Comparative Analysis of RED Queue Variants for Data Traffic Reduction Over Wireless Network

Author(s):  
Dharmendrasinh D. Zala ◽  
Ajay Kumar Vyas
2017 ◽  
Vol 13 (02) ◽  
pp. 34 ◽  
Author(s):  
Varun Tiwari ◽  
Avinash Keskar ◽  
NC Shivaprakash

Designing an Internet of Things (IoT) enabled environment requires integration of various things/devices. Integrating these devices require a generalized approach as these devices can have different communication protocols. In this paper, we have proposed generalized nodes for connecting various devices. These nodes are capable of creating a scalable local wireless network that connects to the cloud through a network gateway. The nodes also support over the air programming to re-configure the network from the cloud. As number of devices connected to the cloud increases, the network traffic also increases. In order to reduce the network traffic we have used different data transfer schemes for the network. We have also proposed an event-based data transfer scheme for situations where there is low probability of change in sensor value. The experimental results shows that the event-based scheme reduces the data traffic by up to 48% under practical conditions without any loss of information compared to priority based data transfer. We have also shown that the proposed scheme is more reliable for data transfer in a large network with a success rate of 99.5% measured over 200 minutes for 1201 data packets.


2014 ◽  
Vol 989-994 ◽  
pp. 5419-5422
Author(s):  
Hai Yan Hu ◽  
Hui Yan

As a breakthrough in teaching methods, the teaching system for CDIO talents training is extended to the Android mobile phone platform for engineering talents training better. This paper focuses on constructing the teaching system for CDIO talents training on the Android mobile platform, Hash digest algorithm is applied to the synchronization management of Android platform-based CDIO teaching system databases, significantly reduces the data traffic on the wireless network, and greatly enhances the data interaction between the embedded devices and servers. This application also dramatically reduces the number of write operations on the memory stack and improves the performance of the I/O read-write efficiency of the memory stack.


2022 ◽  
Vol 70 (1) ◽  
pp. 1769-1780
Author(s):  
Hye-Min Kwon ◽  
Seng-Phil Hong ◽  
Mingoo Kang ◽  
Jeongwook Seo

Respati ◽  
2017 ◽  
Vol 8 (24) ◽  
Author(s):  
M. Agung Nugroho ◽  
Emma Utami ◽  
Sudarmawan Sudarmawan

The high usage of wireless network will affect the level of data traffic. if there are multiple users to request a connection with the limited capacity of the connection between the user simultaneously then it will wait for their turn in the connect. The simple solution for institutions by adding capacity or bandwidth. But by adding bandwidth, the cost is also quite large. End-to-end monitoring method allows a provider to determine the quality of service QoS using actual data from the availability of services. This information in turn can be useful to know the characteristics of the use of the service, so that the results of monitoring in the form of hotspot service profile may be a reference to determine the user's perception. The final results of this research is profile of network quality service of UGM-Hotspot on PPTIK UGM. It could be a reference to improve QoS, and reference for making policy-based network management. Keyword : QoS, hattingh standard, end-to-end monitoring, wireless network, quality of services


2015 ◽  
Vol 719-720 ◽  
pp. 687-690
Author(s):  
Jian Guan ◽  
Xin Zhou Cheng

This paper analyzes the disequilibrium of wireless network data traffic, gives analysis and research methods for regional disequilibrium and time disequilibrium characteristics, and proposes a data traffic prediction method for regional users in consideration of redundant traffic.


2006 ◽  
Vol 3 (2) ◽  
pp. 97-113 ◽  
Author(s):  
Radomir Prodanovic ◽  
Dejan Simic

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.


Sign in / Sign up

Export Citation Format

Share Document