Traffic Control by Influencing User Behavior
|
|
|
- Rachel Horn
- 9 years ago
- Views:
Transcription
1 Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before it flows into the network, and analyzed the traffic characteristics by modeling repeated calls. This research was conducted jointly with the Takahashi laboratory (Professor Yoshitaka Takahashi), Faculty of Commerce, Waseda University. Noriteru Shinagawa, Akira Miura, Shigeru Kaneda and Yoshikazu Akinaga 1. Introduction Traffic generation in mobile networks is heavily dependent on user behavior because the users move around with their terminals. For example, at a special event such as a fireworks display or football game, the people will congregate in a specific place and may try to make calls, generating unpredictable excessive traffic, leading to network congestion. When the users cannot get through due to congestion, they tend to make call requests repeatedly (repeated calls), which aggravates the network congestion further and in the worst case might even cause the network functions to break down. In order to avoid situations where services cannot be provided due to excessive load on the network equipment, controlling the traffic is an important issue. Currently, mobile network operators control the traffic by restricting the users communication demands (calls) forcefully by imposing calling restrictions or similar at congestion. However, when such methods are applied, the users lose the opportunities to use the services and the user satisfaction level may be decreased. To solve this problem, we examined a new traffic control method that attempts to influence user behavior before the traffic flows into the network. This effect is achieved by guiding the users to collaborate by providing information to them when the traffic is too heavy to control solely by network control methods. We call this new method traffic control by influencing user behavior [1]. This method aims to improve the opportunities of the users to use communication services by effectually controlling the number of repeated calls and ultimately increase the users satisfaction level. Moreover, for the benefit of network construction, operation and management, it is of great importance to take repeated calls into consideration when understanding the traffic characteristics of the network. For this reason, we evaluated the effects of repeated calls on the network performance. 2. Traffic Control by Influencing User Behavior 2.1 Concept We can consider three ways of controlling traffic before it flows into the network: balancing the distribution of traffic inflow between locations in the network (geographical balancing), balancing the time at which the traffic flows into the network (time balancing), and reducing the volume of traffic. We thus examined the following methods for traffic control that can be achieved by influencing user behavior. 1) Changing the communication place (move) The network system encourages the users to move to a location where there is spare capacity available. This balances the traffic geographically. 2) Changing the communication time (wait) The network system encourages the users to wait for a while until the network has spare capacity available. This balances the traffic in time. 3) Changing the communication medium (change media) The network system encourages the users to switch to a different communication medium, for example, from voice call to text message. This reduces the traffic volume. The relationship between traffic control and methods of influencing the users is shown in Figure 1. The traffic control by influencing user behavior is based on 34
2 NTT DoCoMo Technical Journal Vol. 7 No.4 Purpose of traffic control Geographical balancing Time balancing Reduction in traffic Method of influencing the users (1) Change in communication place (2) Change in communication time (3) Change in communication medium Move Wait Change media (from voice call to text message) Figure 1 Relationship between traffic control and methods of influencing user behavior the idea of controlling the traffic by notifying the users about system conditions and proposing better ways to communicate. As the users are made aware of the system conditions, deterioration of customer satisfaction can be prevented. It is still left up to the free judgment of the users whether or not they choose to follow the proposals from the system. The information notified to the users can include system information such as the present and estimated future network load conditions. It may also include recommended places and times where communication is possible, as well as alternative media through which the users can attempt to communicate. If only the system information is sent, the users may not take the actions the operator expects, as the behavioral patterns of the users after receiving the information vary, and thus the expected traffic control may not be achieved. Nonetheless, users are able to know the system conditions, which is considered to be effective in preventing the deterioration of customer satisfaction. If recommendations are sent and the mobile terminal functions can be controlled upon obtaining agreements from users, it would be easier to obtain the expected effects from the traffic control. 