• 제목/요약/키워드: traffics

검색결과 549건 처리시간 0.023초

신속개방형 콘크리트 overlay(whitetopping)포장재의 적용 및 공용성 평가연구 (Application and Development of Super High Early Strenth Concrete Overlay pavements for repairing Asphalts Pavement within 24hours)

  • 엄태선;임채용;유재상;이종열;조윤호;이순기
    • 한국콘크리트학회:학술대회논문집
    • /
    • 한국콘크리트학회 2003년도 가을 학술발표회 논문집
    • /
    • pp.573-576
    • /
    • 2003
  • We have developed and applied the super high early strength concrete overlay pavements for repairing asphalts pavements within 24hours. This pavements repairing method by the super high early strength concrete have already applied in U.S.A, japan, England, etc. The super high early strength concrete developed by Ssangyong cement co. for repairing pavements speedily have replaced at No. 2, 17 pavements in managing by Sunchoen national pavements management office. In the results, all of works have finished within 16~24hours after intercepting traffics and all of traffics was opened to be hamonious. In present, this pavements is sound and strong

  • PDF

무선 에드혹 망 다중홉 트래픽제어를 위한 Clustering 알고리즘에 관한 연구 (Clustering Algorithm for a Traffic Control of Wireless Ad Hoc Networks multi-hop)

  • 이동철;김기문;김동일
    • 한국정보통신학회논문지
    • /
    • 제7권6호
    • /
    • pp.1161-1167
    • /
    • 2003
  • Ad hoc 네트워크상 노드들은 정보전송과 위치등록, 노드간의 라우팅경로 유지를 위해 많은 패킷전송이 이루어진다. 이러한 환경에서의 트래픽은 고정망에서 보다 이동성 변수에 따라 더욱 많은 수가 발생하게 될 것이다. 본 논문에서는 무선 ad-hoc 다중홉에서의 트래픽제어를 위한 클러스터링 알고리즘을 통해 패킷 전송효율을 분석한다.

Ad-hoc 이동 통신망에서의 효율적인 라우팅 알고리즘에 관한 연구 (A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Developed Network)

  • 이동철;박종봉;김성권
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.653-655
    • /
    • 2015
  • 본 논문은 Ad-hoc 네트워크에서의 전송을 효율적으로 하기 위한 클러스터링 알고리즘에 대해 실험을 통하여 살펴보았다. Ad-hoc 네트워크상 노드들은 정보전송과 위치등록, 노드간의 라우팅 경로유지를 위해 많은 패킷전송이 이루어진다. 본 논문에서는 무선 Ad-hoc 통신망에서 요구되는 알고리즘 프로그램개발을 통하여 패킷 전송효율을 분석을 통해 문자메세지, 무료통화가 가능한 알고리즘을 개발하여 향후 통신 서비스 산업에 적용가능함을 제시한다.

  • PDF

ATM/LAN 연동장치의 동적대역할당 방식에 대한 성능해석 (Analysis of Dynamic bandwidth allocation scheme for ATM/LAN interworking unit)

  • 이은준;우상철;윤종호
    • 한국통신학회논문지
    • /
    • 제21권12호
    • /
    • pp.3132-3143
    • /
    • 1996
  • In the evaluation of Broadband-ISDN, the main issue is to interconnect existing LANs and MANs to B-ISDN based on Asynchrous Transfer Mode. However, LANs provide connectionless services, whereas the ATM network provides connection-oriented services. So some problem arises from accessing ATM switchs to transparently transmit connectionless data via B-ISDN. Two methods then were recommended by ITU-TS to support the connectionaless services. In the paper, we do the numerical analysis, using the stochastic fluid flow method, of dynamic bandwidth allocation sheme with two class traffics in the virtual path established between Interworking Units(JWUS) interconnecting LANs to an ATM network and Connectionless Servers(CLSs). The loss mechanism of each traffic is controlled by the contents of buffer. The vandwidth which the IWU requests the CLS is estimated by the number of On-Off sources in the On state. We use the stochsastic fluide flow method which is to find the steady-state joint probability in each level of the IWU buffer. The length of the IWU buffer as the real random variable is changed by traffics entering the IWU.

