SlideShare a Scribd company logo
Traffic Behavior of Local Area Network Based on
M/M/1 Queuing Model Using Poisson and
Exponential Distribution
Amirali Rezaei
School of Postgraduate Studies
Asia Pacific University of Technology & Innovation (APU)
Technology Park Malaysia,
Bukit Jalil, 57000, Malaysia
Saadiah Yahya
Faculty of Computer and Mathematical science
Universiti Teknologi MARA (UiTM)
Shah Alam, Malaysia
Alireza Erfanian
Faculty of Computer Science and Information Technology
Universiti Putra Malaysia (UPM), 43400, Serdang
Selangor Darul Ehsan
Kayvan Atefi
Faculty of Computer and Mathematical sciences
Universiti Teknologi MARA (UiTM)
Shah Alam, Malaysia
Presented by:
Neeraj Baghel
2016 IEEE Region 10 Symposium (TENSYMP), Bali,
Indonesia
OUTLINE
• INTRODUCTION
• BACKGROUND OF STUDY
• NETWORK PERFORMANCE MEASUREMENT AND ANALYSIS
• DESIGN
• RESULTS
• SUGGESTIONS AND FUTURE WORK
• REFERENCES
INTRODUCTION
• Local Area Networks (LAN) is one of the most popular networks in which
its performance is very important for operators.
• The LAN method has been an essential infrastructure of numerous
companies and organizations for a long time.
• Thus, the issue to create the network topological structure continues to be
elevated for scientists and engineers to resolve, due to its foundational
status within the network application [14].
• LAN as a high-speed data network that spans in a small physical area.
Usually, workstations, printers, personal computers, servers, and other
network devices are connected through LAN.
• This provides a lot of advantages such as file transferring between users
communicating by Email and accessing shared devices and applications
BACKGROUND OF STUDY
A. Queuing Model
• In queuing theory, a queuing model can be used to approximate a genuine queuing situation
or system.
• Therefore, the queuing behavior could be analyzed mathematically.
• Queuing models allow numerous helpful steady condition performance measures to be
determined.
B. Single-Server Queues (M/M/1)
• The central element of the Single-Server Queues (M/M/1) is a server which provides some
service to items.
• Items from some population of items arrive at the system to be served.
• If the server is idle, an item is served immediately.
• Otherwise, an arriving item joins waiting in line.
• When the server has completed serving an item, the item departs.
• If there are items waiting in the queue, one is immediately dispatched to the server.
• The server in this model can represent anything that performs some function or service for a
collection of items.
For instance, a processor provides service to processes; a transmission line provides a
transmission service to packets or frames of data; an I/O device provides a read or write service for
I/O requests [8].
NETWORK PERFORMANCE
MEASUREMENT AND ANALYSIS
• It is very difficult to understand the cause-effect relationships of the Internet due to its size,
complexity and diversity. Measurement is essential for comprehending the behavior of the
system.
• A careful analysis is needed after measurement. Data analyzing in network also differs from
other disciplines.
• Developing and evaluating new techniques use measurement or analysis methods including
Queuing models and Simulation models.
• The different types of queuing systems are analyzed to determine performance measures from
the description of the system. Since a queuing model represents a dynamic system, the values
of the performance measures vary with time.
DELAY (w)
• One of the most important performance characteristics of network is delay.
• Delay is defined as the time consumed for a bit of data to travel through the network from one
node to another.
• The end-to-end delay is the average time consumed from sending a packet by the source and
receiving it at the destination.
• The waiting time is the time that a job spends in a queue waiting to be serviced.
• Delay in queuing WQ is given by:
UTILIZATION (ρ)
• The queuing system is considered in server utilization.
• The percentage of time in which the server is busy to process jobs during a simulation is
known as server utilization.