2.2 Overview of Control Scheme The sequence of events when implementing traffic control by influencing user behavior is explained below. First, when the communication system receives a connection request, it judges whether or not it is necessary to guide the users based on the current radio resource usage rate and other information. When the system guides the users, it sends the users guidance messages. These guidance messages contain information encouraging the users either to change the communication place, time or media. Upon receiving a guidance message, the user can judge whether or not to follow the guidance. When the user decides to follow the guidance, the user behaves as recommended (move, wait or change media) and requests a connection again. Depending on the spare communication resources, the call request may then be accepted or rejected. 2.3 Evaluation of Traffic Control by Influencing User Behavior We evaluated the effects of the traffic control by influencing user behavior using a method called multi-agent simulation. Multi-agent simulation is a method where multiple individual subjects (agents) that behave and make decisions autonomously are defined on a computer, and the global states resulting from the decisions each agent makes are observed. We have defined the users as agents and developed models of their behavior (movement, communication, and reaction to the guidance). The developed simulator is able to display and check the present position and communication status (standby/calling) of all the users existing in the simulation. Moreover, it allows observing status changes of various evaluation metrics (e.g., blocking probability) in realtime. In other words, it is possible to measure not only macroscopic results but also transient changes of status over time. Figure 2 shows the simulation screen. As a specific example, we selected a fireworks display for the simulation scenario. In this scenario, users move from a station in the vicinity of the fireworks site to the destination, and after the event is over, they walk back to the station. The blocking probability was evaluated for the two cases: the case in which our traffic control (influencing the users to move, wait, or change media) is applied, and the case in which no control is applied in a series of events from before the opening to the end- 35
3 ing of the fireworks display. The blocking Realtime display of evaluation metrics probability is determined as the number of blocked calls divided by the number of call attempts (including repeated calls). The simulation encompassed 2,500 individual agents (users). Each agent was set to make random calls independently at intervals of 2,000 to 5,000 seconds on average in order to generate traffic. In other words, we set the average number of call requests per second for all the users as a whole in the simulator to 0.5 to 1.25 requests per second to generate traffic enough to represent congested condition. Then, we observed changes in the characteristics Layout of base stations/train stations Zoomed view of agents mobility by changing the volume of traffic Figure 2 Simulation screen (degree of congestion). We set realistic values for the average holding time and interval between repeated 1.0 calls, 100 seconds and 15 seconds, respectively. Moreover, the average holding time at changing media was set to 1/10 of 0.8 No influence Move Wait Change media the normal time, i.e., 10 seconds. Figure 3 shows the blocking 0.6 probability characteristics obtained from the simulations. The results show that all the proposed methods of traffic control tend to decrease the blocking probability compared to the case where no control is applied. In particular, recommending to Change media results in a dramatic improvement when the traffic volume is large (high network load). On the other hand, Move and Wait are not so effective in the high load situation Traffic volume (average number of call requests per second) Figure 3 Blocking probability characteristics in terms of reducing the blocking probability. As a conse- quence of the lower blocking probability generated by our traffic control, the users can benefit from increased access to the this reason, we developed a model of the repeated call phenomenon and analyzed the traffic characteristics quantitatively. communication services. Repeated calls generated while influencing the user behaviors are complicatedly distributed and thus difficult to analyze. For this reason, it is important to understand the effects of repeated calls on the network performance evaluation quantitatively beforehand in order to design and operate such a system. 3.1 Theoretical Analysis Conventional methods of traffic analysis taking repeated calls into account have mainly been addressing the question of how much the blocking probability (evaluated using the Erlang- B formula) in a complete group loss system grows due to the presence of repeated calls. That is, the focus was on determining 3. Characteristics of Repeated Call Traffic To construct, operate and manage an information communication network, it is important to understand the effects of repeated calls, which facilitate congestion, quantitatively. For how high the extension of arrival ratio in the Poisson process should be set. Moreover, loss communication systems that include Markovian repeated calls have also been modeled and analyzed [2], but the models obtained are not suited for numerical calculation. Blocking probability 36
