首页 > 最新文献

Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE最新文献

英文 中文
Fuzzy control of pricing for bandwidth demand in obtainable forwarding service for differentiated services architecture 差异化业务架构下可得转发业务带宽需求定价的模糊控制
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1189017
O. Kabranov, T. Yang, D. Makrakis
The tremendous increase in customer bandwidth demands has led to the necessity of better utilization of available bandwidth resources. We present an artificial intelligence based pricing mechanism for control of user demand in the obtainable forwarding (OF) service in DiffServ networks. By deploying a fuzzy logic controller at the DiffServ boundary node, we are able to adjust dynamically the price per unit bandwidth, depending on customer bandwidth demands and bandwidth availability. In the case of elastic traffic, a small change in price leads to a small change in customer demand. As the decision to buy bandwidth or not lies in the hands of the customer (his grade of utility), it is difficult to estimate the parameters for the customer bandwidth utility function. The suggested fuzzy controller implements rules, easily obtainable at the boundary node, using terms such as "small change", "big increase". We present an evaluation of the utilization of dynamically changing bandwidth demand.
客户带宽需求的巨大增长导致了更好地利用可用带宽资源的必要性。本文提出了一种基于人工智能的定价机制,用于控制DiffServ网络中可获得转发(of)服务的用户需求。通过在DiffServ边界节点上部署模糊逻辑控制器,我们能够根据客户带宽需求和带宽可用性动态调整每单位带宽的价格。在弹性流量的情况下,价格的微小变化导致客户需求的微小变化。由于购买或不购买带宽的决定掌握在客户手中(他的效用等级),因此很难估计客户带宽效用函数的参数。建议的模糊控制器使用“小变化”、“大增加”等术语实现规则,这些规则在边界节点上容易获得。我们提出了对动态变化的带宽需求的利用率的评估。
{"title":"Fuzzy control of pricing for bandwidth demand in obtainable forwarding service for differentiated services architecture","authors":"O. Kabranov, T. Yang, D. Makrakis","doi":"10.1109/GLOCOM.2002.1189017","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1189017","url":null,"abstract":"The tremendous increase in customer bandwidth demands has led to the necessity of better utilization of available bandwidth resources. We present an artificial intelligence based pricing mechanism for control of user demand in the obtainable forwarding (OF) service in DiffServ networks. By deploying a fuzzy logic controller at the DiffServ boundary node, we are able to adjust dynamically the price per unit bandwidth, depending on customer bandwidth demands and bandwidth availability. In the case of elastic traffic, a small change in price leads to a small change in customer demand. As the decision to buy bandwidth or not lies in the hands of the customer (his grade of utility), it is difficult to estimate the parameters for the customer bandwidth utility function. The suggested fuzzy controller implements rules, easily obtainable at the boundary node, using terms such as \"small change\", \"big increase\". We present an evaluation of the utilization of dynamically changing bandwidth demand.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The extent of AS path inflation by routing policies 路由策略对AS路径膨胀的影响程度
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1189018
Lixin Gao, Feng Wang
A route in the Internet may take a longer AS (autonomous systems) path than the shortest AS path due to routing policies. We systematically analyze AS paths and quantify the extent to which routing policies inflate AS paths. The results show that AS path inflation in the Internet is more prevalent than expected. We first present the extent of AS path inflation observed from the route view routing tables. From an ISP, at least 55% of AS paths are inflated by at least one AS hop and AS paths can be inflated by as long as 6 AS hops. We then employ two typical routing policies to show the extent of AS path inflation for all AS pairs; we find that at least 45% of AS paths are inflated by at least one AS hop and AS paths can be inflated by as many as 9 AS hops. Quantifying AS path inflation in the Internet has important implications on the extent of routing policies and traffic engineering performed on the Internet, and on BGP (border gateway protocol) convergence speed.