• If the queuing system consists of a single server, then the utilization is the fraction of the time
in which the server is busily occupied.
• The server utilization is given by
THROUGHPUT (λ)
• Network throughput is the average rate of a successful message transfer through a media.
• The system throughput is also known as the sum of data rates delivered to all terminals in the
network.
• The system throughput can be evaluated using mathematical queuing theory.
• In this theory, the arrival rate λ indicates the load in packets per time unit and departure rate μ
indicates the throughput in packets per time unit.
• Since the departure rate is equal to the arrival rate λ for a queuing system in statistical
equilibrium.
• The throughput is given by:
Network load
• Network load is principally caused by the bandwidth used, buffer availability and processing
time at intermediate nodes.
• Indeed, network load is really a key parameter that has a potentially large effect on network
methods.
• Besides, network load accounts for traffic delay and it is sometimes wrongly identified as
congestion.
Distribution
There are some distributions in this study that will focus on Poisson and Exponential
distribution:
A Poisson distribution
• Poisson distribution in probability theory and statistics can be defined as a discrete probability
distribution that shows the probability of a number of events with a known average rate
occurring in a fixed period of time and independent of the last event time.
• It can be applied to events with other definite intervals such as distance, area or volume.
• On the other hand, [13] discussed that Poisson distribution arises when a number of events are
counted across time or over an area.
• The Poisson distribution is commonly used when the occurrences are independent.
• Therefore, when the average frequency of occurrence is known, a sample occurrence cannot
change the chance of other occurrences.
Distribution
B Exponential Distribution
• The exponential distribution in probability theory of statistics is a kind of continuous
probability distributions.
• The time between events in a Poisson process can be defined by exponential distribution.
• Furthermore the exponential distribution is really a group of continuous probability
distributions.
• It describes time between occasions inside a Poisson process, i.e. a procedure by which
occasions occur continuously and individually in a constant average rate [6].
Network load
• Network load is principally caused by the bandwidth used, buffer availability and processing
time at intermediate nodes.
• Indeed, network load is really a key parameter that has a potentially large effect on network
methods.
• Besides, network load accounts for traffic delay and it is sometimes wrongly identified as
congestion.
DESIGN
Table I illustrates the parameters used in testing the packet
size of Poisson and Exponential which is 320(bits). The type
of model is Ethernet station while the type of connection is
100BaseT with its data rate as 100,000,000.
RESULTS
This phase compares and analyzes the two scenarios together which are
Scenario 1 (Poisson) and Scenario 2 (Exponential).
The mentioned five parameters are analyzed in the following section.
A. Delay
B. Load
C. Traffic Received
D. Utilization
E. Throughput
A. Delay
• Figure 1 shows the comparison
results between two scenarios
in the field of delay. Scenario 1
is on Poisson distribution while
scenario 2 is Exponential.
• Maximum delay recorded in
scenario 1 is at 15 minutes that is
0.0001075, and for scenario 2
the maximum delay stated is
6.5 minutes that is 0.0001045.
• Figure 1 shows that the delay in
Poisson distribution is higher
than that in exponential
distribution.
Exponential
Poisson
Time
Fig 1 Delay
Delay
/ Sec
B. Load
• Figure 2 shows the load
arameter for the scenarios. As
can be seen in the figure, the
maximum load recorded for
scenario 2 is 280 bits/second
while the minimum is 99
bits/second.
• This is different for scenario 1
where the maximum load is
only 99 bit/second while the
minimum is 30 bits/second.
• According to Figure 2,
Exponential had a higher load
