Mobile network traffic modelling

Download
2004
Çakmak, Yadigar
The aim of this thesis is to investigate the traffic patterns in the mobile data networks. In this work, a simple Cellular Digital Packet Data (CDPD) network was modeled in order to be used in simulations. For the purpose of using in the CDPD model, a synthetic bursty traffic model was produced and using different traffic patterns some performance investigations were made in CDPD network. During the whole work, OPNET simulation tool was used. The CDPD network modeled by OPNET simulation tool was compared with a CDPD model described in the literature and the differences were shown. The new model has some new features: 1) Burst transmission of MAC blocks. 2) Exponential backoff. 3) New packet structures. 4) Frame segmentation and encapsulation into MAC layer frames. Using OPNET, a traffic having higher level of burstiness was produced and applied to the CDPD network model. Under the bursty traffic, some CDPD performance parameters were collected and according to the collected results some suggestions were given.

Suggestions

Ontology based semantic retrieval of video contents using metadata
Akpınar, Samet; Alpaslan, Ferda Nur; Department of Computer Engineering (2007)
The aim of this thesis is the development of an infrastructure which is used for semantic retrieval of multimedia contents. Motivated by the needs of semantic search and retrieval of multimedia contents, operating directly on the MPEG-7 based annotations can be thought as a reasonable way for meeting these needs as MPEG-7 is a common standard providing a wide multimedia content description schema. However, it is clear that the MPEG-7 formalism is deficient about the semantics and reasoning support. From thi...
A simulation tool for mc6811
Sarıkan (Tuncer), Nazlı; Güran, Hasan; Department of Electrical and Electronics Engineering (2004)
The aim of this thesis study is to develop a simulator for an 8-bit microcontroller and the written document of this thesis study analyses the process of devoloping a software for simulating an 8 bit microcontroller, MC68HC11. In this simulator study a file processing including the parsing of the assembler code and the compilation of the parsed instructions is studied. Also all the instruction execution process containing the cycle and instruction execution and the interrupt routine execution is observed th...
The effects of hierarchy on mobile wireless sensor network coverage
Aslan, Ali Umut; Solak, Ercan; Department of Information Systems (2006)
Due to their economic potential and widespread application areas, wireless sensor networks have emerged as an active research topic during the last five years. One of the fundamental challenges in wireless sensor network research is the provision of sufficient coverage while maintaining energy efficiency and longevity under sensor mobility. The purpose of this thesis is to observe the coverage and energy consumption dynamics of a mobile wireless sensor network in a hierarchical architecture. To achieve this...
Software process improvement based on static process evaluation
Seçkin, Haldun; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
This study investigates software development process improvement approaches. In particular, the static process evaluation methodology proposed by S. Güceğlioğlu is applied on the requirements analysis and validation process applied in Project X in MYCOMPANY and an improved process is proposed. That methodology is an extension of the ISO/IEC 9126 approach for software quality assessment, and is based on evaluating a set of well-defined metrics on the static model of software development processes. The improv...
Anomaly detection from personal usage patterns in web applications
Vural, Gürkan; Yöndem (Turhan), Meltem; Department of Computer Engineering (2006)
The anomaly detection task is to recognize the presence of an unusual (and potentially hazardous) state within the behaviors or activities of a computer user, system, or network with respect to some model of normal behavior which may be either hard-coded or learned from observation. An anomaly detection agent faces many learning problems including learning from streams of temporal data, learning from instances of a single class, and adaptation to a dynamically changing concept. The domain is complicated by ...
Citation Formats
Y. Çakmak, “Mobile network traffic modelling,” M.S. - Master of Science, Middle East Technical University, 2004.