5,689 research outputs found
Comparative Study Of Congestion Control Techniques In High Speed Networks
Congestion in network occurs due to exceed in aggregate demand as compared to
the accessible capacity of the resources. Network congestion will increase as
network speed increases and new effective congestion control methods are
needed, especially to handle bursty traffic of todays very high speed networks.
Since late 90s numerous schemes i.e. [1]...[10] etc. have been proposed. This
paper concentrates on comparative study of the different congestion control
schemes based on some key performance metrics. An effort has been made to judge
the performance of Maximum Entropy (ME) based solution for a steady state
GE/GE/1/N censored queues with partial buffer sharing scheme against these key
performance metrics.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Chapter 9 : Reliable data streaming over delay-tolerant networks (DTNs)
Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular and underwater communications, and during large-scale disasters
Considers the potential for rapid selection and dissemination of urgent messages is considered
Reviews the breadth of areas in which DTN is already providing solutions and the prospects for its wider adoption
Description
Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.
Readership
Providing an important overview for postgraduate students and academic researchers in electronics, computer engineering, telecommunications and networking; R&D managers in industrial sectors such as wireless technology, electronics, telecommunications, networking and information technology, as well as such groups as the military and disaster management organisation
Fuzzy-Logic Based Call Admission Control in 5G Cloud Radio Access Networks with Pre-emption
YesFifth generation (5G) cellular networks will be comprised of millions of connected devices like wearable devices, Androids, iPhones, tablets and the Internet of Things (IoT) with a plethora of
applications generating requests to the network. The 5G cellular networks need to cope with such
sky-rocketing tra c requests from these devices to avoid network congestion. As such, cloud radio
access networks (C-RAN) has been considered as a paradigm shift for 5G in which requests from
mobile devices are processed in the cloud with shared baseband processing. Despite call admission
control (CAC) being one of radio resource management techniques to avoid the network
congestion, it has recently been overlooked by the community. The CAC technique in 5G C-RAN has
a direct impact on the quality of service (QoS) for individual connections and overall system
e ciency. In this paper, a novel Fuzzy-Logic based CAC scheme with pre-emption in C-RAN is proposed. In this scheme, cloud bursting technique is proposed to be used during congestion, where
some delay tolerant low-priority connections are pre-empted and outsourced to a public cloud with
a penalty charge. Simulation results show that the proposed scheme has low blocking probability
below 5%, high throughput, low energy consumption and up to 95% of return on revenue
- …