2 research outputs found

    Quantifying the effect of content-based transport strategies for online role playing games

    Full text link

    Quantifying the Effect of Content-based Transport Strategies for Online Role Playing Games

    No full text
    根據遊戲資料的特性,其服務品質要求是不同的。循序傳輸以及可靠性對部分資料是不可或缺,但有些資料卻完全不需要,尤有甚者,有些資料只要求可靠性,卻不需循序傳送。因此,對所有資料都提供相同的服務品質層級會造成無謂的延遲。目前已有數個傳輸協定可對資料提供不同服務品質層級,但卻很少有研究以實際遊戲資料來評估此行為的效果。了評估不同服務品質層級的效果,我們提出三種針對遊戲資料內容的傳輸策略。根據對 Angel''s Love 的玩家動作記錄分析,這些傳輸策略針對遊戲資料的特性給予適當的服務品質層級。這篇論文使用 Angel''s Love 的玩家動作記錄來比較TCP、UDP、SCTP、DCCP以及使用我們策略的傳輸協定。我們藉由模擬來評估傳輸策略的效能表現。這些傳輸策略表現出不同程度的改善,且都能提供較TCP低的端對端延遲與端對端遲變化程度。The QoS requirements of game messages may differ because of the latter''s intrinsic characteristics. Some messages require in-order transmission and reliability, some can be transmitted in an unordered and unreliable way, while others need reliable and unordered transmission. Assigning the same QoS level to all game messages causes unnecessary overhead. Although certain transport protocols can assign different QoS levels to individual messages, there has been little investigation of the performance advantage of assigning different QoS levels to the messages.n this paper, we propose three content-based strategies for quantifying the effects of different QoS levels. The strategies assign appropriate QoS requirements for game messages based on our analysis of {alnt} action logs. We evaluate several transport protocols, including TCP, UDP, SCTP, DCCP, and our content-based transport protocol using the action logs of {alnt}. Through simulations, we quantify the performance of our content-based strategies. The results show that the strategies incur much lower end-to-end delay and end-to-end jitter than existing transport protocols.口試委員審定書 ii謝 iiicknowledgments iv要 vbstract viist of Figures xist of Tables xiihapter 1 Introduction 1hapter 2 RelatedWork 4hapter 3 Data description 6hapter 4 Proposed Transport Strategy 10hapter 5 Experimental Methodology 17.1 Existing Protocols 17.2 Protocols based on Our Strategies 19.3 Experiment setup 20hapter 6 Evaluation Results 23.1 Comparison of Existing Protocols 24.2 Evaluation of Our Transport Protocols 26.3 Summary 27hapter 7 Conclusion 40ibliography 4
    corecore