由于路由策略的原因,Internet中的路由可能会使用比最短AS路径更长的AS(自治系统)路径。我们系统地分析AS路径并量化路由策略扩展AS路径的程度。结果表明,AS路径通货膨胀在互联网上比预期的更为普遍。我们首先给出了从路由视图路由表中观察到的AS路径膨胀的程度。从一个ISP来看,至少55%的AS路径被至少一个AS跳膨胀,AS路径可以膨胀长达6个AS跳。然后,我们采用两种典型的路由策略来显示所有AS对的AS路径膨胀程度;我们发现至少45%的AS路径被至少一个AS跳膨胀,AS路径可以被多达9个AS跳膨胀。量化Internet中的AS路径膨胀对Internet上执行的路由策略和流量工程的范围以及BGP(边界网关协议)的收敛速度具有重要意义。
{"title":"The extent of AS path inflation by routing policies","authors":"Lixin Gao, Feng Wang","doi":"10.1109/GLOCOM.2002.1189018","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1189018","url":null,"abstract":"A route in the Internet may take a longer AS (autonomous systems) path than the shortest AS path due to routing policies. We systematically analyze AS paths and quantify the extent to which routing policies inflate AS paths. The results show that AS path inflation in the Internet is more prevalent than expected. We first present the extent of AS path inflation observed from the route view routing tables. From an ISP, at least 55% of AS paths are inflated by at least one AS hop and AS paths can be inflated by as long as 6 AS hops. We then employ two typical routing policies to show the extent of AS path inflation for all AS pairs; we find that at least 45% of AS paths are inflated by at least one AS hop and AS paths can be inflated by as many as 9 AS hops. Quantifying AS path inflation in the Internet has important implications on the extent of routing policies and traffic engineering performed on the Internet, and on BGP (border gateway protocol) convergence speed.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Mobility database overflow control in 3G cellular networks 3G蜂窝网络中移动数据库溢出控制
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1188492
Yang Xiao
In a 3G cellular network, the gateway location registers (GLRs), the visitor location registers (VLRs) and the home location registers (HLRs) form a three-level mobility database structure. When users leave a GLR/VLR service area, the corresponding records in the GLR/VLR are deleted. Due to mobility, a GLR/VLR database may overflow at some time periods when the number of visitors significantly increases in the GLR/VLR area. If the GLR/VLR is full, the registration procedure fails and the system cannot deliver services to incoming users under the existing cellular technology. We propose a hierarchical database overflow control mechanism in 3G cellular networks to effectively eliminate the GLR/VLR overflow problem, and incoming users can continuously use the service with insignificant extra overhead. An analytic model is proposed to investigate the performance of the hierarchical database overflow control scheme.
在3G蜂窝网络中,网关位置寄存器(glr)、访问者位置寄存器(vlr)和主位置寄存器(hlr)形成三级移动性数据库结构。当用户离开某个GLR/VLR服务区时,该GLR/VLR服务区对应的记录将被删除。由于移动性的原因,当GLR/VLR区域的访问者数量显著增加时,GLR/VLR数据库可能会在某些时间段溢出。如果GLR/VLR已满,注册程序将失败,系统将无法在现有蜂窝技术下向传入用户提供服务。在3G蜂窝网络中,我们提出了一种分层数据库溢出控制机制,有效地消除了GLR/VLR溢出问题,使入站用户可以在不增加额外开销的情况下持续使用业务。提出了一个分析模型来研究分层数据库溢出控制方案的性能。
{"title":"Mobility database overflow control in 3G cellular networks","authors":"Yang Xiao","doi":"10.1109/GLOCOM.2002.1188492","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1188492","url":null,"abstract":"In a 3G cellular network, the gateway location registers (GLRs), the visitor location registers (VLRs) and the home location registers (HLRs) form a three-level mobility database structure. When users leave a GLR/VLR service area, the corresponding records in the GLR/VLR are deleted. Due to mobility, a GLR/VLR database may overflow at some time periods when the number of visitors significantly increases in the GLR/VLR area. If the GLR/VLR is full, the registration procedure fails and the system cannot deliver services to incoming users under the existing cellular technology. We propose a hierarchical database overflow control mechanism in 3G cellular networks to effectively eliminate the GLR/VLR overflow problem, and incoming users can continuously use the service with insignificant extra overhead. An analytic model is proposed to investigate the performance of the hierarchical database overflow control scheme.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An optical sampled subcarrier multiplexing scheme for nonlinear distortion reduction in lightwave CATV networks 一种用于光波有线电视网络非线性失真抑制的光采样子载波复用方案
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1189145
W. Hung, M. Cheung, S. Ho, Lian-Kuan Chen, Chun-Kit Chan
This paper proposes and demonstrates a nonlinear distortion reduction scheme for subcarrier multiplexed optical CATV networks based on optical sampling and optical time-division multiplexing (OTDM) techniques. Intermodulation distortion is reduced by about 10 dB for a 40-channel system. The proposed optical sampling and OTDM process is shown to induce negligible additional distortion.
