首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, we are interested in real-time flows requiring quantitative and deterministic Quality of Service (QoS) guarantees. We focus more particularly on two QoS parameters: the worst case end-to-end response time and jitter. We consider a non-preemptive scheduling of flows, called fp/dp*, combining fixed priority and dynamic priority established on the first node visited in the network. Examples of such a scheduling are fp/fifo* and fp/edf*. With any flow is associated a fixed priority denoting the importance of the flow from the user point of view. The arbritation between packets having the same fixed priority is done according to their dynamic priority. A classical approach used to compute the worst case end-to-end response time is the holistic one. We show that this approach leads to pessimistic upper bounds and propose the trajectory approach to improve the accuracy of the results. Indeed, the trajectory approach considers the worst case scenarios experienced by a flow along its trajectory. It then eliminates scenarios that cannot occur.  相似文献   

2.
This paper studies the reconstructing method of end‐to‐end network traffic. Due to the development of current communication networks, our networks become more complex and heterogeneous. Meanwhile, because of time‐varying nature and spatio‐temporal correlations of the end‐to‐end network traffic, to obtain it accurately is a great challenge. We propose to exploit discrete wavelet transforms and multifractal analysis to reconstruct the end‐to‐end network traffic from time–frequency domain. First, its time–frequency properties can be characterized in detail by discrete wavelet transforms. And then, we combine discrete wavelet transforms and multifractal analysis to reconstruct end‐to‐end network traffic from link loads. Furthermore, our method needs to measure end‐to‐end network traffic to build the statistical model named multifractal wavelet model. Finally, simulation results from the real backbone networks suggest that our method can reconstruct the end‐to‐end network traffic more accurately than previous methods. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

3.
In this work, we propose an end‐to‐end retransmission framework for dynamically calculating efficient retransmission time‐out intervals in delay‐tolerant networks (DTNs) with scheduled connectivity. The proposed framework combines deterministic and statistical information about the network state to calculate worst‐case estimates about the expected round trip times. Such information includes connectivity schedules, convergence layer protocols specifics, communication link characteristics, and network statistics about the maximum expected packet error rates and storage congestion. We detail the implementation of the proposed framework within the end‐to‐end application data conditioning layer proposed for the DTN architecture, realized by the Delay‐Tolerant Payload Conditioning protocol, as part of the Interplanetary Overlay Network–DTN reference implementation, and evaluate its performance in a complex deep‐space emulation scenario in our DTN testbed. Our results show that our approach achieves great accuracy in round‐trip time estimations and, therefore, faster retransmissions of lost data, in comparison to the statically configured retransmission mechanism of the original Delay‐Tolerant Payload Conditioning protocol. As a result, in‐order data reception rate and storage requirements on the receiver side are significantly improved, at minimum or even zero extra cost in transmission overhead due to duplicate transmissions.  相似文献   

4.
The scheduling disciplines and active buffer management represent the main components employed in the differentiated services (DiffServ) data plane, which provide qualitative per‐hop behaviors corresponding to the QoS required by supported traffic classes. In the first part of this paper, we compute the per‐hop delay bound that should be guaranteed by the different multiservice scheduling disciplines, so that the end‐to‐end (e2e) delay required by expedited forwarding (EF) traffic can be guaranteed. Consequently, we derive the e2e delay bound of EF traffic served by priority queuing–weighted fair queuing (PQWFQ) at every hop along its routing path. Although real‐time flows are principally offered EF service class, some simulations on DiffServ‐enabled network show that these flows suffer from delay jitter and they are negatively impacted by lower priority traffic. In the second part of this paper, we clarify the passive impact of delay jitter on EF traffic, where EF flows are represented by renewal periodic ON–OFF flows, and the background (BG) flows are characterized by the Poisson process. We analyze through different scenarios the jitter effects of these BG flows on EF flow patterns when they are served by a single class scheduling discipline, such as first‐input first‐output, and a multiclass or multiservice scheduling discipline, such as static priority service discipline. As a result, we have found out that the EF per‐hop behaviors (PHBs) configuration according to RFCs 2598 and 3246 (IETF RFC 2598, June 1999; RFC 3246, IETF, March 2002) cannot stand alone in guaranteeing the delay jitter required by EF flows. Therefore, playout buffers must be added to DiffServ‐enabled networks for handling delay jitter problem that suffers from EF flows. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

5.
The ground‐to‐air communications in the aircraft approach stage suffer from multipath fading. We propose to combat this problem using cooperative communication technique. The relay selection problem is formulated to minimize the spectrum cost while preserving the signal‐to‐noise‐ratio (SNR) outage requirement of the approaching aircraft. By leveraging the position and velocity information in the automatic dependent surveillance‐broadcast messages, the average channel gains can be derived with uncertainty sets based on the Ricean channel model. Because the outage probability of the received SNR is intractable, we transform the outage constraint into a simple but efficient reliability requirement. The formulated problem is a mixed integer nonlinear optimization problem, with robustness in the worst‐case average SNR. A robust greedy relay selection algorithm is proposed as a solution, whereby a Kalman filter based trace prediction algorithm is adopted to determine the order of relays. Simulation results are given to show the effectiveness of the proposed scheme.Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

6.
Bluetooth is a suitable technology to support soft real‐time applications like multimedia streams at the personal area network level. In this paper, we analytically evaluate the worst‐case deadline failure probability of Bluetooth packets under co‐channel interference as a way to provide statistical guarantees when transmitting soft real‐time traffic using ACL links. We consider the interference from independent Bluetooth devices, as well as from other devices operating in the ISM band like 802.11b/g and Zigbee. Finally, we show as an example how to use our model to obtain some results for the transmission of a voice stream. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

7.
Time‐varying network link loss rate is a useful information for network managers to discover and locate the network link failures. This paper proposes a method to track time‐varying network link loss rates from unicast end‐to‐end measurements. The method first trains a state transition matrix to capture the spatio‐temporal characters of packet link transmission probabilities by sending end‐to‐end probe packets and then estimates the time‐varying link loss rates using the state transition matrix and the end‐to‐end measurements obtained from background traffic (the existed packets in network). We also introduce a validation step to check and retrain the state transition matrix in order to ensure the accuracy of the state transition matrix. Our method is capable of tracking the variation of link loss rates without incessantly sending probe packets, which is very feasible for many practical applications. The ns‐2 simulation results show the good performance of our method.  相似文献   

8.
Wireless infrastructureless networks demand high resource availability with respect to the progressively decreasing energy consumption. A variety of new applications with different service requirements demand fairness to the service provision and classification, and reliability in an end‐to‐end manner. High‐priority packets are delivered within a hard time delay bound whereas improper power management in wireless networks can substantially degrade the throughput and increase the overall energy consumed. In this work a new scheme is being proposed and evaluated in real time using a state‐based layered oriented architecture for energy conservation (EC). The proposed scheme uses the node's self‐tuning scheme, where each node is assigned with a dissimilar sleep and wake time, based on traffic that is destined for each node. This approach is based on stream's characteristics with respect to different caching behavioral and storage‐capacity characteristics, and considers a model concerning the layered connectivity characteristics for enabling the EC mechanism. EC characteristics are modeled and through the designed tiered architecture the estimated metrics of the scheme can be bounded and tuned into certain regulated values. The real‐time evaluation results were extracted by using dynamically moving and statically located sensor nodes. A performance comparison is done with respect to different data traffic priority classifications following a real‐time asymmetrical transmission channel. Results have shown the scheme's efficiency in conserving energy while the topology configuration changes with time. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