compared to that of Poisson
Exponential
Poisson
Time
Fig 2 Load
Bits /
Sec
C. Traffic Received
• The following Figure 3
illustrates that traffic received
for Exponential is higher
compared to Poisson.
• The maximum traffic received
for scenario 2 (Exponential) is
362 bits/second compared to
265 bits/second for Poisson
(scenario 1).
• But in the 5th minute, the same
volumes of traffic are received
for both.
Exponential
Poisson
Time
Fig 3 Traffic
Recieved
Bits/
Sec
D. Utilization
• Figure 4 shows the utilization
for the scenarios. As can be
seen, the maximum utilization
for scenario 2 is 0.00140 while
the minimum is 0.00030.
• This is different for scenario 1
where the maximum utilization
is only 0.00080 while the
minimum is 0.00030.
• According to Figure
4,Exponential had a higher
utilization compared to
Poisson.
Exponential
Poisson
Time
Fig 4 Utilization
Bits /
Sec
E. Throughput
• Figure 5 shows the throughput
for the scenarios.
• As can be seen, the maximum
throughput for scenario 2 is 0.5
(packet/sec) while the
minimum is 0.12 (packet/sec).
• This is different for scenario 1
where the maximum
throughput is only 0.31
(packet/sec) while the
minimum is 0.12 (packet/sec).
• According to Figure 5,
Exponential had a higher
throughput compared to
Poisson.
Exponential
Poisson
Time
Fig 5 Throughput
Bits /
Sec
SUGGESTIONS AND FUTURE WORK
There are many distributions that have not yet been studied, such as Bernoulli
distribution, binomial distribution, geometric distribution, negative binomial
distribution and discrete uniform distribution.
In addition, other parameters can also be applied such as traffic send, data loss
and jitter.
REFERENCES
[1] Periklis C., A. C. B. (2007). Performance Analysis of IEEE 802.11 DCF in
Presence of Transmission Errors. IEEE Communications Society.
[2] Wu Bin, Z. H., Sun He. (2008). Research on Multilevel Control Model of
Network Performance Based on Multi-Agent. International Conference
on Advanced Computer Control/IEEE.
[3] Shu-Gang L., H. F., Jin-Jiang L. (2003). Application of Event Graph in
Network Performance Analysis. Proceedings of the Second International
Conference on Machine Learning and Cybernedcs.
[4] Bradley W. S, S. W. H., Jeffery A. K, and Stephen W. P. (2011).
Diagnosing Anomalous Network Performance with Confidence.
International Symposium on Cluster, Cloud and Grid Computing/IEEE.
REFERENCES
[5] Gunter B, S. G., Hermam D. M., Krisher S. T. (2006). Queuing networks
and Markov chains: modeling and performance evaluation.
[6] Daniel F., Schmidt E. M. (2009). Universal Models for the Exponential
Distribution. Monash University Clayton School of Information
Technology/IEEE.
[7] Merike K., (2003). Designing Network Security, 2nd Edition. Cisco Press
[8] William S., (2000). Data and Computer Communications, 5th Ed.
Universidade do Minho – Dep. Informática - Campus de Gualtar.
[9] Lambert M. S, Miriam T. T, Susan F. M. (2010). Queuing Theory (First
ed.): Betascript Publishing.
REFERENCES
[10] Rajender K. Brahmjit S (2010). EVM as Generic Qos Trigger for
Heterogeneous Wireless Overlay Networks. International Journal of
Wireless & Mobile Networks (IJWMN). DOI: 10.5121/ijwmn.2010.2315
[11] Ivo A., Jacques R. (2002). Queuing Theory. Eindhoven University of
Technology.
[12] Adriano G., Chris G. (2009). A New Metric for Network Load and
Equation of State, In Proceedings of IEEE Computer Society (ICNS09),
Valencia, Spain
[13] Bernard A. R. (2006), Fundamentals of Biostatistics (sixth edition).
Cengage Learning, THOMSON.
[14] Fei T., Gang Z. (2009), the Research of an Approach to Design Local
Area Network Topology Based on Genetic Algorithm. Second
International Symposium on Computational Intelligence and Design.
ISBN: 978-0-7695-3865-5
REFERENCES
[15] Munir B. S., Abhik C., S. L. Nalbalwar, K. T. Subramanian (2010).
Novel Approach to Improve QoS of a Multiple Server Queue. Int. J.
Communications, Network and System Sciences.
doi:10.4236/ijcns.2010.31012
[16] Geoff H., Telstra (2014). Measuring IP Network Performance, Volume 6,
Number 1. Access date 2/12/2014. Retrieved at:
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-
1/measuring_ip.html
THANK YOU