提出并论证了一种基于光采样和光时分复用(OTDM)技术的子载波复用有线电视网络非线性失真抑制方案。对于40通道系统,互调失真降低约10db。所提出的光学采样和OTDM过程显示出可忽略不计的附加畸变。
{"title":"An optical sampled subcarrier multiplexing scheme for nonlinear distortion reduction in lightwave CATV networks","authors":"W. Hung, M. Cheung, S. Ho, Lian-Kuan Chen, Chun-Kit Chan","doi":"10.1109/GLOCOM.2002.1189145","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1189145","url":null,"abstract":"This paper proposes and demonstrates a nonlinear distortion reduction scheme for subcarrier multiplexed optical CATV networks based on optical sampling and optical time-division multiplexing (OTDM) techniques. Intermodulation distortion is reduced by about 10 dB for a 40-channel system. The proposed optical sampling and OTDM process is shown to induce negligible additional distortion.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TCP-Peach and FACK/SACK options: putting the pieces together TCP-Peach和FACK/SACK选项:将各个部分组合在一起
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1189171
G. Morabito, R. Narcisi, S. Palazzo, A. Pantò
TCP-Peach has been proposed for IP network scenarios characterized by long round trip times and high bit error rates, such as satellite networks. In the TCP-Peach congestion control scheme, Slow Start and Fast Recovery are replaced with new algorithms called Sudden Start and Rapid Recovery. In this paper protocol refinements for TCP-Peach are proposed to allow it to be utilized in cooperation with FACK/SACK options. The modified protocol has been implemented in the Linux 2.2.17 kernel and its performance has been evaluated in an emulated satellite network environment. Performance results show that the modified TCP-Peach protocol outperforms other TCP implementations.
TCP-Peach是针对卫星网络等往返时间长、误码率高的IP网络场景而提出的。在TCP-Peach拥塞控制方案中,慢启动和快速恢复被称为突然启动和快速恢复的新算法所取代。本文提出了TCP-Peach的协议改进,以允许它与FACK/SACK选项合作使用。修改后的协议已在Linux 2.2.17内核中实现,并在仿真卫星网络环境中对其性能进行了评估。性能结果表明,改进后的TCP- peach协议优于其他TCP实现。
{"title":"TCP-Peach and FACK/SACK options: putting the pieces together","authors":"G. Morabito, R. Narcisi, S. Palazzo, A. Pantò","doi":"10.1109/GLOCOM.2002.1189171","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1189171","url":null,"abstract":"TCP-Peach has been proposed for IP network scenarios characterized by long round trip times and high bit error rates, such as satellite networks. In the TCP-Peach congestion control scheme, Slow Start and Fast Recovery are replaced with new algorithms called Sudden Start and Rapid Recovery. In this paper protocol refinements for TCP-Peach are proposed to allow it to be utilized in cooperation with FACK/SACK options. The modified protocol has been implemented in the Linux 2.2.17 kernel and its performance has been evaluated in an emulated satellite network environment. Performance results show that the modified TCP-Peach protocol outperforms other TCP implementations.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bits-per-joule capacity of energy-limited wireless ad hoc networks 能量有限的无线自组织网络的每焦耳位容量
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1188033
V. Rodoplu, T. Meng
We develop a framework to evaluate the capacity of wireless ad hoc networks in which the energy supply of the nodes is the primary resource constraint. The measure of capacity in such networks is the "bits-perJoule capacity" that specifies the maximum number of bits that the network can deliver per Joule of energy in the network. First, for the one-to-one traffic model in which each node generates traffic for exactly one other randomly picked node, we demonstrate that the bits-per-Joule capacity grows with the number of nodes. Second, we demonstrate that sparse and locally-computed network topologies can approximate this capacity. Third, for ad hoc-cellular "hybrid" networks in which the node set is partitioned between an ad hoc part and a cellular part, we demonstrate under three representative traffic models, that the ad hoc topology performs far better than the cellular topology.