9.
We propose a new approach for developing segment‐based schemes for protection against single link/node failure in wavelength division multiplexing (WDM) mesh networks. In the proposed approach, every request is allocated a pair of link disjoint but most coupled primary and backup paths. Two paths are said to be most coupled if they share the maximum number of end nodes of some existing requests. Coupled paths reduce the total number of hops need to be traversed by a failure signal and, hence, potentially reduces the overall recovery time. We show that the problem of finding a pair of disjoint and most coupled paths is NP‐complete. Accordingly, we propose an efficient and fast protection algorithm called SPXP—Segment Pre‐Cross‐Connected Protection, to allocate disjoint and most coupled paths. The proposed SPXP algorithm reduces the recovery time by ensuring that backup resources are pre‐configured along each backup segment and, hence, is readily available upon a failure. Simulation results for different incremental traffic models and network topologies show that, for most cases, the proposed SPXP exhibits better performance in terms of blocking probability, resource usage, and recovery time compared with existing protection schemes. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

10.
Advances in real‐time system and wireless communication have led to the deployment of body area sensor networks (BASNs) for effective real‐time healthcare applications. Real‐time systems in BASNs tend increasingly to be probabilistic and mixed critical to meet stringent requirements on space, weight, and power consumption. Response‐time analysis is an important and challenging task for BASNs to provide some critical services. In this paper, we propose a request‐based compositional probabilistic response‐time analysis framework for probabilistic real‐time task models with fixed‐priority preemptive scheduling in BASNs. In this method, each probabilistic real‐time task is abstracted as a probabilistic request function. Rough response‐time distribution is computed first based on the cumulative request distribution and then exact response‐time distribution is obtained by refinement based on the request increase distribution. Our strategy can effectively improve performance by reducing repetitive computational overhead for the probabilistic response‐time analysis of all tasks in the system. Our evaluation demonstrates that our proposed method significantly outperforms the existing probabilistic response‐time analysis algorithm in terms of analysis duration. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

11.
Previous quality‐of‐service (QoS) routing protocols in mobile ad hoc networks (MANETs) determined bandwidth‐satisfied routes for QoS applications. Since the multi‐rate enhancements have been implemented in MANETs, QoS routing protocols should be adapted to exploit them fully. However, existing works suffer from one bandwidth‐violation problem, named the hidden route problem (HRP), which may arise when a new flow is permitted and only the bandwidth consumption of the hosts in the neighborhood of the route is computed. Without considering the bandwidth consumption to ongoing flows is the reason the problem is introduced. This work proposes a routing protocol that can avoid HRP for data rate selection and bandwidth‐satisfied route determination with an efficient cross‐layer design based on the integration of PHY and MAC layers into the network layer. To use bandwidth efficiently, we aim to select the combination of data rates and a route with minimal bandwidth consumption to the network, instead of the strategy adopted in the most previous works by selecting the combination with the shortest total transmission time. Using bandwidth efficiently can increase the number of flows supported by a network. Copyright 2010 John Wiley & Sons, Ltd.  相似文献   

12.
In this paper, we develop a delay‐centric parallel multi‐path routing protocol for multi‐hop cognitive radio ad hoc networks. First, we analyze the end‐to‐end delay of multi‐path routing based on queueing theory and present a new dynamic traffic assignment scheme for multi‐path routing with the objective of minimizing end‐to‐end delay, considering both spectrum availability and link data rate. The problem is formulated as a convex problem and solved by a gradient‐based search method to obtain optimal traffic assignments. Furthermore, a heuristic decentralized traffic assignment scheme for multi‐path routing is presented. Then, based on the delay analysis and the 3D conflict graph that captures spectrum opportunity and interference among paths, we present a route discovery and selection scheme. Via extensive NS2‐based simulation, we show that the proposed protocol outperforms the benchmark protocols significantly and achieves the shortest end‐to‐end delay. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

