• Title/Summary/Keyword: evaluation protocol

Search Result 1,033, Processing Time 0.027 seconds

Modeling and Performance Evaluation of the Web server supporting Persistent Connection (Persistent Connection을 지원하는 웹서버 모델링 및 성능분석)

  • Min, Byeong-Seok;Nam, Ui-Seok;Lee, Sang-Mun;Sim, Yeong-Seok;Kim, Hak-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.605-614
    • /
    • 2002
  • Amount of the web traffic web server handles are explosively increasing, which requires that the performance of the web server should be improved for the various web services. Although the analysis for the HTTP traffic with the proper tuning for the web server is essential, the research relevant to the subject are insignificant. In particular, although most of applications are implemented over HTTP 1.1 protocol, the researches mostly deal with the performance evaluation of the HTTP 1.0 protocol. Consequently, the modeling approach and the performance evaluation over HTTP 1.1 protocol have not been well formed. Therefore, basing on the HTTP 1.1 protocol supporting persistent connection, we present an analytical end-to-end tandem queueing model for web server to consider the specific hardware configuration inside web server beginning at accepting the user request until completing the service. we compare various performances between HTTP 1.0 and HTTP 1.1 under the overloading condition, and then analyze the characteristics of the HTTP traffic that include file size requested to web server, the OFF time between file transfers, the frequency of requests, and the temporal locality of requests. Presented model is verified through the comparing the server throughput according to varying requests rate with the real web server. Thereafter, we analyze the performance evaluation of the web server, according to the interrelation between TCP Listen queue size, the number of HTTP threads and the size of the network buffers.

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network

  • Yang, Yuan;Zhen, Fu;Lee, Tae-Seok;Park, Myong-Soon
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.39-43
    • /
    • 2006
  • In this paper, we proposed TASL-MAC, a medium-access control (MAC) protocol for wireless sensor networks. In wireless sensor networks, sensor nodes are usually deployed in a special environment, are assigned with long-term work, and are supported by a limited battery. As such, reducing the energy consumption becomes the primary concern with regard to wireless sensor networks. At the same time, reducing the latency in multi-hop data transmission is also very important. In the existing research, sensor nodes are expected to be switched to the sleep mode in order to reduce energy consumption. However, the existing proposals tended to assign the sensors with a fixed Sleep/Listening schedule, which causes unnecessary idle listening problems and conspicuous transmission latency due to the diversity of the traffic-load in the network. TASL-MAC is designed to dynamically adjust the duty listening time based on traffic load. This protocol enables the node with a proper data transfer rate to satisfy the application's requirements. Meanwhile, it can lead to much greater power efficiency by prolonging the nodes' sleeping time when the traffic. We evaluate our implementation of TASL-MAC in NS-2. The evaluation result indicates that our proposal could explicitly reduce packet delivery latency, and that it could also significantly prolong the lifetime of the entire network when traffic is low.

Incremental Cooperative Transmission of Bidirectional Relaying Schemes in Underlay Cognitive Radio (언더레이 인지기술에서 양방향 릴레이 증분 협력 전송에 관한 연구)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.47-53
    • /
    • 2013
  • In this paper, we propose an incremental cooperative transmission protocol in two-way underlay cognitive radio networks. In the proposed protocol, two secondary sources attempt to transmit their packet to each other with help of a secondary relay under interference constraint. For performance evaluation, we derive exact closed-form expressions of average outage probability over Rayleigh fading channel. Then, we perform Monte Carlo simulations to verify the derivations. Results present that the simulation and theoretical results are in good agreement and the outage performance of the proposed protocol is better than that of two-way direct transmission protocol.

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.

