• Title/Summary/Keyword: Traffic network model

Search Result 920, Processing Time 0.029 seconds

A Web-based QoS-guaranteed Traffic Control system (웹 기반의 QoS 보장형 트래픽 제어 시스템)

  • 이명섭;신경철;류명춘;박찬현
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.45-48
    • /
    • 2002
  • This paper presents a QoS-guaranteed traffic control system which supports QoS of realtime packet transmission for the multimedia communication. The traffic control system presented in this paper applies the integrated service model and provides QoS o(packet transmission by means of determining the packet transmission rate with the policy of network manager and the optimal resource allocation according to the end-to-end traffic load. It also provides QoS for the realtime packet transmission through the AWF2Q+ Scheduling algorithm and per-class queuing method.

  • PDF

The method for VOD service traffic modeling (VOD(Video On Demand)서비스 Traffic 모델링 방안)

  • Chang, Won-Pil
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.109-112
    • /
    • 2005
  • In this thesis, we recommend the method for VOD service traffic modeling. By the analysis of service traffic, we verify that the process of VOD service is the POISSON process. So it is important to determine the probability of the user's existence in the system. But, because it is difficult to measure, we recommend proper using of arrival rate and service rate.

  • PDF

A Study on the Methodology for Expanding Collected Sampling Data with the RFID System and Applying in National Road Traffic Volume Survey (RFID 표본데이터의 전수화방법 및 '국가도로교통량조사'에 활용방안 연구)

  • Park, Bum-Jin;Lee, Seung-Hun;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.29-37
    • /
    • 2008
  • In this parer, we purpose for applying the RFID(Radio Frequency IDentification) system in National Road Traffic Volume Survey. Because there is limitation for shipping RFID Tag on every car, we firstly defined Expansion (process of making the number of all cars which passed survey point from sampling data) and determined the best methodology among 3 methodologies (Time factor Model, Fuzzy Model, Artificial Neural Network). As a result of analysis, Time Factor Model was chosen as the best methodology for Expansion. Also, we analyzed to find an application of the RFID system in National Road Traffic Volume Survey and obtained a possibility applying it. It is expected that if the RFID system is used in Traffic Volume Survey, the survey cost is saved than before.

  • PDF

Day-to-day dynamics model based on consistent travel time perception behavior (운전자의 일관성 있는 통행시간 인지 행태에 기반한 일별 동적 모형)

  • Yang, In-Chul;Chung, Youn-Shik
    • International Journal of Highway Engineering
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2011
  • This study develops a day-to-day dynamics modeling framework, incorporating a consistent drivers' travel time perception behavior and traffic information provision. Descriptive traffic information is updated and provided to the subscribers making a final decision on route choice. Nonsubscribers(not equipped any information devices) are assumed to obtain daily traffic information from their experience or friends or other public agencies. Drivers' route choice behavior is modeled based on boundedly-rational behavior rules. A microscopic traffic simulation model is adopted to evaluate the network system performance. Numerical experiments on a real world network have demonstrated the convergent property of the proposed model and the effectiveness of the consistent perception model.

A Study on Traffic Anomaly Detection Scheme Based Time Series Model (시계열 모델 기반 트래픽 이상 징후 탐지 기법에 관한 연구)

  • Cho, Kang-Hong;Lee, Do-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.304-309
    • /
    • 2008
  • This paper propose the traffic anomaly detection scheme based time series model. We apply ARIMA prediction model to this scheme and transform the value of the abnormal symptom into the probability value to maximize the traffic anomaly symptom detection. For this, we have evaluated the abnormal detection performance for the proposed model using total traffic and web traffic included the attack traffic. We will expect to have an great effect if this scheme is included in some network based intrusion detection system.

Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

  • Islam, Md. Syeful;Rahman, Md. Rezaur;Roy, Anupam;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.679-690
    • /
    • 2011
  • In this paper we consider a local area network (LAN) of dual mode service where one is a token bus and the other is a carrier sense multiple access with a collision detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of a dual mode LAN for finite length queue M/G/1(m) traffic. Here, the offered traffic of the LAN is taken to be the equivalent carried traffic of a one-millisecond delay. The concept of a tabular solution for two-dimensional Poisson's traffic of circuit switching is adapted here to find the cell dropping probability of the dual mode packet service. Although the work is done for the traffic of similar bandwidth, it can be extended for the case of a dissimilar bandwidth of a circuit switched network.

