• Title/Summary/Keyword: queuing analysis

Search Result 132, Processing Time 0.024 seconds

Call admission scheme for low speed multimedia services in CDMA mobile communication systems (CDMA 이동통신시스템에서의 저속 멀티미디어 서비스를 위한 호 수락 방식)

  • 최경수;권수근;전형구;유영갑
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.7
    • /
    • pp.14-21
    • /
    • 1998
  • In providing with low speed multimedia services, a call blocking rate is greatly varied according to the transmission rate, and thereofr, the call blocking rate is remarkably increased for a service having a high transmission rate compared to a service having a low transmission rate. This paper presents three methods of solving this problem; Packing Scheme in which available channels distributed to each frequency channel are concentrated on one frequency channel and a call having a high transmission rate is assigned to the frequency channel; Queuing Scheme in which queuing is assigned to calls under service is temporarily reduced and a call having a high transmission rate is allowed. The result of performance analysis for 13 Kbps and 128 Kbps service through computer simulation showed that the call blocking rate for 128 Kbpx service was reduced by tens of percent accoring to loads.

  • PDF

Self-Similarity Characteristic in Data traffic (데이터 트래픽에서의 Self-Similar 특성)

  • 김창호;황인수;최삼길;김동일;이동철;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.146-151
    • /
    • 1999
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Performance Analysis of HomePNA 2.0 MAC Protocol (HomePNA 2.0 MAC 프로토콜의 성능 분석)

  • Kim, Jong-Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10A
    • /
    • pp.877-885
    • /
    • 2005
  • The Home Phoneline Networking Alliance (HomePNA) 2.0 technology can establish a home network using existing in-home phone lines, which provides a channel rate of 4-32 Mbps. HomePNA 2.0 Medium Access Control(MAC) protocol adopts an IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method, Quality of Service(QoS) algorithm, and Distributed Fair Priority Queuing(DFPQ) collision resolution algorithm. In this paper, we propose some mathematical models about the important elements of HomePNA 2.0 MAC protocol performance, which are Saturation Throughput, Packet Delay and Packet Jitter. Then, we present an overall performance analysis of HomePNA 2.0 MAC protocol along with simulations.

Queueing Model for Traffic Loading Improvement of DDoS Attacks in Enterprise Networks (엔터프라이즈 네트워크에서 DDoS 공격의 부하 개선을 위한 큐잉 모델)

  • Ha, Hyeon-Tae;Lee, Hae-Dong;Baek, Hyun-Chul;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Today the company adopts to use information management method at the network base such as internet, intranet and so on for the speed of business. Therefore the security of information asset protection and continuity of business within company in relation to this is directly connected to the credibility of the company. This paper secures continuity to the certified users using queuing model for the business interruption issue caused by DDoS attack which is faced seriously today. To do this I have reflected overloaded traffic improvement process to the queuing model through the analysis of related traffic information and packet when there occurs DDoS attack with worm/virus. And through experiment I compared and analyzed traffic loading improvement for general network equipment.

Waiting Time and Sojourn Time Analysis of Discrete-time Geo/G/1 Queues under DT-policy (DT-정책 하에서 운영되는 이산시간 Geo/G/1 시스템의 대기시간과 체재시간 분석)

  • Se Won Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.2
    • /
    • pp.69-80
    • /
    • 2024
  • In this paper, we studied a discrete-time queuing system that operates under a mixed situation of D-policy and T-policy, one of the representative server control policies in queuing theory. A single server serves customers arriving by Bernoulli arrival process on a first-in, first-out basis(FIFO). If there are no customers to serve in the system, the server goes on vacation and returns, until the total service time (i.e., total amount of workload) of waiting customers exceeds predetermined workload threshold D. The operation of the system covered in this study can be used to model the efficient resource utilization of mobile devices using secondary batteries. In addition, it is significant in that the steady state waiting time and system sojourn time of the queuing system under a flexible mixed control policy were derived within a unified framework.