我们开发了一个框架来评估无线自组织网络的容量,其中节点的能量供应是主要的资源约束。这种网络容量的度量是“比特每焦耳容量”,它指定了网络中每焦耳能量可以传递的最大比特数。首先,对于每个节点恰好为另一个随机选择的节点生成流量的一对一流量模型,我们证明了每焦耳比特容量随着节点数量的增加而增长。其次,我们证明了稀疏和局部计算的网络拓扑可以近似这种容量。第三,对于节点集在ad hoc部分和蜂窝部分之间划分的ad hoc-蜂窝“混合”网络,我们在三种代表性的流量模型下证明了ad hoc拓扑的性能远远优于蜂窝拓扑。
{"title":"Bits-per-joule capacity of energy-limited wireless ad hoc networks","authors":"V. Rodoplu, T. Meng","doi":"10.1109/GLOCOM.2002.1188033","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1188033","url":null,"abstract":"We develop a framework to evaluate the capacity of wireless ad hoc networks in which the energy supply of the nodes is the primary resource constraint. The measure of capacity in such networks is the \"bits-perJoule capacity\" that specifies the maximum number of bits that the network can deliver per Joule of energy in the network. First, for the one-to-one traffic model in which each node generates traffic for exactly one other randomly picked node, we demonstrate that the bits-per-Joule capacity grows with the number of nodes. Second, we demonstrate that sparse and locally-computed network topologies can approximate this capacity. Third, for ad hoc-cellular \"hybrid\" networks in which the node set is partitioned between an ad hoc part and a cellular part, we demonstrate under three representative traffic models, that the ad hoc topology performs far better than the cellular topology.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Convolutional codes for channels with substitutions, insertions, and deletions 带有替换、插入和删除的通道的卷积代码
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1188355
M. Mansour, A. Tewfik
We introduce modifications to common convolutional decoders to accommodate channels with Insertions and deletions. For the Viterbi decoder, new states are added to the trellis diagram to represent the new situation and the expansion algorithm is modified accordingly. For sequential decoding, we provide modifications to the stack algorithm and a new metric is introduced. Also, we developed a systematic way for convolutional code construction using Simulated Annealing so as to maximize the distance between codewords In the presence of insertions and deletions. The proposed techniques are shown to be superior to previous approaches for this problem, and have no additional code overhead.