More Related Content

What's hot

Task communication
Task communicationTask communication
Task communication
1jayanti
 
8085 interfacing with memory chips
8085 interfacing with memory chips8085 interfacing with memory chips
8085 interfacing with memory chips
Srikrishna Thota
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
Nv Thejaswini
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Tanzila Islam
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Sajib 201-15-3773-encoder
Sajib 201-15-3773-encoderSajib 201-15-3773-encoder
Sajib 201-15-3773-encoder
SajibBormon1
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
naimish12
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
Wayne Jones Jnr
 
PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)
vishnudharan11
 
State Space Representation and Search
State Space Representation and SearchState Space Representation and Search
State Space Representation and Search
Hitesh Mohapatra
 
AI 7 | Constraint Satisfaction Problem
AI 7 | Constraint Satisfaction ProblemAI 7 | Constraint Satisfaction Problem
AI 7 | Constraint Satisfaction Problem
Mohammad Imam Hossain
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controllerTech_MX
 
Huffman Coding Algorithm Presentation
Huffman Coding Algorithm PresentationHuffman Coding Algorithm Presentation
Huffman Coding Algorithm Presentation
Akm Monir
 
Successive approximation
Successive approximationSuccessive approximation
Successive approximation
Amit Kumar Mohapatra
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
Jignesh Navdiya
 
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSORTRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
Subash Sambath Kumar
 
Introduction to Dynamic Programming, Principle of Optimality
Introduction to Dynamic Programming, Principle of OptimalityIntroduction to Dynamic Programming, Principle of Optimality
Introduction to Dynamic Programming, Principle of Optimality
Bhavin Darji
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Distributed Multimedia Systems(DMMS)
Distributed Multimedia Systems(DMMS)Distributed Multimedia Systems(DMMS)
Distributed Multimedia Systems(DMMS)
Nidhi Baranwal
 

What's hot (20)

Task communication
Task communicationTask communication
Task communication
 
8085 interfacing with memory chips
8085 interfacing with memory chips8085 interfacing with memory chips
8085 interfacing with memory chips
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Sajib 201-15-3773-encoder
Sajib 201-15-3773-encoderSajib 201-15-3773-encoder
Sajib 201-15-3773-encoder
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)
 
State Space Representation and Search
State Space Representation and SearchState Space Representation and Search
State Space Representation and Search
 
AI 7 | Constraint Satisfaction Problem
AI 7 | Constraint Satisfaction ProblemAI 7 | Constraint Satisfaction Problem
AI 7 | Constraint Satisfaction Problem
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 
Huffman Coding Algorithm Presentation
Huffman Coding Algorithm PresentationHuffman Coding Algorithm Presentation
Huffman Coding Algorithm Presentation
 
Successive approximation
Successive approximationSuccessive approximation
Successive approximation
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSORTRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
TRAFFIC LIGHT CONTROL SYSTEM USING 8085 MICROPROCESSOR
 
Introduction to Dynamic Programming, Principle of Optimality
Introduction to Dynamic Programming, Principle of OptimalityIntroduction to Dynamic Programming, Principle of Optimality
Introduction to Dynamic Programming, Principle of Optimality
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
Distributed Multimedia Systems(DMMS)
Distributed Multimedia Systems(DMMS)Distributed Multimedia Systems(DMMS)
Distributed Multimedia Systems(DMMS)
 

Similar to Traffic behavior of local area network based on

performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
ABYTHOMAS46
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
University of Technology - Iraq
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
JAIGANESH SEKAR
 
Transport laye
Transport laye Transport laye
Transport laye
Sammer Qader
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
eSAT Publishing House
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
ABYTHOMAS46
 
Transport layer
Transport layerTransport layer
Transport layer
Bathshebaparimala
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
ijceronline
 