Neuro-Fuzzy control of converging vehicles for automated transportation systems (뉴로퍼지를 이용한 자율운송시스템의 차량합류제어)

  • Ryu, Se-Hui;Park, Jang-Hyeon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.8
    • /
    • pp.907-913
    • /
    • 1999
  • For an automated transportation system like PRT(Personal Rapid Transit) system or IVHS, an efficient vehicle-merging algorithm is required for smooth operation of the network. For management of merging, collision avoidance between vehicles, ride comfort, and the effect on traffic should be considered. This paper proposes an unmanned vehicle-merging algorithm that consists of two procedures. First, a longitudinal control algorithm is designed to keep a safe headway between vehicles in a single lane. Secondly, 'vacant slot and ghost vehicle' concept is introduced and a decision algorithm is designed to determine the sequence of vehicles entering a converging section considering energy consumption, ride comfort, and total traffic flow. The sequencing algorithm is based on fuzzy rules and the membership functions are determined first by an intuitive method and then trained by a learning method using a neural network. The vehicle-merging algorithm is shown to be effective through simulations based on a PRT model.

  • PDF

Multiaccess Scheme with Implicit Reservation for VSAT Data commmunication (VSAT 데이터 통신을 위한 묵시적 예약 방식의 다중접속 기법)

  • 이창건;최양희;정선종;김종상
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.7
    • /
    • pp.1-16
    • /
    • 1994
  • In this paper, we propose a new multiple access scheme for VSAT(Very Small Aperture Terminal) data communications. The proposed scheme has better performance in terms of delay throughput than Controlled Multiaccess Scheme which has excellent performance. The proposed scheme use the spare reservation method, adaptation method to offered load, and fixed bandwidth reservation method. In this paper, we analyze the performance using simple queueing model and present the simulation results. When network traffic is very low, the new scheme and the controlled multiaccess scheme have almost the same access delay characteristic. As the network load becomes higher, the new scheme's access delay gain becomes larger. Futhermore, even when the network traffic is very high it is possible to access satellite link within the delay similar to one round-trip delay. In addition to access delay performance enhancement, the new scheme has facility that supports fixed bandwidth reservation. So it shows more enhanced performance in the environment that stream traffic is dominant such as in VSAT communication environment.

  • PDF

Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

  • Saha, Tonmoy;Shufean, Md. Abu;Alam, Mahbubul;Islam, Md. Imdadul
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.653-678
    • /
    • 2011
  • WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical technique of the two dimensional Markov chain is used to obtain the trajectory of the congestion of the network as a function of a traffic parameter. Finally, a two state phase dependent arrival process is considered to evaluate probability states. The entire analysis is kept independent of modulation and coding schemes.

Traffic Flow Control of B-NT for Prevention of Congestion in B-ISDN UNI (B-ISDN UNI에서 폭주를 예방하기 위한 B-NT의 트래픽 흐름 제어)

  • 이숭희;최흥문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.1085-1094
    • /
    • 1994
  • We propose a traffic flow control scheme of B-NT with temporary cell buffering and selective cell discarding to prevent congestion state of the network nodes in B-ISDN systems to reduce or suppress output cell strams towards T interface. We define the states of the network nodes as normal, pre-congestion, and congestion. In a pre-congestion state, the loss-sensitive traffic is temporarily buffered to slow down the rate of the output traffic streams. In a congestion state, the delay-sensitive traffic is selectively discarded to suppress the output traffic streams as possible in addition to the cell buffering. We model the input cell streams and the states of the network nodes with Interrupted Bernoulli Process and 3-state Markov chain to analyze the performance of the proposed scheme in the B-NT system. The appropriate size of the cell buffer is explored by means of simulation and the influence on the performance of the proposed scheme by the network node state is discussed. As results, more than 2,00 cells of buffer size is needed for the control of medium of lower than the medium, degree of congestion occurrence in the network node while the control of high degree of congestion occurrence is nearly impossible.

  • PDF