• Title/Summary/Keyword: Traffic Overload

Search Result 121, Processing Time 0.027 seconds

Overload Detection and Control for Switching Systems using Fuzzy Rules

  • Rhee, Chung-Hoon;Rhee, Byung-Ho;Cho, Sung-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.4E
    • /
    • pp.28-34
    • /
    • 1998
  • In most switching system, the processing unit is designed to work efficiently even at relatively high loads, but when the offered traffic exceeds a particular level, the rate of completed calls can fall drastically. A single call handled by the switching system consists of a sequence of events or messages that has to be processed by the control unit. The control unit is not only incapable of handling all of the offered calls, but also its call handling capability can drop as the offered load increases. The real time available for call processing is a critical resource that requires careful management. Therefore, the overloading of this resource must be detected by a subscriber in the from of a dial tone delay or an uncompleted call which is either blocked or mishandled. The subscriber may respond by either dialing prematurely or by re-attempting a call. This action can further escalate the processors load, which is spent for uncompleted calls. Unless a proper control is used, the switching system can finally break down. In this paper, we paper, we propose a fuzzy overload detection and control method for switching systems, which can by generating fuzzy rules via fuzzy aggregation networks. Simulation results involving a switching system is given.

  • PDF

Efficient Data Transmission Scheme with Data Fusion inside a Smart Vessel (Data Fusion 기술을 활용한 스마트선박 내 효율적 데이터 전송 방안)

  • Kim, Yeon-Geun;Lee, Seong Ro;Jeong, Min-A;Kim, Beom-Mu;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1146-1150
    • /
    • 2014
  • Recently, there has been interests in smart vessel technology, and it needs to consider an intelligent control system for efficient vessel manangement. In a smart vessel, however, it can cause a network overload due to a number of data transmission from a variety of sensor nodes and bridge nodes. In this letter, we propose an data transmission scheme with data fusion to reduce the number of traffic from the sensor nodes. Hence it can decrease network overload for intelligent vessel management.

Investigating the Effects of Job Stress on the Distraction and Risky Driving Behaviors of Food Delivery Motorcycle Riders

  • Ching-Fu Chen
    • Safety and Health at Work
    • /
    • v.14 no.2
    • /
    • pp.207-214
    • /
    • 2023
  • Background: Occupational safety issues related to food delivery riders emerge with evidence of an increase in associated traffic accidents and injuries along with the rapid growth of the online food delivery business. This paper focuses on food delivery riders' job stress and investigates its relationships with both antecedents and risky riding outcomes. Method: Survey data were collected from 279 Taiwanese food delivery motorcycle riders and analyzed using hierarchical regression analysis. Results: The results show that job overload and time pressure positively impact riders' job stress, while self-efficacy slightly reduces job stress. Job stress positively leads to risky driving behavior and distraction. In addition, time pressure can strengthen the impact of job overload on job stress. Riders' risky riding attitude can also strengthen the impacts of job stress on risky riding behaviors and distraction. Conclusion: This paper advances the literature on online food delivery as well as the occupational safety improvement of food delivery riders. Specifically, this study provides insights into the job stress of food delivery motorcycle riders and the effects of job characteristics and risky behavioral consequences.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

Extended Service Filtering Technique for Overload Control of Televoting Service Required for the Specialized Resources of Intelligent Peripheral (지능형 정보제공 시스템의 특수 지원을 이용하여 제공되는 전화투표 서비스의 과부하 제어를 위한 확장된 서비스 필터링 기법)

  • Jeong, Gwang-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1727-1738
    • /
    • 1996
  • This paper proposes a extended service filtering technique to solve overload control problems inService Con-trol Poin(SCP) due to Televoting (VOT) services with heavy traffic characteristics. Also, this paper compares this new technique with existing IN overload control lechniques, and calculate steady state call blocking probabilities in In under overload conditions. The proposed technique considers SCP overload and IN CS-1services such as VOT service that need to use the specialized resources of IP. This technique uses first an activating step which SCP sends service filtering request to SSP and IP for the start of service filtering. Then, in the filtering step SSP sendas filtering results to SCP periodically or each N-calls.Also,when filtering time-out timer expired or call counter value exceeded maximum number of calls,SSP stops service filtering,and sends ser-vice filteing response to SCP in the deactivating step. The application of this techique to VOT service defined in IN CS-1 service is investigated and analyzed by using an analytical VOT service model.In order to apply this technique to VOT service, this paper also discusses VOT service and the corresponding N architecture including Service Switching Point(SSP),SCP and IP. Then this paper also constructs an analytical VOT service model,and calculates SCP and SSP/IP(circuit)call blocking probablities.With the application of this new technique,this paper shows good performance enhancements in SCP call blocking probability.