I1102014953
I1102014953I1102014953
I1102014953
IOSR Journals
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
Harsh Patel
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
CSCJournals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
eSAT Publishing House
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
eSAT Journals
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
Kaivalya Shah
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
IRJET Journal
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
eSAT Publishing House
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
IJERA Editor
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale1
 

Similar to Traffic behavior of local area network based on (20)

Transport layer
Transport layerTransport layer
Transport layer
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Transport laye
Transport laye Transport laye
Transport laye
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
I1102014953
I1102014953I1102014953
I1102014953
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
Paper Review: ENERGY-EFFICIENT WIRELESS COMMUNICATIONS TUTORIAL, SURVEY, AND ...
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 

More from NEERAJ BAGHEL

Generating super resolution images using transformers
Generating super resolution images using transformersGenerating super resolution images using transformers
Generating super resolution images using transformers
NEERAJ BAGHEL
 
Mtech Fourth progress presentation
Mtech Fourth progress presentationMtech Fourth progress presentation
Mtech Fourth progress presentation
NEERAJ BAGHEL
 
M.tech Third progress Presentation
M.tech Third progress PresentationM.tech Third progress Presentation
M.tech Third progress Presentation
NEERAJ BAGHEL
 
Latex intro
Latex introLatex intro
Latex intro
NEERAJ BAGHEL
 
Hierarchical structure adaptive
Hierarchical structure adaptiveHierarchical structure adaptive
Hierarchical structure adaptive
NEERAJ BAGHEL
 
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
Mtech Second progresspresentation ON VIDEO SUMMARIZATIONMtech Second progresspresentation ON VIDEO SUMMARIZATION
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
NEERAJ BAGHEL
 
Unsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoderUnsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoder
NEERAJ BAGHEL
 
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATION
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATIONMtech First progress PRESENTATION ON VIDEO SUMMARIZATION
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATION
NEERAJ BAGHEL
 
Host rank:Exploiting the Hierarchical Structure for Link Analysis
Host rank:Exploiting the Hierarchical Structure for Link AnalysisHost rank:Exploiting the Hierarchical Structure for Link Analysis
Host rank:Exploiting the Hierarchical Structure for Link Analysis
NEERAJ BAGHEL
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using Titles
NEERAJ BAGHEL
 
Query focused video summarization
Query focused video summarizationQuery focused video summarization
Query focused video summarization
NEERAJ BAGHEL
 
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
A Framework For Dynamic Hand Gesture Recognition Using Key Frames ExtractionA Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
NEERAJ BAGHEL
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
NEERAJ BAGHEL
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
NEERAJ BAGHEL
 
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)
NEERAJ BAGHEL
 
Itvv project ppt
Itvv project pptItvv project ppt
Itvv project ppt
NEERAJ BAGHEL
 

More from NEERAJ BAGHEL (16)

Generating super resolution images using transformers
Generating super resolution images using transformersGenerating super resolution images using transformers
Generating super resolution images using transformers
 
Mtech Fourth progress presentation
Mtech Fourth progress presentationMtech Fourth progress presentation
Mtech Fourth progress presentation
 
M.tech Third progress Presentation
M.tech Third progress PresentationM.tech Third progress Presentation
M.tech Third progress Presentation
 
Latex intro
Latex introLatex intro
Latex intro
 
Hierarchical structure adaptive
Hierarchical structure adaptiveHierarchical structure adaptive
Hierarchical structure adaptive
 
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
Mtech Second progresspresentation ON VIDEO SUMMARIZATIONMtech Second progresspresentation ON VIDEO SUMMARIZATION
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
 
Unsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoderUnsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoder
 
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATION
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATIONMtech First progress PRESENTATION ON VIDEO SUMMARIZATION
Mtech First progress PRESENTATION ON VIDEO SUMMARIZATION
 
Host rank:Exploiting the Hierarchical Structure for Link Analysis
Host rank:Exploiting the Hierarchical Structure for Link AnalysisHost rank:Exploiting the Hierarchical Structure for Link Analysis
Host rank:Exploiting the Hierarchical Structure for Link Analysis
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using Titles
 