4 NTT DoCoMo Technical Journal Vol. 7 No.4 Arrival from outside the system (average arrival interval) Server group (service time) Yes Reattempt queue (average reattempt interval) Generation of repeated calls All servers are in use? Repeat calls? Yes To reattempt queue (ratio of reattempt) In this research, we incorporated the user behaviors in our model, whose calls were blocked from accessing services but do not wish to give up; these users are placed in a reattempt queue and wait for some time interval before repeating their service request (Figure 4). To analyze the results of this behavior, it is necessary to take into account reattempt queue and reattempt interval distribution (distribution of waiting time in the reattempt queue). The conditions we assumed in the analysis are shown below. The users calls arrive at the system independently and the interval of arrival follows an exponential distribution with parameter. If all servers (channels) are used, the users attempt repeated calls. The number of repeated calls varies depending on the user (and may, depending on the conditions, even vary for the same user). If the users are blocked from accessing a server, they repeat calls with a constant probability(0 1). The interval of repeating calls depends on the user and follows an exponential distribution with parameter. The service time when a user accesses to a server successfully (communication time) depends on the user and follows an exponential distribution with parameter µ. Using the model outlined above and obtaining the blocking probability and average waiting time by applying Little s formula * as well, we propose a new calculation method suited for numerical calculation [3]. No No Give up and exit the queue (ratio of giving up 1 ) Figure 4 Repeated call model Service completed 3.2 Simulation Analysis In conventional research, repeated calls meant redials where people would manually dial numbers again. For this reason, the reattempt interval was analyzed as an exponential distribution. Presently, however, it is possible to repeat calls using redial functions implemented in the terminals. Moreover, when the traffic is controlled by influencing user behavior, the characteristics of repeated calls vary depending on the method of influencing user behavior and become complicated. In the theoretical analysis, we assumed an exponential distribution for the reattempt interval distribution. However, when examining equipment design and traffic control, it is useful to estimate the influence of the reattempt interval distribution on the system performance by clarifying the effects on traffic characteristics by differences of reattempt interval distribution which is one of the user behaviors. For this reason, we evaluated the characteristics through simulation for four cases where the reattempt interval distribution is set to be an exponential distribution, a uniform distribution, 2-stage Erlang distribution and 2-stage hyper exponential distribution. As a result, it was found that the blocking probability (the ratio of customers giving up and withdrawing from the redial queue) does not depend on the reattempt interval distribution [3]. In other words, it became clear that it is necessary to measure the average reattempt interval as far as design, control and operation are conducted based only on the blocking probability, but it is not necessary to obtain any other statistical information. 4. Conclusion This article provided an overview of a traffic control method that relies on influencing user behavior by providing guiding information to them and investigated its effects. Characteristics of repeated calls which cause a congestion was also introduced. In the future, we intend to study how the customer satisfaction level can be quantified based on subjective evaluation using questionnaires, as well as methods for modeling the users communication activities. Moreover, we plan to further examine specific methods of influencing users, such as contents and delivery means of information to users, and evaluating them from the perspective of customer satisfaction. * Little s formula: If the arrival rate of user calls to a system is denotedand the average number of users waiting in the system denoted L, then the average waiting time from the time calls arrive at a system until processing is completed, W, is given by the relation W=L/. 37
5 References [1] S. Kaneda, Y. Akinaga, N. Shinagawa and A. Miura: Traffic Control by Influencing Users Behavior in Mobile Networks, The 19th International Teletraffic Congress, in Proc. 6a, pp , Aug [2] K. Udagawa and E. Miwa: A Complete Group of Trunks and Poissontype Repeated Calls which Influence It, The IEICE Transactions, Vol. 48, No. 10, pp.40 49, 1965 (in Japanese). [3] A. Takahashi, Y. Takahashi, S. Kaneda, Y. Akinaga and N. Shinagawa: The Robustness of Blocking Probability in a Loss System with Repeated Customers, Proc. ICETE2005, Vol. II, pp , Oct
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
SMS Roaming Service and SMS Interworking Service
SMS Roaming Service and SMS Interworking Service Takuya Shinozaki, Etsuko Matsubara, Masahiro Kadono and Mayumi Takahashi DoCoMo s SMS Roaming Service and SMS Interworking Service have been launched. It