DEVSim++ - NS2 Interoperating Environment for Protocol Evaluation (프로토콜 평가를 위한 DEVSim++ 와 NS2 의 연동 환경)

  • 김회준;김탁곤
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.253-258
    • /
    • 2002
  • This paper proposes a methodology for development of protocol models. The methodology attempts to employ two modeling environments in models development, NS2 and DEVSim++, which will interoperate during simulation. NS2 is a widely used network simulator in protocol research, which employs an informal modeling approach. Within the approach time and state information of protocol models are not explicitly described, thus being hard to validate model. On the other hand the DEVS formalism is a mathematical framework for modeling a discrete event system in a hierarchical, modular manner. In DEVS, model's time and state information is described explicitly, By using DEVS formalism, models can easily be validated and errors in the modeling stage can be reduced. However, the DEVS simulator, DEVSim++, supports a small amount of models library which are required to build simulation models of general communication network. Although NS2 employs an informal modeling approach and models validation is difficult, it supports abundant models library validated by experimental users. Thus, combination of DEVS models and NS2 models may be an effective solution for network modeling. Such combination requires interoperation between DEVSim++ simulator and NS2 simulator. This paper develops an environment for such interoperation. Correctness and effectiveness of the implemented interoperation environment have been validated by simulation of UDP and TCP models.

  • PDF

A performance analysis of a DTN routing protocol in the working day movement using a taxi movement model (택시 이동 모델을 사용한 근무일 이동에서 DTN 라우팅 프로토콜의 성능 분석)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.265-270
    • /
    • 2014
  • The working-day movement model, which implemented in the ONE simulator, supports the environments similar to the real life by using the transportation. However, there is no taxi movement model in the working-day movement model. So, we implemented a taxi movement model in the ONE simulator as the previous work. It is changed significantly for the simulation results of routing protocols in the ONE simulator. In this paper, we analyze the performance evaluation of the DTN routing protocol such as an epidemic routing protocol using our taxi movement model in the ONE simulator.

A RF Energy Harvesting Based Routing Protocol in Mobile Ad-hoc Wireless Sensor Networks (모바일 애드혹 무선 센서 네트워크에서 RF 에너지 하베스팅 기반 라우팅 프로토콜)

  • Shim, KyuHyun;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.87-93
    • /
    • 2016
  • In this paper, we propose a RF energy harvesting based routing protocol in mobile ad-hoc wireless sensor networks. The main features and contributions of the proposed routing protocol are as follows. First, establishment of routing route based on both remaining energy of mobile sensor nodes and RF energy harvesting. Second, establishment of routing route by considering availability and stability of route based on energy of mobile sensor nodes to increase lifetime of networks and route. The performance evaluation of the proposed routing protocol using OPNET shows that the routing method considering both route availability and route stability based on RF energy harvesting can increase efficiently route lifetime.

The Design and Evaluation of Mobile Multicasting Protocol in 3-Tiered Mobile Computing Environment (3-계층 이동 컴퓨팅 환경에서 이동 멀티캐스팅 프로토콜의 설계 및 평가)

  • 김재수;박규석
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.120-129
    • /
    • 1998
  • The mobile computing is a new network environment that support s wireless network connection seamless while the portable computer is moving. This environment involves the problem of re-establishing of new network connection. The mobile computing should provide multicasting service, because multicasting is widely-used application service which delivers messages to the members of the groups. In this paper, we proposed 3-tiered mobile multicasting protocol that transfers multicast packets efficiently and reliablely. Also, we analyzed the performance of 3-tiered mobile multicasting protocol comparing with other mechanism. Our protocol is superior to other mechanism in the aspects of the handoff costs and packet delivery costs.

  • PDF

Design and performance evaluation of G.983.1 based on Dynamic UC Protocol for ATM-PON (ATM-PON에서의 G.983.1을 이용한 Dynamic MAC Protocol의 설계 및 성능평가)

  • Jang, Seong-Ho;Jang, Jong-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.523-530
    • /
    • 2002
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtYBR, nrtYBR, UBR and ABR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm. From the simulation result, we have confirmed that our proposed scheme can reduce the average cell delay in comparison to that of conventional MAC schemes.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.