Query focused video summarization
Query focused video summarizationQuery focused video summarization
Query focused video summarization
 
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
A Framework For Dynamic Hand Gesture Recognition Using Key Frames ExtractionA Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
 
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)
 
Itvv project ppt
Itvv project pptItvv project ppt
Itvv project ppt
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Traffic behavior of local area network based on

  • 1. Traffic Behavior of Local Area Network Based on M/M/1 Queuing Model Using Poisson and Exponential Distribution Amirali Rezaei School of Postgraduate Studies Asia Pacific University of Technology & Innovation (APU) Technology Park Malaysia, Bukit Jalil, 57000, Malaysia Saadiah Yahya Faculty of Computer and Mathematical science Universiti Teknologi MARA (UiTM) Shah Alam, Malaysia Alireza Erfanian Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM), 43400, Serdang Selangor Darul Ehsan Kayvan Atefi Faculty of Computer and Mathematical sciences Universiti Teknologi MARA (UiTM) Shah Alam, Malaysia Presented by: Neeraj Baghel 2016 IEEE Region 10 Symposium (TENSYMP), Bali, Indonesia
  • 2. OUTLINE • INTRODUCTION • BACKGROUND OF STUDY • NETWORK PERFORMANCE MEASUREMENT AND ANALYSIS • DESIGN • RESULTS • SUGGESTIONS AND FUTURE WORK • REFERENCES
  • 3. INTRODUCTION • Local Area Networks (LAN) is one of the most popular networks in which its performance is very important for operators. • The LAN method has been an essential infrastructure of numerous companies and organizations for a long time. • Thus, the issue to create the network topological structure continues to be elevated for scientists and engineers to resolve, due to its foundational status within the network application [14]. • LAN as a high-speed data network that spans in a small physical area. Usually, workstations, printers, personal computers, servers, and other network devices are connected through LAN. • This provides a lot of advantages such as file transferring between users communicating by Email and accessing shared devices and applications
  • 4. BACKGROUND OF STUDY A. Queuing Model • In queuing theory, a queuing model can be used to approximate a genuine queuing situation or system. • Therefore, the queuing behavior could be analyzed mathematically. • Queuing models allow numerous helpful steady condition performance measures to be determined. B. Single-Server Queues (M/M/1) • The central element of the Single-Server Queues (M/M/1) is a server which provides some service to items. • Items from some population of items arrive at the system to be served. • If the server is idle, an item is served immediately. • Otherwise, an arriving item joins waiting in line. • When the server has completed serving an item, the item departs. • If there are items waiting in the queue, one is immediately dispatched to the server. • The server in this model can represent anything that performs some function or service for a collection of items. For instance, a processor provides service to processes; a transmission line provides a transmission service to packets or frames of data; an I/O device provides a read or write service for I/O requests [8].
  • 5. NETWORK PERFORMANCE MEASUREMENT AND ANALYSIS • It is very difficult to understand the cause-effect relationships of the Internet due to its size, complexity and diversity. Measurement is essential for comprehending the behavior of the system. • A careful analysis is needed after measurement. Data analyzing in network also differs from other disciplines. • Developing and evaluating new techniques use measurement or analysis methods including Queuing models and Simulation models. • The different types of queuing systems are analyzed to determine performance measures from the description of the system. Since a queuing model represents a dynamic system, the values of the performance measures vary with time.
  • 6. DELAY (w) • One of the most important performance characteristics of network is delay. • Delay is defined as the time consumed for a bit of data to travel through the network from one node to another. • The end-to-end delay is the average time consumed from sending a packet by the source and receiving it at the destination. • The waiting time is the time that a job spends in a queue waiting to be serviced. • Delay in queuing WQ is given by:
