25 research outputs found

    Analysis of generic discrete-time buffer models with irregular packet arrival patterns

    Get PDF
    De kwaliteit van de multimediadiensten die worden aangeboden over de huidige breedband-communicatienetwerken, wordt in hoge mate bepaald door de performantie van de buffers die zich in de diverse netwerkele-menten (zoals schakelknooppunten, routers, modems, toegangsmultiplexers, netwerkinter- faces, ...) bevinden. In dit proefschrift bestuderen we de performantie van een dergelijke buffer met behulp van een geschikt stochastisch discrete-tijd wachtlijnmodel, waarbij we het geval van meerdere uitgangskanalen en (niet noodzakelijk identieke) pakketbronnen beschouwen, en de pakkettransmissietijden in eerste instantie één slot bedragen. De grillige, of gecorreleerde, aard van een pakketstroom die door een bron wordt gegenereerd, wordt gekarakteriseerd aan de hand van een algemeen D-BMAP (discrete-batch Markovian arrival process), wat een generiek kader creëert voor het beschrijven van een superpositie van dergelijke informatiestromen. In een later stadium breiden we onze studie uit tot het geval van transmissietijden met een algemene verdeling, waarbij we ons beperken tot een buffer met één enkel uitgangskanaal. De analyse van deze wachtlijnmodellen gebeurt hoofdzakelijk aan de hand van een particuliere wiskundig-analytische aanpak waarbij uitvoerig gebruik gemaakt wordt van probabiliteitsgenererende functies, die er toe leidt dat de diverse performantiematen (min of meer expliciet) kunnen worden uitgedrukt als functie van de systeemparameters. Dit resul-teert op zijn beurt in efficiënte en accurate berekeningsalgoritmen voor deze grootheden, die op relatief eenvoudige wijze geïmplementeerd kunnen worden

    A multiserver queue with narrow- and wide-band customers and wide-band restricted access

    No full text

    The determining of optimum protocol strategies for half-duplex telemetry communication links

    Get PDF
    Dissertation (PhD)--University of Stellenbosch, 2002.ENGLISH ABSTRACT: Though not so prominent as the wide band, high speed, mainstream development of data communication networks, cost and particular bandwidth limitations, still ensure extensive and continuing use of low-speed, half-duplex data link equipment. Most of these applications are radio based and aimed towards telemetry systems serving a wide range of utilities. Experience has shown that systems engineering for this type of installation, is seldom undertaken to a satisfactory analytical level. Investigation of published analyses of CSMA protocols in general, has indicated scope of extension of theoretical work to include system parameters for the type of protocol investigated in this dissertation. This dissertation describes the mathematical modeling of such a strategy by utilising a significantly modified, finite source, transition state-matrix approach derived from queueing theory. The contribution of the dissertation is to include system overhead parameters, such as backoff strategy, channel noise, equipment rise times, propagation- and retry delays, into the abovementioned model. The latter provides a relatively straightforward and readily applicable method for system analysis and performance prediction. A further contribution is the presentation of a software emulation with which different strategies could be simulated, allowing for adjustment of all design parameters. The simulation is intended for parallel and confimatory use with the theoretical model. A dual set of tools, theoretical and emulation based, is thus contributed to assist with the system design, performance prediction and protocol selection process.AFRIKAANSE OPSOMMING: Alhoewel nie so prominent soos die wyeband, hoëspoed, hoofstroom ontwikkeling van datakommunikasie netwerke nie, verseker koste en spesifieke bandwydte beperkings nog die uitgebreide en voortdurende gebruik van laespoed half-dupleks data verbindingstoerusting. Meeste van die toepassings is radio gebaseer en gerig op telemetriestelsels wat deur 'n wye verskeidenheid diensverskaffers benut word. Stelselontwerp vir hierdie tipe installasies word selde op analitiese vlak benader. Ondersoek van gepubliseerde analises van kontensieprotokolle in die algemeen, het ruimte aangetoon vir die uitbreiding van bestaande teoretiese werk om stelselveranderlikes soos van toepassing op die tipe protokol in hierdie proefskrif ondersoek, in te sluit. Hierdie proefskrif beskryf die wiskundige modelering van sodanige strategie, deur gebruik te maak van 'n beduidend veranderde eindige bron, oorgangs-toestandmatriks benadering, afgelei van touteorie. Die bydrae van hierdie proefskrif is die insluiting van oorhoofse stelselveranderlikes, soos herhaal strategie, kanaalruis, toerusting stygtye, herhaal- en voortplantingsvertragings, in bogenoemde model. Laasgenoemde verskaf 'n relatief eenvoudige en maklik toepasbare metode vir stelselanalise en werkverrigtingvoorspelling. 'n Verder bydrae is die daarstelling van 'n sagteware simulasie waarmee verskillende strategieë nageboots kan word. Verstelling van alle ontwerpparameters word ondersteun. Die simulasie is bedoel vir parallelle en bevestigende gebruik tesame met die teoretiese model. 'n Dubbele, teoreties- en simulasie gebaseerde benadering, word dus aangebied vir gebruik by stelselontwerp, gedragsvoorspelling en optimale protokolseleksie