我们对常见的卷积解码器进行了修改,以适应带有插入和删除的信道。对于维特比解码器,在网格图中加入新的状态来表示新的情况,并对展开算法进行相应的修改。对于顺序解码,我们对堆栈算法进行了修改,并引入了一个新的度量。此外,我们开发了一种系统的卷积码构建方法,使用模拟退火来最大化存在插入和删除的码字之间的距离。对于这个问题,所建议的技术优于以前的方法,并且没有额外的代码开销。
{"title":"Convolutional codes for channels with substitutions, insertions, and deletions","authors":"M. Mansour, A. Tewfik","doi":"10.1109/GLOCOM.2002.1188355","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1188355","url":null,"abstract":"We introduce modifications to common convolutional decoders to accommodate channels with Insertions and deletions. For the Viterbi decoder, new states are added to the trellis diagram to represent the new situation and the expansion algorithm is modified accordingly. For sequential decoding, we provide modifications to the stack algorithm and a new metric is introduced. Also, we developed a systematic way for convolutional code construction using Simulated Annealing so as to maximize the distance between codewords In the presence of insertions and deletions. The proposed techniques are shown to be superior to previous approaches for this problem, and have no additional code overhead.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Spatial reuse and collision avoidance in ad hoc networks with directional antennas 定向天线自组织网络中的空间复用与碰撞避免
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1188052
Yu Wang, J. Garcia-Luna-Aceves
The quest for efficient medium access control (MAC) protocols for multi-hop ad hoc networks has aroused great interest in using directional antennas. Some MAC protocols using directional antennas have been proposed in the past; they trade off spatial reuse and collision avoidance via a combination of omnidirectional and directional transmission modes. It is argued that the benefit of spatial reuse achieved by a MAC protocol that uses a directional mode in all transmissions can outweigh the benefit of a conservative collision avoidance MAC protocol that sends some omni-directional control packets to silence potential interfering nodes. We present detailed simulation experiments of the popular IEEE 802.11 MAC protocol and its variants that make use of a directional transmission mode in sufficiently random networks. It is concluded that, in contention-based MAC protocols for multi-hop networks infested with hidden terminals, the aggressive channel access scheme featured by all-directional transmissions indeed outperforms other conservative schemes in terms of enhanced throughput and reduced delay.
对多跳自组织网络中有效的介质访问控制(MAC)协议的追求引起了人们对定向天线的极大兴趣。过去已经提出了一些使用定向天线的MAC协议;它们通过全向和定向传输模式的结合来权衡空间重用和避免碰撞。有人认为,在所有传输中使用定向模式的MAC协议所实现的空间重用的好处可能超过保守的避免碰撞的MAC协议的好处,后者发送一些全向控制数据包以沉默潜在的干扰节点。我们提出了流行的IEEE 802.11 MAC协议及其变体的详细模拟实验,这些变体在充分随机的网络中使用了定向传输模式。研究结果表明,在存在隐藏终端的多跳网络中,基于争用的MAC协议中,以全向传输为特征的主动信道接入方案在提高吞吐量和降低时延方面确实优于其他保守方案。
{"title":"Spatial reuse and collision avoidance in ad hoc networks with directional antennas","authors":"Yu Wang, J. Garcia-Luna-Aceves","doi":"10.1109/GLOCOM.2002.1188052","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1188052","url":null,"abstract":"The quest for efficient medium access control (MAC) protocols for multi-hop ad hoc networks has aroused great interest in using directional antennas. Some MAC protocols using directional antennas have been proposed in the past; they trade off spatial reuse and collision avoidance via a combination of omnidirectional and directional transmission modes. It is argued that the benefit of spatial reuse achieved by a MAC protocol that uses a directional mode in all transmissions can outweigh the benefit of a conservative collision avoidance MAC protocol that sends some omni-directional control packets to silence potential interfering nodes. We present detailed simulation experiments of the popular IEEE 802.11 MAC protocol and its variants that make use of a directional transmission mode in sufficiently random networks. It is concluded that, in contention-based MAC protocols for multi-hop networks infested with hidden terminals, the aggressive channel access scheme featured by all-directional transmissions indeed outperforms other conservative schemes in terms of enhanced throughput and reduced delay.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116133877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Modelling and analysis of a buffer in an ATM-based MPLS LER system 基于atm的MPLS LER系统中缓冲器的建模与分析
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1188470
G. Hwang, K. Sohraby
We consider the buffer requirement for a shared memory buffer arising in an ingress MPLS (multiprotocol label switching) LER (label edge router) system. The buffer is divided into virtual queues, each of which is assigned to provide a guaranteed IP service. In such a system, strong correlation between the packet interarrival times and the service times exists in each virtual queue since each packet arriving through a link with finite bandwidth is transmitted only after the system receives the entire packet. We provide a framework, including an accurate analytical model and its solution, to compute the queue length distribution for each virtual queue and the total buffer requirement for the shared memory buffer in the MPLS LER system supporting multiple guaranteed IP services simultaneously. Some numerical results on the buffer requirement and the impact of correlation on the performance are considered.