13.
While Transmission Control Protocol (TCP) Performance Enhancing Proxy (PEP) solutions have long been undisputed to solve the inherent satellite problems, the improvement of the regular end‐to‐end TCP congestion avoidance algorithms and the recent emphasis on the PEPs drawbacks have opened the question of the PEPs sustainability. Nevertheless, with a vast majority of Internet connections shorter than ten segments, TCP PEPs continue to be required to counter the poor efficiency of the end‐to‐end TCP start‐up mechanisms. To reduce the PEPs dependency, designing a new fast start‐up TCP mechanism is therefore a major concern. But, while enlarging the Initial Window (IW) up to ten segments is, without any doubt, the fastest solution to deal with a short‐lived connection in an uncongested network, numerous researchers are concerned about the impact of the large initial burst on an already congested network. Based on traffic observations and real experiments, Initial Spreading has been designed to remove those concerns whatever the load and type of networks. It offers performance similar to a large IW in uncongested network and outperforms existing end‐to‐end solutions in congested networks. In this paper, we show that Initial Spreading, taking care of the satellite specificities, is an efficient end‐to‐end alternative to the TCP PEPs. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

14.
A traffic matrix can exhibit the volume of network traffic from origin nodes to destination nodes. It is a critical input parameter to network management and traffic engineering, and thus it is necessary to obtain accurate traffic matrix estimates. Network tomography method is widely used to reconstruct end‐to‐end network traffic from link loads and routing matrix in a large‐scale Internet protocol backbone networks. However, it is a significant challenge because solving network tomography model is an ill‐posed and under‐constrained inverse problem. Compressive sensing reconstruction algorithms have been well known as efficient and precise approaches to deal with the under‐constrained inference problem. Hence, in this paper, we propose a compressive sensing‐based network traffic reconstruction algorithm. Taking into account the constraints in compressive sensing theory, we propose an approach for constructing a novel network tomography model that obeys the constraints of compressive sensing. In the proposed network tomography model, a framework of measurement matrix according to routing matrix is proposed. To obtain optimal traffic matrix estimates, we propose an iteration algorithm to solve the proposed model. Numerical results demonstrate that our method is able to pursuit the trace of each origin–destination flow faithfully. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

15.
An important means to guarantee an acceptable quality of service in networks with real‐time communication requirements is the reservation of resources at connection setup time. However, such reserved resources, e.g. transmission bandwidth, may be unused as a consequence of the variations in the actual resource demands. Therefore, a more efficient resource utilization is possible if communicating stations or end‐users dynamically hand over some of the free resources temporarily to the other communication partners, e.g. of a ‘broadcast network’. This paper concentrates on two fundamental problems of such a demand‐based sharing of resources: on the one hand, estimation of the current resource requirement on the basis of load measurements is investigated and, on the other hand, we elaborate efficient algorithms for resource sharing respecting real‐time requirements. The algorithms proposed for load estimation and for resource sharing are evaluated analytically with respect to their efficiency for worst‐case, average‐case and realistic load scenarios. Our approach suggested for resource and traffic management allows one to achieve significantly better utilization of network resources. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

16.
The transmission control protocol (TCP) is one of the most important Internet protocols. It provides reliable transport services between two end‐hosts. Since TCP performance affects overall network performance, many studies have been done to model TCP performance in the steady state. However, recent researches have shown that most TCP flows are short‐lived. Therefore, it is more meaningful to model TCP performance in relation to the initial stage of short‐lived flows. In addition, the next‐generation Internet will be an unified all‐IP network that includes both wireless and wired networks integrated together. In short, modelling short‐lived TCP flows in wireless networks constitutes an important axis of research. In this paper, we propose simple wireless TCP models for short‐lived flows that extend the existing analytical model proposed in [IEEE Commun. Lett. 2002; 6 (2):85–88]. In terms of wireless TCP, we categorized wireless TCP schemes into three types: end‐to‐end scheme, split connection scheme, and local retransmission scheme, which is similar to the classification proposed in [IEEE/ACM Trans. Networking 1997; 756–769]. To validate the proposed models, we performed ns‐2 simulations. The average differences between the session completion time calculated using the proposed model and the simulation result for three schemes are less than 9, 16, and 7 ms, respectively. Consequently, the proposed model provides a satisfactory means of modelling the TCP performance of short‐lived wireless TCP flows. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
IMT‐2000 has attracted much attention as the Next Generation Mobile Communication System. IMT‐2000 can provide high‐bit‐rate data communication service, so that a great number of packets conveyed by TCP (transmission control protocol) can be transmitted over a wireless link. W‐CDMA, standardized in 3GPP (which standardizes IMT‐2000), allows dynamically allocating transmission rates to flow over a wireless link in response to a changing FER for each flow, which is thought to be essential for a next generation mobile communication system. Therefore, in this paper, we study the characteristics of the dynamic allocation scheme when TCP flows share a wireless link, and, in particular, we focus on the throughput performance of these TCP flows. First, we use simulations to examine the effectiveness of the dynamically allocating down‐link transmission rate for TCP flows in response to changing the frame error rate (FER). Through the simulation results, we will show how it can improve the total throughput performance of TCP flows. Furthermore, we can obtain an effective way to allocate transmission rates to flows with different FERs in order to achieve high total throughput. Finally, we will deal with a case of multiple flows from a fixed host to a mobile host. In actual networks, this often happens. In this case, we will show that the total throughput of TCP flows degrades less than in the single‐flow case, even when the FER is high. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

