• Title/Summary/Keyword: bursty data traffic

Search Result 30, Processing Time 0.024 seconds

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Effective Admission Policy for Multimedia Traffic Connections over Satellite DVB-RCS Network

  • Pace, Pasquale;Aloi, Gianluca
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.593-606
    • /
    • 2006
  • Thanks to the great possibilities of providing different types of telecommunication traffic to a large geographical area, satellite networks are expected to be an essential component of the next-generation internet. As a result, issues concerning the designing and testing of efficient connection-admission-control (CAC) strategies in order to increase the quality of service (QoS) for multimedia traffic sources, are attractive and at the cutting edge of research. This paper investigates the potential strengths of a generic digital-video-broadcasting return-channel-via-satellite (DVB-RCS) system architecture, proposing a new CAC algorithm with the aim of efficiently managing real-time multimedia video sources, both with constant and high variable data rate transmission; moreover, the proposed admission strategy is compared with a well-known iterative CAC mainly designed for the managing of real-time bursty traffic sources in order to demonstrate that the new algorithm is also well suited for those traffic sources. Performance analysis shows that, both algorithms guarantee the agreed QoS to real-time bursty connections that are more sensitive to delay jitter; however, our proposed algorithm can also manage interactive real-time multimedia traffic sources in high load and mixed traffic conditions.

  • PDF

Mathematical Analysis of the Parallel Packet Switch with a Sliding Window Scheme

  • Liu, Chia-Lung;Wu, Chin-Chi;Lin, Woei
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.330-341
    • /
    • 2007
  • This work analyzes the performance of the parallel packet switch (PPS) with a sliding window (SW) method. The PPS involves numerous packet switches that operate independently and in parallel. The conventional PPS dispatch algorithm adopts a round robin (RR) method. The class of PPS is characterized by deployment of parallel low-speed switches whose all memory buffers run more slowly than the external line rate. In this work, a novel SW packet switching method for PPS, called SW-PPS, is proposed. The SW-PPS employs memory space more effectively than the existing PPS using RR algorithm. Under identical Bernoulli and bursty data traffic, the SW-PPS provided significantly improved performance when compared to PPS with RR method. Moreover, this investigation presents a novel mathematical analytical model to evaluate the performance of the PPS using RR and SW method. Under various operating conditions, our proposed model and analysis successfully exhibit these performance characteristics including throughput, cell delay, and cell drop rate.

Traffic Optimized FEC Control Algorithm for Multimedia Streaming Applications.

  • Magzumov, Alexander;Jang, Wonkap
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.477-480
    • /
    • 2003
  • Packet losses in the Internet can dramatically degrade quality of multimedia streams. Forward Error Correction (FEC) is one of the best methods that can protect data from packet erasures by means of sending additional redundant information. Proposed control algorithm provides the possibility of receiving real-time multimedia streams of given quality wifth minimal traffic overhead. The traffic optimization is reached by adjusting packet size as well as block code parameters. Calculations and simulation results show that for non-bursty network conditions traffic optimization can lead to more than 50% bandwidth reduction.

  • PDF

Performance Evaluation of Signaling and Data Traffic in UMTS Packet Core Networks (UMTS 패킷 코아 망에서 신호 및 데이터 트래픽 성능 분석)

  • Kim, Byung-Chul;Lee, Jae-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.4
    • /
    • pp.25-34
    • /
    • 2004
  • UMTS network, evolved from GSM, includes packet core network that consists of SGSNS and GGSNs. Service providers should consider subscriber mobility, location registration, and subscriber distribution when designing packet core networks and network elements. Since one of the major traffic sources for IMT-2000 will be data which has bursty characteristics, new design guidelines for dimensioning of SGSN and GGSN should be proposed under various constraints of system parameters. In this paper, we first evaluate the performance of signaling traffic for packet call subscribers. After that, we also obtain the impact of bursty data traffic on the SGSN and GGSN by simulation, and suggest new dimensioning guidelines for packet core network of UMTS under various environments.

