Learn More
This paper presents traffic measurement of a Massively Multiplayer On-line Role Playing Game (MMORPG). This analysis characterizes the MMORPG traffic and shows its implications for future research issues. The target game is 'Lineage II' developed by NCsoft, which is one of the world's largest MMORPGs in terms of the number of concurrent users. We collected(More)
This paper describes the measurement and analysis of a Massively Multiplayer On-line Role Playing Game(MMORPG). About 3 billion packets were traced for around 8 days. The results showed that MMORPG traffic has very small packet size and bursty inter-arrival time. By the analysis of per-flow inter-arrival time and average connection time per flow, we showed(More)
In future Internet, live streaming application with the support of multicast will be one of killer applications. If a host has multiple wireless interfaces, a new scheme should be proposed to select most appropriate wireless access network to maximize user satisfaction and ISP's profit at the same time. Our scheme exhibits shorter service disruption time(More)
In wireless network convergence, each mobile host is expected to have multiple kinds of wireless interfaces. Multicast-based applications are expected to be widely deployed. In this paper, a new network selection scheme is proposed for a mobile host to select the most appropriate wireless access network to maximize user satisfaction and ISP's profit,(More)
New Urbanists have emphasized the connectivity of streets as an important factor encouraging more walking, less driving and energy conservation. They argue that in a highly connected street network, local traffic stays local, traffic becomes more direct, the arterial streets accommodate regional trips more efficiently (Leccese and McCormick, 2000). Many(More)
This paper proposes a strategy for checking timing constraint violation in wireless sensor networks. We present the process for checking timing constraint violation and the techniques for calculation of clock drift, collection of sending and receiving time, and calculation of data transfer time. Through the techniques of this paper, the user can know about(More)
  • 1