本文研究了入口多协议标签交换(MPLS)系统中对共享内存缓冲区的需求。缓冲区被划分为多个虚拟队列,每个队列都被分配以提供有保证的IP服务。在这种系统中,每个虚拟队列的报文到达间隔时间与服务时间之间存在很强的相关性,因为通过有限带宽的链路到达的每个报文只有在系统接收到整个报文后才会发送。我们提供了一个框架,包括一个精确的分析模型及其解决方案,以计算同时支持多个保证IP业务的MPLS LER系统中每个虚拟队列的队列长度分布和共享内存缓冲区的总缓冲区需求。考虑了缓冲区需求和相关性对性能影响的一些数值结果。
{"title":"Modelling and analysis of a buffer in an ATM-based MPLS LER system","authors":"G. Hwang, K. Sohraby","doi":"10.1109/GLOCOM.2002.1188470","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1188470","url":null,"abstract":"We consider the buffer requirement for a shared memory buffer arising in an ingress MPLS (multiprotocol label switching) LER (label edge router) system. The buffer is divided into virtual queues, each of which is assigned to provide a guaranteed IP service. In such a system, strong correlation between the packet interarrival times and the service times exists in each virtual queue since each packet arriving through a link with finite bandwidth is transmitted only after the system receives the entire packet. We provide a framework, including an accurate analytical model and its solution, to compute the queue length distribution for each virtual queue and the total buffer requirement for the shared memory buffer in the MPLS LER system supporting multiple guaranteed IP services simultaneously. Some numerical results on the buffer requirement and the impact of correlation on the performance are considered.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Insensitive bandwidth sharing 不敏感带宽共享
Pub Date : 2002-11-17 DOI: 10.1109/GLOCOM.2002.1189112
T. Bonald, A. Proutière
We represent a data network as a set of links shared by a dynamic number of competing flows. These flows are generated within sessions and correspond to the transfer of a random volume of date on a pre-defined network route. The evolution of the stochastic process describing the number of flows on all routes, and the performance of the data transfers, depend on how link bandwidth is allocated between concurrent flows. We use some key properties of Whittle networks to characterize the class of bandwidth allocations which are insensitive in the sense that the stationary distribution of this stochastic process does not depend on any traffic characteristics (session structure, data volume distribution) except the traffic intensity on each route. This insensitivity property presents the practical interest of allowing the development of robust engineering rules independently of precise traffic statistics.
我们将数据网络表示为一组由动态数量的竞争流共享的链接。这些流是在会话中生成的,对应于在预定义的网络路由上传输随机的数据量。描述所有路由上的流数量的随机过程的演变以及数据传输的性能取决于链路带宽在并发流之间如何分配。我们使用Whittle网络的一些关键属性来描述带宽分配的类别,这些带宽分配是不敏感的,因为这种随机过程的平稳分布不依赖于任何流量特征(会话结构,数据量分布),除了每条路由上的流量强度。这种不敏感的特性显示了允许开发独立于精确交通统计的鲁棒工程规则的实际意义。
{"title":"Insensitive bandwidth sharing","authors":"T. Bonald, A. Proutière","doi":"10.1109/GLOCOM.2002.1189112","DOIUrl":"https://doi.org/10.1109/GLOCOM.2002.1189112","url":null,"abstract":"We represent a data network as a set of links shared by a dynamic number of competing flows. These flows are generated within sessions and correspond to the transfer of a random volume of date on a pre-defined network route. The evolution of the stochastic process describing the number of flows on all routes, and the performance of the data transfers, depend on how link bandwidth is allocated between concurrent flows. We use some key properties of Whittle networks to characterize the class of bandwidth allocations which are insensitive in the sense that the stationary distribution of this stochastic process does not depend on any traffic characteristics (session structure, data volume distribution) except the traffic intensity on each route. This insensitivity property presents the practical interest of allowing the development of robust engineering rules independently of precise traffic statistics.","PeriodicalId":415837,"journal":{"name":"Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1