Skip to main content

Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area Network

  • Conference paper
  • First Online:
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 203))

Abstract

In the real scenarios, network utilization widely depends on the background traffic and the number of active users. This paper presents the effect of background traffic on the QoS of foreground traffic by varying the utilization of LAN devices, server, and bandwidth. We designed a WAN (Wide Area Network) using the OPNET simulator, which consists of different Local Area Networks (LANs) located in different cities. We considered a foreground GSM quality voice traffic, and FTP heavy and video conference background traffic. The experimental results demonstrated that the channel bandwidth utilization has much effect on the QoS of foreground traffic. In addition, heavy background traffic highly affects the QoS of foreground traffic due to the network congestion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nicol, D.M., Yan, G.: Discrete event fluid modeling of background TCP traffic. J. ACM Trans. Model. Comput. Simul. 14(3), 211–250 (2004)

    Article  Google Scholar 

  2. Lucas, M.T., Dempsey, B.J., Wrege, D.E., Weaver, A.C.: (M, P, S)-an efficient background traffic model for wide-area network simulation. In: The Proceeding of the International Conference on Global Telecommunications, GLOBECOM 1997, pp. 1572–1576 (1997)

    Google Scholar 

  3. Pocta, P., Bilsak, M., Rousekova, J.: Impact of fragmentation threshold tuning on performance of voice service and background traffic in IEEE 802.11b WLANs. In: The Proceeding of the 2010 20th International Conference on Radioelektronika (RADIOELEKTRONIKA), April 2010, pp. 1–4 (2010)

    Google Scholar 

  4. Vishwanath, K.V., Vahdat, A.: Evaluating distributed systems: Does background traffic matter? USENIX 2008 Annual Technical Conference, ATC 2008, June 2008, pp. 1–14 (2008)

    Google Scholar 

  5. Emulab.Net: The Utah Network Testbed. [Online]: http://www.emulab.net

  6. Vahdar, A., Yocum, K., Walsh, K., Mahadevan, P., Kostic, D., Chase, J., Becker, D.: Scalability and accuracy in a large-scale network emulator. In: The Proceeding of the 5th Symposium on Operating Systems Design and Implementation, OSDI 2002, 36(SI), pp. 271–284 (2002)

    Google Scholar 

  7. Malakuti, S., Aksit, M., Bockisch, C.: Runtime verification in distributed computing. J. Converg. 2(1), 1–10 (2002)

    Google Scholar 

  8. Zheng, L., Zhang, L., Xu, D.: Characteristics of network delay and delay jitter and its effect on voice over IP (VoIP). In: The Proceeding of the IEEE International Conference on Communications, ICC 2001, June 2001, pp. 122–126 (2001)

    Google Scholar 

  9. Park, C.G., Han, D.H., Jung, J.I.: Interdeparture time analysis of CBR traffic in AAL multiplexer with bursty background traffic. Proc. IEE Proc. Commun. 148(5), 310–315 (2001)

    Google Scholar 

  10. Yong, H., Yuan, R., Ma, X., Li, J.: Analysis of the impact of background traffic on the performance of 802.11 power saving mechanism. IEEE Commun. Lett. 13(3), 164–166 (2009)

    Article  Google Scholar 

  11. Kenesi, Z., Szabo, Z. Belicza, Z. Molnar, S.: On the effect of the background traffic on TCP’s throughput. In: The Proceeding of the 10th IEEE Symposium on Computers and Communications, ISCC 2005, June 2005, pp. 631–636 (2005)

    Google Scholar 

  12. Moldovansky, A.: A utilization of modern switching technology in ethernet/IP™ networks. CIP Technical paper, pp. 61–68 (2012)

    Google Scholar 

  13. Nie, W., Zhang, J., Lin, K.J.: Estimating real-time service process response time using server utilizations. In: The Proceeding of IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2010, pp. 1–8 (2010)

    Google Scholar 

  14. Yabusaki, H., Matsubara, D.: Scheduling Algorithms on optimizing spatial and time distribution of bandwidth utilization. In: World Telecommunications Congress, WTC 2012, pp. 1–6 (2012)

    Google Scholar 

  15. Fu, Q., White, L.: The impact of background traffic on TCP performance over indirect and direct routing. In: The Proceeding of the 8th International Conference on Communication Systems, ICCS 2002, pp. 594–598 (2002)

    Google Scholar 

  16. Nychis, G., Licata, D.R.: The impact of background Network traffic on foreground network traffic. In: The Proceeding of the IEEE Global Telecommunications Conference, GLOBECOM 2001, pp. 1–16 (2001)

    Google Scholar 

  17. Wang, S.C., Ahmed, H.: BEWARE: Background traffic-aware rate adaptation for IEEE 802.11. In: The Proceeding of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2008, pp. 1–12 (2008)

    Google Scholar 

  18. Lagkas, T.D., Papadimitriou, G.I., Nicopolitidis, P., Pomportsis, A.S.: A novel method of serving multimedia and background traffic in wireless LANs. IEEE Trans. Veh. Technol. 57(5), 3263–3267 (2008)

    Article  Google Scholar 

  19. Zunino, C.: Performance measurements of 802.11 WLANs with burst background traffic. In: The Proceeding of the IEEE Conference on Emerging Technologies and Factory Automation, ETFA 2007, pp. 1392–1395 (2007)

    Google Scholar 

  20. Hopkinson, K., Roberts, G., Wang, X., Thorp, J.: Quality of service considerations in utility communication networks. IEEE Trans. Power Deliv. 24(3), 1465–1474 (2009)

    Article  Google Scholar 

  21. Luo, H., Shyu, M.L.,  , M.: Quality of service provision in mobile multimedia- a survey. Journal of Human- centric Computing and. Inf. Sci. 1(5), 1–15 (2011)

    Google Scholar 

  22. Bhattacharya, A., Wu, W., Yang, Z.: Quality of experience evaluation of voice communication: an affect based approach. J. Hum. Centric Comput. Inf. Sci. 2(7), 1–18 (2012)

    Google Scholar 

  23. Javed, K., Saleem, U., Hussain, K., Sher, M.: An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO. J. Converg. 1(1), 107–112 (2010)

    Google Scholar 

  24. Salah, K., Alkhoraidly, A.: An OPNET-based simulation approach for deploying VoIP. Int. J. Netw. Manage. 16(3), 1–23 (2006)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) Grant Funded by the Korean Government (MEST) (No. 2012-0004962).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Myon Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Uddin, J., Kim, J.M. (2012). Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area Network. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_92

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5699-1_92

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5698-4

  • Online ISBN: 978-94-007-5699-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics