Effects of Network Performance on Smartphone User Behavior

2016 ◽  
Author(s):  
Luis Guillermo Martinez Ballesteros ◽  
Markus Örblom ◽  
Jan Markendahl ◽  
Per Skillermark ◽  
Konrad Tollmar
2002 ◽  
Vol 30 (1) ◽  
pp. 195-205 ◽  
Author(s):  
Anand Balachandran ◽  
Geoffrey M. Voelker ◽  
Paramvir Bahl ◽  
P. Venkat Rangan

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Jingtao Li ◽  
Yang Liu ◽  
Wengang Pei ◽  
Zhen Cao

Cellular networks operate under restrictive constraints of resources including radio channel capacity and network processing capability. The tremendous growth in the cellular data network usage brings operators with unprecedented signaling overloads and threatens the stability of the network. High-frequency subscribers, who produce low data volume but cause high signaling overhead, are extremely resource-inefficient. For subscribers who activate more than 5 sessions per hour, they only account for 1.19% of the total subscribers and generate about 3.81% data traffic but consume roughly 19.46% of the signaling resources, resulting in the inconsistent signaling-data bandwidth consumptions. Understanding the characteristics of those users has an important significance of capacity design and optimal allocation of resources. A lack of understanding of this active group potentially leads to low network performance and security threats. In this paper, we perform the first city-wide, large-scale investigation of high-frequency subscribers. By applying a set of novel approaches, such as pattern extraction and user behavior rebuilding, we observed that high-frequency subscribers correspond to a lower percentage of none-pattern traffic, showing positive correlation between access regularity and session activation frequency. Besides, we found that amount of high-frequency subscribers has abnormal behaviors, resulting in unwanted signaling loads. We demonstrate that our findings have significant implications on network optimization.


2016 ◽  
Vol 30 (21) ◽  
pp. 1650278 ◽  
Author(s):  
Shuo Zhang ◽  
Ning Huang ◽  
Xiaolei Sun ◽  
Yue Zhang

Network traffic is believed to have a significant impact on network performance and is the result of the application operation on networks. Majority of current network performance analysis are based on the premise that the traffic transmission is through the shortest path, which is too simple to reflect a real traffic process. The real traffic process is related to the network application process characteristics, involving the realistic user behavior. In this paper, first, an application can be divided into the following three categories according to realistic application process characteristics: random application, customized application and routine application. Then, numerical simulations are carried out to analyze the effect of different applications on the network performance. The main results show that (i) network efficiency for the BA scale-free network is less than the ER random network when similar single application is loaded on the network; (ii) customized application has the greatest effect on the network efficiency when mixed multiple applications are loaded on BA network.


2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
S. F. A. Batista ◽  
Chuan-Lin Zhao ◽  
Ludovic Leclercq

In this paper, we revisit the principle of bounded rationality applied to dynamic traffic assignment to evaluate its influences on network performance. We investigate the influence of different types of bounded rational user behavior on (i) route flows at equilibrium and (ii) network performance in terms of its internal, inflow, and outflow capacities. We consider the implementation of a bounded rational framework based on Monte Carlo simulation. A Lighthill-Whitham-Richards (LWR) mesoscopic traffic simulator is considered to calculate time-dependent route costs that account for congestion, spillback, and shock-wave effects. Network equilibrium is calculated using the Method of Successive Averages. As a benchmark, the results are compared against both Deterministic and Stochastic User Equilibrium. To model different types of bounded rational user behavior we consider two definitions of user search order (indifferent and strict preferences) and two settings of the indifference band. We also test the framework on a toy Braess network to gain insight into changes in the route flows at equilibrium for both search orders and increasing values of aspiration levels.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2012 ◽  
Vol 3 (3) ◽  
pp. 368-374
Author(s):  
Usha Kumari ◽  
Udai Shankar

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed


2013 ◽  
Vol 12 (3) ◽  
Author(s):  
Djoko Prijo Utomo

In consequence of the increasing of regional economic activities in Pulau Batam, a reliable transportation system is required. Decreasing road network performance as a result of increasing traffic volume needs a strategic planning to anticipate the worsening condition in the future. One of the solutions is by providing mass transit system which is expected to attract private car users. Therefore, determination of potential corridor of mass transit system need to be identified so that the system provide better accessibility. Trip pattern in Pulau Batam must be known by developing trip distribution model. The trip distribution model is calibrated using origin-destination (O-D) data that is based on home interview survey. The validated model will be used to forecast and simulate travel demand onto transport network. Result of model calibration process shows mean trip length difference between model and survey is equal 0.141 %. From simulation of trip assignment is obtained that potential corridor for mass transit system using LRT is Batu Ampar – Batu Aji via Muka Kuning. Passenger forecast in the year 2030 is 193,990 passenger/day (2 directions).


Sign in / Sign up

Export Citation Format

Share Document