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected]
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected] A great proportion of essential services are moving into internet space making the
Radio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. VII (Sep Oct. 2014), PP 65-70 Roulette Wheel Selection Model based on Virtual Machine Weight
CURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure
Hitachi Review Vol. 63 (2014), No. 1 18 Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure Kazuaki Iwamura Hideki Tonooka Yoshihiro Mizuno Yuichi Mashita OVERVIEW:
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Improved Passenger Services for Local Existing Railways Uchibo Line Transportation Management System (Operation Control and Passenger Services)
Hitachi Review Vol. 57 (2008), No. 1 51 Improved Services for Local Existing Railways Uchibo Line Transportation Management System (Operation Control and Services) Satoru Nagai Kenichi Yamada Satoshi Okada
REPEATABILITY ENHANCEMENTS OF TRAFFIC SIMULATOR BY INTRODUCTION OF TRAFFIC FLOW COMPENSATION METHODS
REPEATABILITY ENHANCEMENTS OF TRAFFIC SIMULATOR BY INTRODUCTION OF TRAFFIC FLOW COMPENSATION METHODS Hirofumi Ogami 1, Hajime Sakakibara 1, Shigeki Nishimura 1, Takeshi Setojima 2 1. Systems & Electronics
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Call Center Metrics: Glossary of Terms
Call Center Metrics: Glossary of Terms A. abandoned call. A call or other type of contact that has been offered into a communications network or telephone system but is terminated by the person originating
How To Understand The Performance Of A Cell Phone Network
Survivability Analysis for Mobile Cellular Networks David W. Tipper *, Chalermpol Charnsripinyo *, Hyundoo Shin * Teresa A. Dahlberg ** * Department of Information Science and Telecommunications, University
SMS-Based Alert Notification for Credit Applications Queuing Systems
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 9 No. 3 Nov. 2014, pp. 1291-1302 2014 Innovative Space of Scientific Research Journals http://www.ijias.issr-journals.org/ SMS-Based
Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations
56 Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Florin-Cătălin ENACHE
Evaluation of traffic control policy in disaster case. by using traffic simulation model
19th ITS World Congress, Vienna, Austria, 22/26 October 2012 AP-00345 Evaluation of traffic control policy in disaster case by using traffic simulation model DAISUKE OSHIMA 1*, SHINJI TANAKA 2, TAKASHI
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
The Analysis of Dynamical Queueing Systems (Background)
The Analysis of Dynamical Queueing Systems (Background) Technological innovations are creating new types of communication systems. During the 20 th century, we saw the evolution of electronic communication
LOAD BALANCING AND ADMISSION CONTROL OF A PARLAY X APPLICATION SERVER
This is an author produced version of a paper presented at the 17th Nordic Teletraffic Seminar (NTS 17), Fornebu, Norway, 25-27 August, 2004. This paper may not include the final publisher proof-corrections
CALL CENTER PERFORMANCE EVALUATION USING QUEUEING NETWORK AND SIMULATION
CALL CENTER PERFORMANCE EVALUATION USING QUEUEING NETWORK AND SIMULATION MA 597 Assignment K.Anjaneyulu, Roll no: 06212303 1. Introduction A call center may be defined as a service unit where a group of
Multi-agent System Learning Support Software with Fighting Games
, pp.13-22 http://dx.doi.org/10.14257/ijeic.2014.5.5.02 Multi-agent System Learning Support Software with Fighting Games Keitarou Busaki, Yasue Iijima and Susumu Konno Department of Electrical, Electronics
Simulation of Call Center With.
Chapter 4 4.1 INTRODUCTION A call center is a facility designed to support the delivery of some interactive service via telephone communications; typically an office space with multiple workstations manned
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science
The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback
The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback Hamada Alshaer Université Pierre et Marie Curie - Lip 6 7515 Paris, France [email protected]
Telephone Traffic Queues in a Customer Call Center. A Thesis. Presented for the. Master of Science Degree. The University of Tennessee at Chattanooga
Telephone Traffic Queues in a Customer Call Center A Thesis Presented for the Master of Science Degree The University of Tennessee at Chattanooga Patrick Todd April 2009 Copyright 2009 by Patrick Todd
Network Design Performance Evaluation, and Simulation #6
Network Design Performance Evaluation, and Simulation #6 1 Network Design Problem Goal Given QoS metric, e.g., Average delay Loss probability Characterization of the traffic, e.g., Average interarrival
Process simulation. Enn Õunapuu [email protected]
Process simulation Enn Õunapuu [email protected] Content Problem How? Example Simulation Definition Modeling and simulation functionality allows for preexecution what-if modeling and simulation. Postexecution
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
How To Share Bandwidth On A Diffserv Network
Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware
From Big Data to Smart Data How to improve public transport through modelling and simulation.
From Big Data to Smart Data How to improve public transport through modelling and simulation. Dr. Alex Erath, Pieter Fourie, Sergio Ordó ~ nez, Artem Chakirov FCL Research Module: Mobility and Transportation
A MODEL OF OPERATIONS CAPACITY PLANNING AND MANAGEMENT FOR ADMINISTRATIVE SERVICE CENTERS
A MODEL OF OPERATIONS CAPACITY PLANNING AND MANAGEMENT FOR ADMINISTRATIVE SERVICE CENTERS МОДЕЛ ЗА ПЛАНИРАНЕ И УПРАВЛЕНИЕ НА КАПАЦИТЕТА НА ОПЕРАЦИИТЕ В ЦЕНТЪР ЗА АДМИНИСТРАТИВНО ОБСЛУЖВАНЕ Yulia Yorgova,
How To Balance In A Distributed System
6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT CHECKING ACCOUNT ACTIVITY
one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT Navigate to https://portal.priorityonenet.com/ and log in to the PriorityOne portal account. If you would like your web browser to keep you
Enterprise Application Performance Management: An End-to-End Perspective
SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance
An Approach to Load Balancing In Cloud Computing
An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,
CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION
31 CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION 3.1 INTRODUCTION In this chapter, construction of queuing model with non-exponential service time distribution, performance
Analysis of Delayed Reservation Scheme in Server-based QoS Management Network
Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Takeshi Ikenaga Ý, Kenji Kawahara Ý, Tetsuya Takine Þ, and Yuji Oie Ý Ý Dept. of Computer Science and Electronics, Kyushu Institute
Exponential Approximation of Multi-Skill Call Centers Architecture
Exponential Approximation of Multi-Skill Call Centers Architecture Ger Koole and Jérôme Talim Vrije Universiteit - Division of Mathematics and Computer Science De Boelelaan 1081 a - 1081 HV Amsterdam -
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
CS556 Course Project Performance Analysis of M-NET using GSPN
Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software
There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.
ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Research Methods & Experimental Design
Research Methods & Experimental Design 16.422 Human Supervisory Control April 2004 Research Methods Qualitative vs. quantitative Understanding the relationship between objectives (research question) and
Performance advantages of resource sharing in polymorphic optical networks
R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from
VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN
1144 PAPER Special Section on Internet Technology and its Architecture for Ambient Information Systems VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN Yasufumi
A Multiple Access Protocol for Multimedia Transmission over Wireless Networks
A Multiple Access Protocol for Multimedia Transmission over Wireless Networks Hong Yu and Mohammed Arozullah Department of Electrical Engineering and Computer Science Capitol College, Maryland, USA [email protected]
Waiting Times Chapter 7
Waiting Times Chapter 7 1 Learning Objectives Interarrival and Service Times and their variability Obtaining the average time spent in the queue Pooling of server capacities Priority rules Where are the
Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology
Simulation and Analysis of Network Management Based on Mobile Agent Technology Juraj Pukšec, Student Member, IEEE, Darije Ramljak and Darko Huljenić, Member, IEEE Abstract This paper presents advantages
Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach
Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach William A. Massey ORFE Department Engineering Quadrangle, Princeton University Princeton, NJ 08544 K.