  • 7. UTILIZATION (ρ) • The queuing system is considered in server utilization. • The percentage of time in which the server is busy to process jobs during a simulation is known as server utilization. • If the queuing system consists of a single server, then the utilization is the fraction of the time in which the server is busily occupied. • The server utilization is given by
  • 8. THROUGHPUT (λ) • Network throughput is the average rate of a successful message transfer through a media. • The system throughput is also known as the sum of data rates delivered to all terminals in the network. • The system throughput can be evaluated using mathematical queuing theory. • In this theory, the arrival rate λ indicates the load in packets per time unit and departure rate μ indicates the throughput in packets per time unit. • Since the departure rate is equal to the arrival rate λ for a queuing system in statistical equilibrium. • The throughput is given by:
  • 9. Network load • Network load is principally caused by the bandwidth used, buffer availability and processing time at intermediate nodes. • Indeed, network load is really a key parameter that has a potentially large effect on network methods. • Besides, network load accounts for traffic delay and it is sometimes wrongly identified as congestion.
  • 10. Distribution There are some distributions in this study that will focus on Poisson and Exponential distribution: A Poisson distribution • Poisson distribution in probability theory and statistics can be defined as a discrete probability distribution that shows the probability of a number of events with a known average rate occurring in a fixed period of time and independent of the last event time. • It can be applied to events with other definite intervals such as distance, area or volume. • On the other hand, [13] discussed that Poisson distribution arises when a number of events are counted across time or over an area. • The Poisson distribution is commonly used when the occurrences are independent. • Therefore, when the average frequency of occurrence is known, a sample occurrence cannot change the chance of other occurrences.
  • 11. Distribution B Exponential Distribution • The exponential distribution in probability theory of statistics is a kind of continuous probability distributions. • The time between events in a Poisson process can be defined by exponential distribution. • Furthermore the exponential distribution is really a group of continuous probability distributions. • It describes time between occasions inside a Poisson process, i.e. a procedure by which occasions occur continuously and individually in a constant average rate [6].
  • 12. Network load • Network load is principally caused by the bandwidth used, buffer availability and processing time at intermediate nodes. • Indeed, network load is really a key parameter that has a potentially large effect on network methods. • Besides, network load accounts for traffic delay and it is sometimes wrongly identified as congestion.
  • 13. DESIGN Table I illustrates the parameters used in testing the packet size of Poisson and Exponential which is 320(bits). The type of model is Ethernet station while the type of connection is 100BaseT with its data rate as 100,000,000.
  • 14. RESULTS This phase compares and analyzes the two scenarios together which are Scenario 1 (Poisson) and Scenario 2 (Exponential). The mentioned five parameters are analyzed in the following section. A. Delay B. Load C. Traffic Received D. Utilization E. Throughput
  • 15. A. Delay • Figure 1 shows the comparison results between two scenarios in the field of delay. Scenario 1 is on Poisson distribution while scenario 2 is Exponential. • Maximum delay recorded in scenario 1 is at 15 minutes that is 0.0001075, and for scenario 2 the maximum delay stated is 6.5 minutes that is 0.0001045. • Figure 1 shows that the delay in Poisson distribution is higher than that in exponential distribution. Exponential Poisson Time Fig 1 Delay Delay / Sec
