Analysis of Finite Source Traffic Model of Wireless LAN: A Case Study
DOI:
https://doi.org/10.18196/jet.1103Keywords:
traffic, traffic engineering, wireless LAN, action point.Abstract
Investigating characteristics of users and their pattern to access networks are parts of important points in traffic engineering. In this paper, those problems, specifically in wireless LAN, were observed and some related theories were explored. The observation was done in UMY, a campus located in Yogyakarta, Indonesia. In this term, we examined the traffic in an Wireless Action Point. Resuming the content of this paper, we found that the traffic had unique characteristics. For instance, during the day of measurement, the peaks of traffic were in the morning and in the afternoon. Average connected clients in all action points in UMY was between 2500 and 3000 users. When we selected an AP, the characteristic of the AP was examined, the number data size are 62.99 MB and 129.22 MB for mean and standard deviation respectively. We found that hourly trend of the usage of APs resembled self-similar model.
References
Xu, S., Chen, X., Wei, G., Wang, D. (2009). Research of Traffic Modeling for Future Wireless Networks. 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, page 1 – 6 DOI: 10.1109/WICOM.2009.5301728
Papadopouli, M., Shen, H., Spanakis, M. (2005). Modeling client arrivals at access points in wireless campus-wide networks. 2005 14th IEEE Workshop on Local & Metropolitan Area Networks, DOI: 10.1109/LANMAN.2005.1541514
Ghosh, A. , Jana, R., Ramaswami, V., Roland, J. Shankaranarayanan, N.K. (2011). Modeling and Characterization of Large-Scale Wi-fi Traffic in Public Hot-Spots. 2011 Proceedings IEEE INFOCOM page 2921–2929 DOI: 10.1109/INFCOM.2011.5935132
Wang, X., Popstojanova, K.G. (2009). Modeling Web Request and Session Level Arrivals. 2009 International Conference on Advanced Information Networking and Applications.
Paxson, V., Floyd, S. (1994) Wide-area traffic: the failure of poisson modeling. Proceedings of the conference on Communications architectures, protocols and applications, pages 257–268, New York, NY, USA
Leland, W.E, Taqqu, M.S, Willinger, W., Wilson, D.V. (1994). On the self-similar nature of ethernet traffic (extended version).IEEE/ACM Transactions on Networking, 2(1):1–15.
Willinger, W., Taqqu, M. S., Leland, W. E, Wilson, D.V. (1995) Self-similarity in high-speed packet traffic: Analysis and modeling of ethernet traffic measurements. Statistical Science, 10(1):67–85.
Willinger, W., Taqqu, M. S., Sherman, R., Wilson, D.V. (1997). Self-similarity through high-variability: statistical analysis of ethernet lan traffic at the source level. IEEE/ACM Transactions on Networking, 5(1):71–86.
Lee, Y, Kim, J. (2008). Characterization of Large- Scale SMTP Traffic: the Coexistence of the Poisson Process and Self-Similarity. MASCOT 2008. International Symposium on Modelling, Analysis, and Simulation of Computers and Telecommunication Systems. DOI:10.1109/ MASCOT.2008.4770573
Couto da Silva, A.P, Meo, M., Marsan, M.A.(2012). Energy-performance trade-off in dense WLANs: A queuing study, Computer Networks 56 (2012) 2522 – 2537 http://dx.doi.org/10.1016/j.comnet.2012.03.017
Lu, H., Yu, C., Gou, X (2011). Analysis of Traffic Model and Self-similarity for QQ in 3G Mobile Networks. Proceeding of AIAI 2011.International Conference on Advanced Intelligence and Awareness Internet. DOI: 10.1049/cp.2011.1442.
Iversen, V.B (2015) Teletraffic Engineering and Network Planning, DTU Fotonic.
Downloads
Published
How to Cite
Issue
Section
License
Copyright
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Journal of Electrical Technology UMY. Copyright encompasses rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations.
Authors should sign Copyright Transfer Agreement when they have approved the final proofs sent by the journal prior the publication. JET UMY strives to ensure that no errors occur in the articles that have been published, both data errors and statements in the article.
JET UMY keep the rights to articles that have been published. Authors are permitted to disseminate published article by sharing the link of JET UMY website. Authors are allowed to use their works for any purposes deemed necessary without written permission from JET UMY with an acknowledgement of initial publication in this journal.
License
All articles published in JET UMY are licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA) license. You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.