18.
Back‐pressure scheduling has been considered as a promising strategy for resource allocation in wireless multi‐hop networks. However, there still exist some problems preventing its wide deployment in practice. One of the problems is its poor end‐to‐end (E2E) delay performance. In this paper, we study how to effectively use inter‐flow network coding to improve E2E delay and also throughput performance of back‐pressure scheduling. For this purpose, we propose an efficient network coding based back‐pressure algorithm (NBP), and accordingly design detailed procedure regarding how to consider coding gain in back‐pressure based weight calculation and how to integrate it into next hop decision making in the NBP algorithm. We theoretically prove that NBP can stabilize the networks. Simulation results demonstrate that NBP can not only improve the delay performance of back‐pressure algorithm, but also achieve higher network throughput. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

19.
Multipoint communications is the simultaneous transmission of data streams from a number of sources to a set of receivers in a group according to predetermined metrics. The core‐based approach in multipoint communication enhances potential solutions in terms of quality‐of‐service (QoS)‐efficiency and feasibility of the results in inter and intra‐domain routing. In this paper, we first analyse the solution space for constrained multipoint communication problems under the core‐based approach. We show that the range of solutions examined by the models proposed to date is restricted to a subset of the entire solution space, which restricts the potential efficiency of the results. We propose SPAN, a core‐based framework processing on our identified extended solution space for constrained multi‐source group applications. SPAN consists of core selection and tree construction as two modular components complimenting one another to achieve more efficient solutions in distributed processing. SPAN is also asymmetric, hence potentially operates in domains in which link weights are not necessarily equal in both directions. We analyse the computational and message complexity of our framework and show its feasibility for distributed deployment. Our performance results show that SPAN consistently outperforms its counterparts in the literature in terms of cost and QoS‐efficiency. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

20.
The impressive increase of innovative wireless communication technologies and applications represents nowadays a key approach to enable pervasive communications environments. In particular, the emerging paradigms of the Internet of Things and capillary networks offer effective ways to make devices connected. This has triggered the development of effective methodologies and procedures to allow an unlimited number of devices to exchange information mainly in an autonomous mode. However, it is a well‐known concept that wireless networks capacity usually decreases with the number of nodes. In particular, in order to improve the throughput scalability, a promising approach is that of resorting to the use of multiple radio interfaces at each node, in order to exploit spatial reuse of frequencies. Towards this end, game theory methodologies offer efficient approaches to solve the complex radio interfaces selection and allocation problems. This paper proposes a game theory‐inspired approach to efficiently select the number of radio interfaces to be used at each node site in order to lower the energy consumption and maximise the end‐to‐end throughput of any communication on which the node is involved in. The good behaviour of the proposed approach is validated by provided theoretical framework and numerical results derived by considering different data packets wireless forwarding schemes. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号