1,547 research outputs found
Recommended from our members
Analysis of a discrete-time single-server queue with bursty imputs for traffic control in ATM networks
Due to a large number of bursty traffic sources that an ATM network is expected to support, controlling network traffic becomes essential to provide a desirable level of network performance with its users. Admission control and traffic smoothing are among the most promising control techniques for an ATM network. To evaluate the performance of an ATM network when it is subject to admission control or traffic smoothing, we build a discrete-time single-server queueing model where a new call joins the existing calls.In our model. it is assumed that the cell arrivals from a new call follow a general distribution. It is also assumed that the aggregated arrivals of cells from the existing calls form batch arrivals with a general distribution for the batch size and a geometric distribution for the interarrival times of batches. We consider both finite and infinite buffer cases, and analytically obtain the waiting time distribution and cell loss probability for a new call and for existing calls. Our analysis is an exact one. Through numerical examples, we investigate how the network performance depends on the statistics of a new call (burstiness, time that a call stays in active or inactive state, etc.). We also demonstrate the effectiveness of traffic smoothing to reduce network congestion
Recommended from our members
Performance modelling of a multiple threshold RED mechanism for bursty and correlated Internet traffic with MMPP arrival process
Access to the large web content hosted all over the world by users of the Internet engage
many hosts, routers/switches and faster links. They challenge the internet backbone to operate at
its capacity to assure e±cient content access. This may result in congestion and raises concerns over
various Quality of Service (QoS) issues like high delays, high packet loss and low throughput of the
system for various Internet applications. Thus, there is a need to develop effective congestion control
mechanisms in order to meet various Quality of Service (QoS) related performance parameters. In this
paper, our emphasis is on the Active Queue Management (AQM) mechanisms, particularly Random
Early Detection (RED). We propose a threshold based novel analytical model based on standard RED
mechanism. Various numerical examples are presented for Internet traffic scenarios containing both the
burstiness and correlation properties of the network traffic
Comparative Study Of Congestion Control Techniques In High Speed Networks
Congestion in network occurs due to exceed in aggregate demand as compared to
the accessible capacity of the resources. Network congestion will increase as
network speed increases and new effective congestion control methods are
needed, especially to handle bursty traffic of todays very high speed networks.
Since late 90s numerous schemes i.e. [1]...[10] etc. have been proposed. This
paper concentrates on comparative study of the different congestion control
schemes based on some key performance metrics. An effort has been made to judge
the performance of Maximum Entropy (ME) based solution for a steady state
GE/GE/1/N censored queues with partial buffer sharing scheme against these key
performance metrics.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems
In this paper, the impact of energy constraints on a two-hop network with a
source, a relay and a destination under random medium access is studied. A
collision channel with erasures is considered, and the source and the relay
nodes have energy harvesting capabilities and an unlimited battery to store the
harvested energy. Additionally, the source and the relay node have external
traffic arrivals and the relay forwards a fraction of the source node's traffic
to the destination; the cooperation is performed at the network level. An inner
and an outer bound of the stability region for a given transmission probability
vector are obtained. Then, the closure of the inner and the outer bound is
obtained separately and they turn out to be identical. This work is not only a
step in connecting information theory and networking, by studying the maximum
stable throughput region metric but also it taps the relatively unexplored and
important domain of energy harvesting and assesses the effect of that on this
important measure.Comment: 20 pages, 4 figure
The Stability Region of the Two-User Interference Channel
The stable throughput region of the two-user interference channel is
investigated here. First, the stability region for the general case is
characterized. Second, we study the cases where the receivers treat
interference as noise or perform successive interference cancelation. Finally,
we provide conditions for the convexity/concavity of the stability region and
for which a certain interference management strategy leads to broader stability
region.Comment: Accepted for publication at IEEE Information Theory Workshop 201
Dynamic algorithms for multicast with intra-session network coding
The problem of multiple multicast sessions with
intra-session network coding in time-varying networks is considered.
The network-layer capacity region of input rates that can be
stably supported is established. Dynamic algorithms for multicast
routing, network coding, power allocation, session scheduling, and
rate allocation across correlated sources, which achieve stability
for rates within the capacity region, are presented. This work
builds on the back-pressure approach introduced by Tassiulas
et al., extending it to network coding and correlated sources. In
the proposed algorithms, decisions on routing, network coding,
and scheduling between different sessions at a node are made
locally at each node based on virtual queues for different sinks.
For correlated sources, the sinks locally determine and control
transmission rates across the sources. The proposed approach
yields a completely distributed algorithm for wired networks.
In the wireless case, power control among different transmitters
is centralized while routing, network coding, and scheduling
between different sessions at a given node are distributed
- …