  • PDF

TCP-friendly RTP Rate Control

  • 하상석;정선태
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 신호처리소사이어티 추계학술대회 논문집
    • /
    • pp.255-258
    • /
    • 2003
  • TCP is taking over 95% among the Internet traffics. Recently the demands of multimedia services in the Internet has been increasing. These multimedia services mostly need real-time deliverly, and then RTP has been a de facto to transmission protocol for these real-time multimedia services. RTP uses UDP as its underlying transport protocol, and thus it does not support any rate and congestion control. Thus, for fair use of the Internet bandwidth with TCP traffics. RTP also needs a rate control. One constraint of RTP is that the feedback information(delivered by, RTP's twin protocol, RTCP) is recommended to be sent no less than 5 seconds. In this paper, we propose a TCP-friendly RTP rate control which use only RTCP feedback information at every 5 seconds. The experiment results show that our proposed algorithm works. But, it is found that we need more time to test the effects of parameters and policies of the algorithms, which will be reported later.

  • PDF

비디오 원의 트래픽 모형화와 다중화 장치의 성능분석 (Traffic Modeling of Video Source and Performance Analysis of ATM Multiplexer)

  • 윤영하;홍정식;이창훈
    • 대한산업공학회지
    • /
    • 제23권1호
    • /
    • pp.235-247
    • /
    • 1997
  • In this study, the performance of ATM multiplexer with MPEG(Motion Pictures Experts Group) video is analyzed by considering the effect of the MPEG GOP(Group of Pictures) structure. By assuming that frame starting times are synchronized, aggregated traffics are considered to be transmitted at the beginning of each frame time units. The aggregated number of cells generated during a frame time unit is, therefore, derived from distributions of individual sources. The stationary probability of buffer occupancy can be easily obtained by using a property of the periodicity of aggregated traffics. Simulation approach is also used to determine the traffic load for a given probability of satisfying QoS(Quality of Service).

  • PDF

IPv6 환경에서의 유해 트래픽 분석 (Harmful Traffic Analysis on the IPv6 Environment)

  • 구향옥;백순화;오창석
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2005년도 추계 종합학술대회 논문집
    • /
    • pp.195-199
    • /
    • 2005
  • 홈네트워크와 인터넷이 결합된 IPv6환경이 도래 되어도 각종 바이러스와 웜 공격 등으로 인해 입는 피해들도 계속 증가할 것이다. 본 논문에서는 TCP, UDP, ICMP 트래픽을 분석하여 IPv6환경에서의 유해 트래픽 검출하는 기법을 제안하였다.

  • PDF

무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜 (A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks)

  • 김혜윤;김성철
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

QUEUEING ANALYSIS OF THE HOL PRIORITY LEAKY BUCKET SCHEME

  • Choi, Doo-Il
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제7권1호
    • /
    • pp.15-23
    • /
    • 2003
  • ATM networks provide the various kinds of service which require the different Quality of Services(QoS) such as loss and delay. By statistically multiplexing of traffics and the uncertainty and fluctuation of source traffic pattern, the congestion may occur. The leaky bucket scheme is a representative policing mechanism for preventive congestion control. In this paper, we analyze the HOL(Head-of-Line) priority leaky bucket scheme. That is, traffics are classified into real-time and nonreal-time traffic. The real-time traffic has priority over nonreal-time traffic for transmission. For proposed mechanism, we obtain the system state distribution, finally the loss probability and the mean waiting time of real-time and nonreal-time traffic. The simple numerical examples also are presented.

  • PDF

이동통신 멀티미디어 데이터서비스의 트래픽 특성 모델링 및 성능분석 (Traffic Modeling and Performance Analysis of Mobile Multimedia Data Services)

  • 정용주;백천현;김후곤;최택진;양원석;황흥석
    • 한국경영과학회지
    • /
    • 제28권2호
    • /
    • pp.139-155
    • /
    • 2003
  • The aim of this study is to identify the data traffic capacity of 3G mobile communication networks, especially of cdma2000-1X networks. Three-layered ON/OFF traffic model is used to describe the dynamics of data traffics and the process of data transmission such as packet scheduling. We construct a simulator fully incorporating packet handling process of cdma2000-lX data network as well as three-layered ON/OFF traffic model describing the behavior of source data traffics. To get influence of traffic parameters on performance measures, the extensive simulations were performed for several data sets which are obtained from real trace data or previous studies. The experimental results show that the engineered throughput satisfying QoS criteria is approximately 25% of total capacity. Finally, some proposals to improve the system capacity are followed.