Optimizing Total Transport Cost Incurred under Specific Port System: With a Case of Managing POSCO-owned Berths (특수항만구조하에서의 물류비용 최적화에 관한 연구 - 포항제철의 원료부두 사례를 중심으로 -)

  • Kim, Weon-Jae
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.3
    • /
    • pp.42-55
    • /
    • 2010
  • This paper primarily deals with a decision-making for determining the number of voyages in each ship size under a specific port structure in order to minimize the total transport cost consisting of transport cost at sea, queuing cost in port, and inventory cost in yard. As a result of computer simulation using queuing model characterized by inter-arrival time distribution, we were able to find out some combination of voyage numbers of 3 ship-size(50,000-ton, 100,000-ton, and 200,000-ton), where the total transport cost can be minimized under a specific port structure. The simulation model also allows us to figure out any trade-off relationship among sea transport cost, queuing cost in port, and inventory cost in yard. Put it differently, an attempt to reduce the sea transport cost by increasing the number of voyages of the largest ship size, the transport cost incurred in both port and yard is hypothesized to be increased and vice versa. Consequently, Port managers are required to adjust the number of annual number of voyages allocated in each ship size, put into the sea lines for importing raw materials, in order to optimize the transport costs incurred under the specific port system. We may consider a net present value(NPV) model for performing an economic feasibility analysis on port investment project. If a total discounted net benefit, including cost savings, exceeds the initial investment for an additional berth construction, then we accept the port investment project. Otherwise, we reject the proposed port investment plan.

Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer

  • Shu, Minglei;Yuan, Dongfeng;Chen, Changfang;Wang, Yinglong;Zhang, Chongqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4436-4452
    • /
    • 2015
  • The IEEE 802.15.6 standard is introduced to satisfy all the requirements for monitoring systems operating in, on, or around the human body. In this paper, analytical models are developed for evaluating the performance of the IEEE 802.15.6 CSMA/CA-based medium access control protocol for wireless body area networks (WBAN) under unsaturation condition. We employ a three-dimensional Markov chain to model the backoff procedure, and an M/G/1/K queuing system to describe the packet queues in the buffer. The throughput and delay performances of WBAN operating in the beacon mode are analyzed in heterogeneous network comprised of different user priorities. Simulation results are included to demonstrate the accuracy of the proposed analytical model.

Virtual Queue Based QoS Layered Vertical Mapping in Wireless Networks

  • Fang, Shu-Guang;Tang, Ri-Zhao;Dong, Yu-Ning;Zhang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1869-1880
    • /
    • 2014
  • Wireless communication is one of most active areas in modern communication researches, QoS (Quality of Service) assurance is very important for wireless communication systems design, especially for applications such as streaming video etc., which requires strict QoS assurance. The modern wireless networks multi-layer protocol stack structure results in QoS metrics layered and acting in cascade and QoS metrics vertical mapping between protocol layers. Based on virtual buffer between protocol layers and queuing technology, a unified layered QoS mapping framework is proposed in this paper, in which we first propose virtual queue concept, give a novelty united neighboring protocol layers QoS metric mapping framework, and analysis method based on dicerete-time Markov chain, and numerical results show that our proposed framework represents a significant improvement over previous model.

Queuing Analysis of IEEE 802.15.4 GTS Scheme for Bursty Traffic (Bursty Traffic을 위한 IEEE 802.15.4 GTS 기법의 대기 해석)

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.87-91
    • /
    • 2010
  • The IEEE 802.15.4 and IEEE 802.15.7 standard are the typical of low rate wireless and Visible Light Wireless personal area networks. Its Medium Access Control protocol can support the QoS traffic flows for real-time application through guaranteed time slots (GTS) in beacon mode. However, how to achieve a best allocation scheme is not solved clearly. The current analytical models of IEEE 802.15.4 MAC reported in the literature have been mainly developed under the assumption of saturated traffic or non-bursty unsaturated traffic conditions. These assumptions don't capture the characteristics of bursty multimedia traffic. In this paper, we propose a new analytical model for GTS allocation with burst Markov modulated ON-OFF arrival traffic.

An Experimental Delay Analysis Based on M/G/1-Vacation Queues for Local Audio/Video Streams

  • Kim, Doo-Hyun;Lee, Kyung-Hee;Kung, Sang-Hwan;Kim, Jin-Hyung
    • ETRI Journal
    • /
    • v.19 no.4
    • /
    • pp.344-362
    • /
    • 1997
  • The delay which is one of the quality of service parameters is considered to be a crucial factor for the effective usage of real-time audio and video streams in interactive multimedia collaborations. Among the various causes of the delay, we focus in this paper on the local delay concerned with the schemes which handle continuous inflow of encoded data from constant or variable bit-rate audio and video encoders. We introduce two kinds of implementation approaches, pull model and push model. While the pull model periodically pumps out the incoming data from the system buffer, the push model receives events from the device drivers. From our experiments based on Windows NT 3.51, it is shown that the push model outperforms the other for both constant and variable bit-rate streams in terms of the local delay, when the system suffers reasonable loads. We interpret this experimental data with M/G/1 multiple vacation queuing theories, and show that it is consistent with the queuing theoretic interpretations.

  • PDF