無線區域網路中自我相似交通流量之 成因與效能評估 The origin and performance impact of self- similar traffic for wireless local area networks 報 告 者:林 文 祺 指導教授:柯 開 維 博士.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Advertisements

Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similar Network Traffic The original paper on network traffic self-similarity.
Speaker: Yu-Fu Huang Advisor: Dr. Kai-Wei Ke Date : 2014, Mar. 17 A page-oriented WWW traffic model for wireless system simulations.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
An Analytical Model for Network Flow Analysis Ernesto Gomez, Yasha Karant, Keith Schubert Institute for Applied Supercomputing Department of Computer Science.
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
Finding Self-similarity in People Opportunistic Networks Ling-Jyh Chen, Yung-Chih Chen, Paruvelli Sreedevi, Kuan-Ta Chen Chen-Hung Yu, Hao Chu.
Trace-based Network Bandwidth Analysis and Prediction Yi QIAO 06/10/2002.
2  Something “feels the same” regardless of scale 4 What is that???
Chen Chu South China University of Technology. 1. Self-Similar process and Multi-fractal process There are 3 different definitions for self-similar process.
1 Self-Similar Wide Area Network Traffic Carey Williamson University of Calgary.
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
Speaker: Pei-Ni Tsai Adviser: Dr. Kai-Wei Ke. Outline Introduction Hierarchical Resource Allocation Resource Allocation Complete share Guard External.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
October 14, 2002MASCOTS Workload Characterization in Web Caching Hierarchies Guangwei Bai Carey Williamson Department of Computer Science University.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
© Manasa Quantifying Metrics for Resilient and Survivable Networks EECS 801 Graduate Reading © 2008–Manasa K 6 June 2008 Manasa K Department of Electrical.
1 多媒體行動通訊網路具動態重配置之可適性資源 管理機制及效能分析 Adaptive resource management with dynamic reallocation for layered encoded multimedia on wireless mobile communication.
Finding Self-similarity in Opportunistic People Networks Yung-Chih Chen 1 Ling-Jyh Chen 1, Yung-Chih Chen 1, Tony Sun 2 Paruvelli Sreedevi 1, Kuan-Ta Chen.
Performance analysis of DCF in presence of hidden nodes and collision prevention mechanism. - Ruchir Bhanushali. - Sagar. Shah.
Small scale analysis of data traffic models B. D’Auria - Eurandom joint work with S. Resnick - Cornell University.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
1 Interesting Links
CSE 561 – Traffic Models David Wetherall Spring 2000.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
Connection Admission Control Schemes for Self-Similar Traffic Yanping Wang Carey Williamson University of Saskatchewan.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
乙太被動式光學網路上能支援多 媒體服務之動態頻寬配置機制 Dynamic Bandwidth Allocation Mechanisms for Multimedia Services on EPON 指導教授 : 吳和庭 博士 研究生:簡睿毅 日期 : 2005 / 7 / 15.
High Utilization Resource Allocation and Performance Evaluation for GPRS Networks 研 究 生:蔡鎮年 指導教授:柯開維 博士 無線分封數據服務網路之高使用率 資源分配策略與效能評估.
CS 6401 Network Traffic Characteristics Outline Motivation Self-similarity Ethernet traffic WAN traffic Web traffic.
Self-Similar Traffic COMP5416 Advanced Network Technologies.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
References for M/G/1 Input Process
Dr. Nawaporn Wisitpongphan. What do you need in order to conduct a PhD Research? A lot of reading in order to Find a PhD thesis topic Find out what other.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
1 FARIMA(p,d,q) Model and Application n FARIMA Models -- fractional autoregressive integrated moving average n Generating FARIMA Processes n Traffic Modeling.
COMPSAC'14 - N. Larrieu /07/ How to generate realistic network traffic? Antoine VARET and Nicolas LARRIEU COMPSAC – Vasteras – July the 23.
Real Time Appearance Based Hand Tracking The 19th International Conference on Pattern Recognition (ICPR) December 7-11, 2008, Tampa Convention Center,
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
Link Dimensioning for Fractional Brownian Input Chen Jiongze PhD student, Electronic Engineering Department, City University of Hong Kong Supported by.
1 Self Similar Traffic. 2 Self Similarity The idea is that something looks the same when viewed from different degrees of “magnification” or different.
Detecting the Long-Range Dependence in the Internet Traffic with Packet Trains Péter Hága, Gábor Vattay Department Of Physics of Complex Systems Eötvös.
Self-generated Self-similar Traffic Péter Hága Péter Pollner Gábor Simon István Csabai Gábor Vattay.
控制與訊號處理實驗室成果簡介 指導教授 陳博現教授 本實驗室研究主題主要分為三類:第一類為非線性隨機控制及量子系統 控制應用。第二類是訊號處理及無線通訊應用。第三類是整合訊號及控制 在系統生物學及生物資訊的應用。相關研究成果分類介紹如下: 一、非線性隨機控制設計及量子系統追蹤控制 :( 最近成果及目前進行研究.
Maximization of System Lifetime for Data-Centric Wireless Sensor Networks 指導教授:林永松 博士 具資料集縮能力無線感測網路 系統生命週期之最大化 研究生:郭文政 國立臺灣大學資訊管理學研究所碩士論文審查 民國 95 年 7 月.
Planning and Analyzing Wireless LAN
Providing Group Tour Guide by RFIDs and WSNs Yu-Chee Tseng, CS.NCTU (a joint work with NTHU) (in IEEE Trans. on Wireless Comm.) ( 中華民國專利 : " 使用無線感測網路提供群組導引.
LOGO A Cross-Layer Optimization Mechanism for Multimedia Traffic over IEEE Networks 指導老師:童曉儒 教授 報告學生:許益晨.
Risk Analysis Workshop April 14, 2004 HT, LRD and MF in teletraffic1 Heavy tails, long memory and multifractals in teletraffic modelling István Maricza.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
1 Interesting Links. On the Self-Similar Nature of Ethernet Traffic Will E. Leland, Walter Willinger and Daniel V. Wilson BELLCORE Murad S. Taqqu BU Analysis.
Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network 學生 : 楊宏昌 指導教授 : 曾黎明教授 在 BT 同儕通訊上利用參與者訊息引導對外流量之區域化節約.
Adaptive TUF Packet Scheduling Scheme for OFDMA-based WiMAX Systems
An Analytical Model for Network Flow Analysis
Internet Traffic Modeling
Interesting Links.
Antoine Mercier,Ecole Centrale D`Electronique Paccale Minet, Inria
Evaluation of Load Balancing Algorithms and Internet Traffic Modeling for Performance Analysis By Arthur L. Blais.
Optimization of Wireless Station Time Slot Allocation with Consideration of Throughput and Delay Constraints 指導教授:林永松 博士 研究生:林岦毅.
Self-similar Distributions
Probability & Statistics Probability Theory Mathematical Probability Models Event Relationships Distributions of Random Variables Continuous Random.
Mark E. Crovella and Azer Bestavros Computer Science Dept,
Presented by Chun Zhang 2/14/2003
CPSC 641: Network Traffic Self-Similarity
Presentation transcript:

無線區域網路中自我相似交通流量之 成因與效能評估 The origin and performance impact of self- similar traffic for wireless local area networks 報 告 者:林 文 祺 指導教授:柯 開 維 博士

Outline Background of Self-Similarity Properties of WLAN Traffic Estimation of Self-Similar Traffic The Origin of Self-Similarity in WLAN Impact of Self-Similar to CSMA/CA performance Impact of Self-Similar to CSMA/CA performance with RTS/CTS

Background of Self-Similarity(1/8) Self-Similarity and Fractal

Background of Self-Similarity(2/8) Statistics of Self-Similarity Definition of Self-Similar Stochastic Process: H: Hurst parameter or self-similarity parameter

Background of Self-Similarity(3/8) Self-Similarity of Statistics Definition of Self-Similar Stochastic Sequence: Ex.

Background of Self-Similarity(4/8) Properties of Self-Similarity Long range dependence Slowly decaying variance Heavy-tailed distribution

Background of Self-Similarity(5/8) Self-Similar Traffic

Background of Self-Similarity(6/8) X(t) is a Pareto distribution random process with shape parameterαand location parameter k. Pareto Distribution:

Background of Self-Similarity(7/8) Variance-time Plot

R/S Plot Background of Self-Similarity(8/8)

Properties of WLAN Traffic(1/2) WLAN traffic Time Unit=1 Sec Time Unit=0.1 Sec Time Unit=0.01 Sec Basic: 1 μS Aggregation: 1, 0.1, 0.01 Sec Environment: 7NB

Poisson traffic Properties of Real Network(2/2) Time Unit=0.01 Sec Time Unit=0.1 Sec Time Unit=1 Sec

Estimation of Self-Similar Traffic(1/2) Packets Sequence on WLAN

Estimation of Self-Similar Traffic(2/2) Variance Plot & R/S Plot

Single Source without CSMA/CA The Origin of Self-Similar Traffic (1/3)

The Origin of Self-Similar Traffic(2/3) Variance Plot & R/S Plot

The Origin of Self-Similar Traffic(3/3) Variance Plot & R/S Plot for WLAN based on single Poisson Traffic. (Simulated)

Impact of Self-Similar to CSMA/CA performance(1/7) Maximum throughput The influence of nodes on Self-Similar Traffic and Poisson Traffic The influence of packet length on Self- Similar Traffic and Poisson Traffic

Impact of Self-Similar to CSMA/CA performance(2/7) Maximum throughput

Impact of Self-Similar to CSMA/CA performance(3/7) Maximum throughput

Impact of Self-Similar to CSMA/CA performance(4/7) The influence of nodes on Self-Similar Traffic and Poisson Traffic

Impact of Self-Similar to CSMA/CA performance(5/7) The influence of nodes on Self-Similar Traffic and Poisson Traffic

Impact of Self-Similar to CSMA/CA performance(6/7) The influence of packet length on Self-Similar Traffic and Poisson Traffic

Impact of Self-Similar to CSMA/CA performance(7/7) The influence of packet length on Self-Similar Traffic and Poission Traffic

Maximum throughput The influence of nodes on Self-Similar Traffic and Poisson Traffic The influence of packet length on Self- Similar Traffic and Poisson Traffic Impact of Self-Similar to CSMA/CA performance with RTS/CTS (1/4)

Impact of Self-Similar to CSMA/CA performance with RTS/CTS (2/4) Maximum throughput

Impact of Self-Similar to CSMA/CA performance with RTS/CTS (3/4) The influence of nodes on Self-Similar Traffic and Poisson Traffic

Impact of Self-Similar to CSMA/CA performance with RTS/CTS (4/4) The influence of packet length on Self-Similar Traffic and Poisson Traffic

Conclusion WLAN Traffic is Self-Similar regular & Single) WLAN Throughput at node=5  Max WLAN Throughput at node SS WLAN Throughput at node>5  Poisson<SS Impact of Packet Length RTS/CTS not influence the characteristic of Poisson and Self-Similarity

Thanks for your attendance

Impact of Self-Similar to CSMA/CA performance The Number of Nodes increment form 1 to 5

Impact of Self-Similar to CSMA/CA performance The Number of Nodes increment form 1 to 5