  • 16. B. Load • Figure 2 shows the load arameter for the scenarios. As can be seen in the figure, the maximum load recorded for scenario 2 is 280 bits/second while the minimum is 99 bits/second. • This is different for scenario 1 where the maximum load is only 99 bit/second while the minimum is 30 bits/second. • According to Figure 2, Exponential had a higher load compared to that of Poisson Exponential Poisson Time Fig 2 Load Bits / Sec
  • 17. C. Traffic Received • The following Figure 3 illustrates that traffic received for Exponential is higher compared to Poisson. • The maximum traffic received for scenario 2 (Exponential) is 362 bits/second compared to 265 bits/second for Poisson (scenario 1). • But in the 5th minute, the same volumes of traffic are received for both. Exponential Poisson Time Fig 3 Traffic Recieved Bits/ Sec
  • 18. D. Utilization • Figure 4 shows the utilization for the scenarios. As can be seen, the maximum utilization for scenario 2 is 0.00140 while the minimum is 0.00030. • This is different for scenario 1 where the maximum utilization is only 0.00080 while the minimum is 0.00030. • According to Figure 4,Exponential had a higher utilization compared to Poisson. Exponential Poisson Time Fig 4 Utilization Bits / Sec
  • 19. E. Throughput • Figure 5 shows the throughput for the scenarios. • As can be seen, the maximum throughput for scenario 2 is 0.5 (packet/sec) while the minimum is 0.12 (packet/sec). • This is different for scenario 1 where the maximum throughput is only 0.31 (packet/sec) while the minimum is 0.12 (packet/sec). • According to Figure 5, Exponential had a higher throughput compared to Poisson. Exponential Poisson Time Fig 5 Throughput Bits / Sec
  • 20. SUGGESTIONS AND FUTURE WORK There are many distributions that have not yet been studied, such as Bernoulli distribution, binomial distribution, geometric distribution, negative binomial distribution and discrete uniform distribution. In addition, other parameters can also be applied such as traffic send, data loss and jitter.
  • 21. REFERENCES [1] Periklis C., A. C. B. (2007). Performance Analysis of IEEE 802.11 DCF in Presence of Transmission Errors. IEEE Communications Society. [2] Wu Bin, Z. H., Sun He. (2008). Research on Multilevel Control Model of Network Performance Based on Multi-Agent. International Conference on Advanced Computer Control/IEEE. [3] Shu-Gang L., H. F., Jin-Jiang L. (2003). Application of Event Graph in Network Performance Analysis. Proceedings of the Second International Conference on Machine Learning and Cybernedcs. [4] Bradley W. S, S. W. H., Jeffery A. K, and Stephen W. P. (2011). Diagnosing Anomalous Network Performance with Confidence. International Symposium on Cluster, Cloud and Grid Computing/IEEE.
  • 22. REFERENCES [5] Gunter B, S. G., Hermam D. M., Krisher S. T. (2006). Queuing networks and Markov chains: modeling and performance evaluation. [6] Daniel F., Schmidt E. M. (2009). Universal Models for the Exponential Distribution. Monash University Clayton School of Information Technology/IEEE. [7] Merike K., (2003). Designing Network Security, 2nd Edition. Cisco Press [8] William S., (2000). Data and Computer Communications, 5th Ed. Universidade do Minho – Dep. Informática - Campus de Gualtar. [9] Lambert M. S, Miriam T. T, Susan F. M. (2010). Queuing Theory (First ed.): Betascript Publishing.
  • 23. REFERENCES [10] Rajender K. Brahmjit S (2010). EVM as Generic Qos Trigger for Heterogeneous Wireless Overlay Networks. International Journal of Wireless & Mobile Networks (IJWMN). DOI: 10.5121/ijwmn.2010.2315 [11] Ivo A., Jacques R. (2002). Queuing Theory. Eindhoven University of Technology. [12] Adriano G., Chris G. (2009). A New Metric for Network Load and Equation of State, In Proceedings of IEEE Computer Society (ICNS09), Valencia, Spain [13] Bernard A. R. (2006), Fundamentals of Biostatistics (sixth edition). Cengage Learning, THOMSON. [14] Fei T., Gang Z. (2009), the Research of an Approach to Design Local Area Network Topology Based on Genetic Algorithm. Second International Symposium on Computational Intelligence and Design. ISBN: 978-0-7695-3865-5
  • 24. REFERENCES [15] Munir B. S., Abhik C., S. L. Nalbalwar, K. T. Subramanian (2010). Novel Approach to Improve QoS of a Multiple Server Queue. Int. J. Communications, Network and System Sciences. doi:10.4236/ijcns.2010.31012 [16] Geoff H., Telstra (2014). Measuring IP Network Performance, Volume 6, Number 1. Access date 2/12/2014. Retrieved at: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6- 1/measuring_ip.html