  • PDF

A Study on Real-time Message Analysis for AIS VDL Load Management (AIS 통신부하 관리를 위한 실시간 메시지 분석에 관한 연구)

  • Lee, Sang-Jae;Jeong, Jung-Sik;Kim, Min-Yeop;Park, Gyei-Kark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.3
    • /
    • pp.256-261
    • /
    • 2013
  • The AIS(Automatic Identification System) has been widely used for ship safety at sea over the last 10 years. The AIS traffic load at VDL(VHF Data Link) has been continuously increased. As the traffic load at VDL increases, the quality of AIS service may be deteriorated. In the previous research, the AIS traffic has been analyzed in the major ports of Korea, and its problem due to traffic overload has been suggested. However, no solutions has been given so far. In this paper, the method of autimatically controlling the VDL traffic at AIS base station is represented.

Implementation of a Real-time Network Traffic Management System (실시간 네트워크 트래픽 매니지먼트 시스템 구현)

  • Yong, Ki-Tak;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.106-113
    • /
    • 2008
  • In this paper, we will design and substantiate the Network Traffic management system(MAGI), which makes up for the weak points of existing Network Monitoring tools and realize dynamic firewall; MRTG, ntop, ethereal, and nettest. The Network Traffic Monitoring and analyzing system differs from existing software-based Network Monitoring tools as MAGI is a combination of software and hardware. Not only the innovative web user interface applied to the software makes analyzing traffic simpler, but it also has a function for monitoring and managing conditions of the hardware. The web user interface implemented with PHP and MySQL helps to use the database and as a result, analyzing data becomes easier. On the hardware part, the appliance is configured as a bridge in a network. As a result, managed system does not have overload.

Ethernet Topology Transformation and Throughput Analysis (이더넷 위상 변환과 성능 분석)

  • 권정국;백의현;이동길;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.77-85
    • /
    • 2003
  • The conversion into a new Local Area Network (LAN) environment without clear analysis of the problems with the conventional LAN environment nay bring about some improvement of performance, but in general, the result would not be as good as expected. Besides, in case new traffic or application programs are added In the near future, traffic overload similar to the past may incur. Therefore, the conversion into a new LAN environment should not only relieve the problems with the conventional environment but also be able to cope with future expansion of the network flexibly. In the present paper, in view of the above, the problems with protocols and traffic that may occur in the Bus-structured 10/100 Mbps shared Ethernet that has been widely used by many institutions are reviewed, and as a case study whether such conversion into a new LAN environment in order to increase the efficiency in the operation, management, and utilization of the network would be proper for the actual operational environment is implemented, and the results are analyzed.

An Enhanced Reverse-link Traffic Control and its Performance Analysis in cdma2000 1xEV-DO Systems (cdma2000 1xEV-DO 시스템에서 개선된 역방향 트래픽 제어와 성능 분석)

  • Yeo, Woon-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9A
    • /
    • pp.891-899
    • /
    • 2008
  • The cdma2000 1xEV-DO system controls the data rates of mobile terminals based on a binary overload indicator from the base station and a simple probabilistic model. However, this traffic control scheme has difficulty in controlling the reverse-link traffic load effectively and in guaranteeing a stable operation of the reverse link because each mobile terminal determines the next data rate autonomously. This paper proposes a new trafRc control scheme to improve the system stability, and analyzes the proposed scheme by modeling it as a discrete-time Markov process. The numerical results show that the maximum data rate of the proposed scheme is much higher than that of the conventional one. Moreover, the proposed scheme does not modify the standard physical channel structure, so it is compatible to the existing 1xEV-DO system.

A Study on the radio protocol for the Maritime Data Communications in HF band (HF대 해상 데이터통신을 위한 무선프로토콜 연구)

  • Jin, Hyong-Du;Im, Mu-Heyk;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.1003-1007
    • /
    • 2008
  • Even if the HF band SSB maritime data communications service company has operating a target Of the member ship, because of unprepared. the radio link protocol that has been question accordance with increase of calling redundancy at traffic overload. Although free signal has operating for traffic of the next ship, but cannot avoid the collision in mutual calling ships. In feature of HF band SSB channel that radio link must be established by automatical, stability and adaptive at over load. In this factor, this paper is studied the new radio protocol by 3 step sequency driving of free access, group free access and polling access.

  • PDF