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks
A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any
Mobile Service Level Management System
MATSUNAGA Yasuhiko, ONO Takashi, SUGAWARA Hiroto, WATANABE Yoshinori, MOTOYOSHI Masahiro, NAKATA Takayuki Abstract In recent years, mobile phones are being used as important communication tools in the
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Performance Modeling of an Apache Web Server with Bursty Arrival Traffic
This is an author produced version of a paper presented at the 4th International Conference on Internet Computing (IC 3), June 23-26, 23, Las Vegas, Nevada. This paper has been peer-reviewed but may not
Periodic Capacity Management under a Lead Time Performance Constraint
Periodic Capacity Management under a Lead Time Performance Constraint N.C. Buyukkaramikli 1,2 J.W.M. Bertrand 1 H.P.G. van Ooijen 1 1- TU/e IE&IS 2- EURANDOM INTRODUCTION Using Lead time to attract customers
media kit 2014 Advertise Global Mobile Ad Network
media kit 2014 Advertise Global Mobile Ad Network WHY MOBILE ADVERTISING Proliferation of smartphone devices and tablets is shifting the way that customers use Internet, making advertising a key part of
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
SAP CRM 2007 - Campaign Automation
SAP CRM 2007 - Campaign Automation Applies to: SAP CRM 7.0 For more information, visit the Customer Relationship Management homepage Summary Campaign Automation is designed to help you in the increasingly
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling G. Boggia, P. Camarda, A. D Alconzo, A. De Biasi and M. Siviero DEE - Politecnico di Bari, Via E. Orabona, 4-7125
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Deployment of express checkout lines at supermarkets
Deployment of express checkout lines at supermarkets Maarten Schimmel Research paper Business Analytics April, 213 Supervisor: René Bekker Faculty of Sciences VU University Amsterdam De Boelelaan 181 181
Rule-based Traffic Management for Inbound Call Centers
Vrije Universiteit Amsterdam Research Paper Business Analytics Rule-based Traffic Management for Inbound Call Centers Auteur: Tim Steinkuhler Supervisor: Prof. Dr. Ger Koole October 7, 2014 Contents Preface
QUEUING THEORY. 1. Introduction
QUEUING THEORY RYAN BERRY Abstract. This paper defines the building blocks of and derives basic queuing systems. It begins with a review of some probability theory and then defines processes used to analyze
Is Truck Queuing Productive? Study of truck & shovel operations productivity using simulation platform MineDES
Is Truck Queuing Productive? Study of truck & shovel operations productivity using simulation platform MineDES Dmitry Kostyuk Specialist Scientist, Group Resource and Business Optimisation 25 November
Process Data: a Means to Measure Operational Performance and Implement Advanced Analytical Models
Process Data: a Means to Measure Operational Performance and Implement Advanced Analytical Models Pablo SANTIBAÑEZ a,1 Vincent S CHOW a John FRENCH a Martin L PUTERMAN b Scott TYLDESLEY a a British Columbia
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
EPISODE: AN EXTREME PROGRAMMING METHOD FOR INNOVATIVE SOFTWARE BASED ON SYSTEMS DESIGN AND ITS PRACTICAL STUDY
EPISODE: AN EXTREME PROGRAMMING METHOD FOR INNOVATIVE SOFTWARE BASED ON SYSTEMS DESIGN AND ITS PRACTICAL STUDY Takaaki Goto 1, Kensei Tsuchida 2 and Tetsuro Nishino 1 1 Graduate School of Informatics and
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Switch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
Contents. Specialty Answering Service. All rights reserved.
[Type text] Contents 1 Introduction... 3 2 Service Metrics... 5 2.1 Accessibility Metrics... 5 2.1.1 Blockage... 5 2.1.2 Hours of Operation... 5 2.1.3 Abandoned Calls... 5 2.2 Speed of Service... 6 2.2.1
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
Load Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
MTAT.03.231 Business Process Management (BPM) Lecture 6 Quantitative Process Analysis (Queuing & Simulation)
MTAT.03.231 Business Process Management (BPM) Lecture 6 Quantitative Process Analysis (Queuing & Simulation) Marlon Dumas marlon.dumas ät ut. ee Business Process Analysis 2 Process Analysis Techniques
Basic Queuing Relationships
Queueing Theory Basic Queuing Relationships Resident items Waiting items Residence time Single server Utilisation System Utilisation Little s formulae are the most important equation in queuing theory
Load Balancing in cloud computing
Load Balancing in cloud computing 1 Foram F Kherani, 2 Prof.Jignesh Vania Department of computer engineering, Lok Jagruti Kendra Institute of Technology, India 1 [email protected], 2 [email protected]
Performance Comparison of low-latency Anonymisation Services from a User Perspective
Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy
When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment
When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment Contents S1 An Industry in Transition Over the past few years, retail has seen seismic changes in how the customer shops.