    Teletraffic analysis of ATM systems : symposium gehouden aan de Technische Universiteit Eindhoven op 15 februari 1993

    Get PDF

    Stability Problems for Stochastic Models: Theory and Applications II

    Get PDF
    Most papers published in this Special Issue of Mathematics are written by the participants of the XXXVI International Seminar on Stability Problems for Stochastic Models, 21­25 June, 2021, Petrozavodsk, Russia. The scope of the seminar embraces the following topics: Limit theorems and stability problems; Asymptotic theory of stochastic processes; Stable distributions and processes; Asymptotic statistics; Discrete probability models; Characterization of probability distributions; Insurance and financial mathematics; Applied statistics; Queueing theory; and other fields. This Special Issue contains 12 papers by specialists who represent 6 countries: Belarus, France, Hungary, India, Italy, and Russia

    JTIT

    Get PDF
    kwartalni

    Improving Network Performance Through Endpoint Diagnosis And Multipath Communications

    Get PDF
    Components of networks, and by extension the internet can fail. It is, therefore, important to find the points of failure and resolve existing issues as quickly as possible. Resolution, however, takes time and its important to maintain high quality of service (QoS) for existing clients while it is in progress. In this work, our goal is to provide clients with means of avoiding failures if/when possible to maintain high QoS while enabling them to assist in the diagnosis process to speed up the time to recovery. Fixing failures relies on first detecting that there is one and then identifying where it occurred so as to be able to remedy it. We take a two-step approach in our solution. First, we identify the entity (Client, Server, Network) responsible for the failure. Next, if a failure is identified as network related additional algorithms are triggered to detect the device responsible. To achieve the first step, we revisit the question: how much can you infer about a failure using TCP statistics collected at one of the endpoints in a connection? Using an agent that captures TCP statistics at one of the end points we devise a classification algorithm that identifies the root cause of failures. Using insights derived from this classification algorithm we identify dominant TCP metrics that indicate where/why problems occur. If/when a failure is identified as a network related problem, the second step is triggered, where the algorithm uses additional information that is collected from ``failed\u27\u27 connections to identify the device which resulted in the failure. Failures are also disruptive to user\u27s performance. Resolution may take time. Therefore, it is important to be able to shield clients from their effects as much as possible. One option for avoiding problems resulting from failures is to rely on multiple paths (they are unlikely to go bad at the same time). The use of multiple paths involves both selecting paths (routing) and using them effectively. The second part of this thesis explores the efficacy of multipath communication in such situations. It is expected that multi-path communications have monetary implications for the ISP\u27s and content providers. Our solution, therefore, aims to minimize such costs to the content providers while significantly improving user performance

    Discrete Time Analysis of Consolidated Transport Processes

    Get PDF
    Diese Arbeit beschäftigt sich mit der Entwicklung zeitdiskreter Modelle zur Analyse von Transportbündelungen. Mit den entwickelten Modellen für Bestands- und Fahrzeugbündelungen, insbesondere Milkrun-Systeme, kann eine detaillierte Leistungsbewertung in kurzer Zeit durchgeführt werden. Darüber hinaus erlauben die Modelle die Analyse der Umschlagslagerbündelungen, beispielweise Hub-und-Spoke-Netzwerke, indem sie im Rahmen einer Netzwerkanalyse mit einander verknüpft werden

    On the Support of Massive Machine-to-Machine Traffic in Heterogeneous Networks and Fifth-Generation Cellular Networks

    Get PDF
    The widespread availability of many emerging services enabled by the Internet of Things (IoT) paradigm passes through the capability to provide long-range connectivity to a massive number of things, overcoming the well-known issues of ad-hoc, short-range networks. This scenario entails a lot of challenges, ranging from the concerns about the radio access network efficiency to the threats about the security of IoT networks. In this thesis, we will focus on wireless communication standards for long-range IoT as well as on fundamental research outcomes about IoT networks. After investigating how Machine-Type Communication (MTC) is supported nowadays, we will provide innovative solutions that i) satisfy the requirements in terms of scalability and latency, ii) employ a combination of licensed and license-free frequency bands, and iii) assure energy-efficiency and security
    corecore