Steady-State(SS), Normal-State(NS) and Bottleneck State(BS) according to the estimation link speed rate, but also the changeover of multicast routing scheme for traffic overload. In addition, we introduce anycast routing tree, a efficient architecture for construct shard multicast trees.

  • PDF

Performance Analysis of the Multiplexer for Shaped Video Traffic Sources (쉐이퍼를 사용한 비디오 트래픽원의 다중화기 성능 분석)

  • Lee, S.C.;Hong, J.W.;Kim, C.S.
    • IE interfaces
    • /
    • v.18 no.4
    • /
    • pp.494-503
    • /
    • 2005
  • This paper considers the problem of performance analysis for the multiplexer, when homogeneous periodic on-off sources are statistically multiplexed. Periodic on-off source model is defined that on-period and off-period are repeated by once in a deterministic periodic time and in on-period, cell arrives with deterministic time interval. In order to reflect periodicity of source model, we consider two multiplexing situation, such as random multiplexing and synchronized multiplexing. In both case, we obtain the overload-period distribution in the multiplexer, and an approximate method using the overload period distribution is suggested for obtaining the CLP(Cell Loss Probability) in the buffer of the multiplexer. A numerical example using MPEG-I real traffic samples and the results are also presented.

Determination of Multicast Routing Scheme for Traffic Overload in network system (네트워크 시스템에서 트래픽 부하에 따른 멀티캣트 라우팅 방식)

  • Seul, Nam-O
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2936-2938
    • /
    • 2005
  • The deployment of multicast communication services in the internet is expected to lead a stable packet transfer even in heavy traffic as in network system environment. The core based tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibit two major deficiencies such as traffic concentration or poor core placement problem. so, measuring the bottleneck link bandwidth along a path is important for understanding th performance of multicast. We propose not only a definition of CBT's core link state that Steady-State, Normal-State and Bottleneck State according to the estimation link speed rate, but also the changeover of multicast routing scheme for traffic overload. In addition, we introduce anycast routing tree, a efficient architecture for construst shard multicast trees.

  • PDF

A study on the overload control of the ATM switching system (ATM 교환기 과부하제어 연구)

  • 기장근;최진규;김영선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.4
    • /
    • pp.952-960
    • /
    • 1996
  • In this paper, a new overload control scheme is proposed for a control system in ATM switching system. The proposed control scheme includes a counter that conunts the number of accepted calls and is decreased at cach D time interval. In overload condition of call processor, the control scheme detects over load condition when the counter value reaches a certain threshold value. Under overload condition, processor utilization is measured and the value of the D is updataed according to the difference between measured processor utilization and target utilization. A new call is accepted accepted only if the value of the counter is less than the threshold value. In overflow condition of cell traffic, accept probability of new call is reduced exponetially according to the elapsed time. The results of simulation show that the proposed overload contorl scheme maintains the target utilization very well under the various processor overload conditions and reduces the cell loss probability under the cell overflow conditions.

  • PDF

An Extended Service Filtering Technique for Mass Calling-Type Services Using Intelligent Peripheral in an SCP-Bound Network

  • Jeong, Kwang-Jae;Kim, Tae-Il;Choi, Go-Bong
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.115-132
    • /
    • 1998
  • This paper proposes an extended service filtering technique to prevent overload in service control point (SCP) due to televoting (VOT) or mass calling (MAS) services with the heavy traffic characteristics. Also, this paper compares this extended technique with the existing overload control techniques, and calculates steady state call blocking probabilities in intelligent network (IN) under overload conditions. The proposed technique considers SCP overload and IN Capability Set (CS)-1 services (such as VOT or MAS service) that have to use the specialized resources of intelligent peripheral (IP). This technique uses first an activating step in which SCP requests service filtering to service switching point (SSP). Then, in the filtering step, SSP sends filtering results to SCP periodically or each N-calls. Also, when filtering time-out expires, SSP stops service filtering, and sends service filtering response to SCP in the deactivating step. This paper applies this technique to VOT/MAS service, and calculates SCP and SSP-IP (circuit) call blocking probabilities by using an analytical VOT/MAS service model. With the modeling and analyzing of this new technique, it shows that this technique reduces the traffic flow into SCP from SSP and IP prominently.

  • PDF