An implementation of the dynamic rate leaky bucket algorithm combined with a neural network based prediction (신경회로망 예측기법을 결합한 Dynamic Rate Leaky Bucket 알고리즘의 구현)

  • 이두헌;신요안;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.259-267
    • /
    • 1997
  • The advent of B-ISDN using ATM(asynchronous transfer mode) made possible a variety of new multimedia services, however it also created a problem of congestion control due to bursty nature of various traffic sources. To tackle this problem, UPC/NPC(user parameter control/network parameter control) have been actively studied and DRLB(dynamic rate leaky bucket) algorithm, in which the token generation rate is changed according to states of data source andbuffer occupancy, is a good example of the UPC/NPC. However, the DRLB algorithm has drawbacks of low efficiency and difficult real-time implementation for bursty traffic sources because the determination of token generation rate in the algorithm is based on the present state of network. In this paper, we propose a more plastic and effective congestion control algorithm by combining the DRLB algorithm and neural network based prediction to remedy the drawbacks of the DRLB algorithm, and verify the efficacy of the proposed method by computer simulations.

  • PDF

THE DISCRETE-TIME ANALYSIS OF THE LEAKY BUCKET SCHEME WITH DYNAMIC LEAKY RATE CONTROL

  • Choi, Bong-Dae;Choi, Doo-Il
    • Communications of the Korean Mathematical Society
    • /
    • v.13 no.3
    • /
    • pp.603-627
    • /
    • 1998
  • The leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In the ATM network, the input traffics are bursty and transmitted at high-speed. In order to get the low loss probability for bursty input traffics, it is known that the leaky bucket scheme with static leaky rate requires larger data buffer and token pool size. This causes the increase of the mean waiting time for an input traffic to pass the policing function, which would be inappropriate for real time traffics such as voice and video. We present the leaky bucket scheme with dynamic leaky rate in which the token generation period changes according to buffer occupancy. In the leaky bucket scheme with dynamic leaky rate, the cell loss probability and the mean waiting time are reduced in comparison with the leaky bucket scheme with static leaky rate. We analyze the performance of the proposed leaky bucket scheme in discrete-time case by assuming arrival process to be Markov-modulated Bernoulli process (MMBP).

  • PDF

A Traffic Distribution Scheme for Connectionless Data Service using Multi-Path in ATM Networks (ATM 망에서 다중 경로를 이용한 비연결형 트랙픽의 분산 기법)

  • 서원석;오영열;김석규;이배용;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.1
    • /
    • pp.103-118
    • /
    • 1996
  • With the advent of B-ISDN based on ATM technonlogy, ther are increasing needs for the interconnection of existing LAN/MAN's through ATM networks. ATM networks, therefore, must provide connectionless service. In this paper, the traffic distributio scheme using multi-path is proposed to support efficient connectionless service in ATM networks. Because the proposed scheme distributed the bursty traffic arrived in the interworking unit (IWU) and the connectionless server (CLS) from LAN-terminals, it alleviates the packet loss ratio caused by buffer overflow at IWU/CLS and is able to use nettowrk resources efficiently according to the network conditions and the amount of the traffic arrived at IWU/CLS. This paper presents the distribution algorithm and the IWU/CLS, CLS-CLS closed-loop rate control scheme.

  • PDF

Estimating the Queue Length Distribution of ATM multiplexer using Threshold Bootstrap

  • 김윤배
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.10a
    • /
    • pp.62-62
    • /
    • 1999
  • In this paper, we propose a new technique of estimating tail of steady-state queue length distribution; Pr(Q>q), fo ATM multiplexer. Pr(Q>q) is a fundamental measure of network congestion. Assessing Pr(Q>q) properly is crucial for design and control of ATM networks. Data traffic pattern of high-speed networks is highly correlated and bursty. Estimating Pr(Q>q) is very difficult because of correlation and burstiness. We estimate entropy(rate-function) using large deviation principles and threshold bootstrap. Simulation studies are conducted to compare the performance of an existing method and our new method.

  • PDF