首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
多优先级业务通信网的阻塞性能分析算法   总被引:2,自引:0,他引:2  
石铁山  王楚 《通信学报》1998,19(3):68-73
最短径通信网和多抢占优先级服务方式的研究对于网络规划和减少重载时的业务损失有重要意义。本文利用抢占优先级服务方式的特性和文献[1]的研究结果,建立所研究的具有任意种不同优先级业务最短径通信网的数学模型,导出不同优先级业务通信网点对点阻塞概率的迭代算法,并利用所得到的算法对一个通信网的性能进行了实例分析。本文给出的算法适用于任意多抢占优先级业务下的任意拓扑结构网络。  相似文献   

2.
A protocol with strictly preemptive priorities that does not admit low-priority traffic if the load from high-priority traffic exceeds the capacity of the transmission channel in a MAN is presented. The protocol guarantees fairness for transmissions at the highest priority level. By introducing a general characterization of bandwidth allocation schemes for dual bus networks, existing priority mechanisms can be categorized according to the provided quality of service. The unique existence of a bandwidth allocation scheme for multiple priority traffic is shown with a full utilization of the channel capacity, with a fair distribution of bandwidth respective to traffic from a particular priority level, and with preemptive priorities. The performance of the presented protocol is compared to existing proposals for multiple priority mechanisms. It is shown that adopting the new protocol results in shorter access delays for high-priority transmissions. The protocol allows the stations of the network to react quickly to load changes. It is shown that the effectiveness of the priority scheme, compared to priority schemes using the bandwidth-balancing mechanism, is less dependent on increasing the transmission speed of the network  相似文献   

3.
The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is problematic for military applications where situational data is critical to tactical decision making. To increase the amount of time all sensor nodes remain active within the network and to control the network topology tactically, energy efficient routing mechanisms must be employed. In this paper, we aim to provide realistic insights on the practical advantages and disadvantages of using established routing techniques for tactical WSNs. We investigate the following established routing algorithms: direct routing, minimum transmission energy (MTE), Low Energy Adaptive Cluster Head routing (LEACH), and zone clustering. Based on the node die out statistics observed with these algorithms and the topological impact the node die outs have on the network, we develop a novel, energy efficient zone clustering algorithm called EZone. Via extensive simulations using MATLAB, we analyze the effectiveness of these algorithms on network performance for single and multiple gateway scenarios and show that the EZone algorithm tactically controls the topology of the network, thereby maintaining significant service area coverage when compared to the other routing algorithms.  相似文献   

4.
Millimeter wave (mmWave) communications in 60 GHz band have become a hot topic in wireless communications. New medium access control (MAC) protocols are needed because of the fundamental differences between mmWave communications and existing other communication systems. In mmWave wireless personal area networks, the channel transmission rates of links vary significantly because of the difference in the distance between nodes, the accuracy of beamforming, and the existence of obstructions. Owning to the directivity of mmWave links, spatial reuse should be exploited to improve network capacity. In this paper, we develop a channel transmission rate aware directional MAC protocol, termed RDMAC, in which both the multirate capability of links and spatial reuse are exploited to improve network performance. RDMAC has two stages. The first stage measures the channel transmission rates of links, and a heuristic algorithm is proposed to compute near‐optimal measurement schedules with respect to the total number of measurements. The second stage accommodates the traffic demand of links, and a heuristic transmission scheduling algorithm is proposed to compute near‐optimal transmission schedules with respect to the total transmission time. Simulations under various traffic modes show that compared with existing protocols, RDMAC has lower network latency, higher network throughput, and also a good fairness performance. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

5.
Xiaomin Ma 《Wireless Networks》2011,17(5):1323-1337
Recently, broadcast communications in mobile ad hoc networks (MANETs) have been deployed in many mission-critical applications. So far, most investigations of such broadcast networks focus on multi-hop connectivity taking all one-hop links for granted. In this paper, the reliability and performance of real-time one-hop broadcast services in IEEE 802.11 based MANETs are investigated analytically and by simulation. Having specified possible applications and the features of IEEE 802.11 broadcast communication in dynamically self-organized networks under harsh communication environment, analyses are conducted to derive closed form expressions of the reliability and performance indices for both one-dimensional (1-D) and two-dimensional (2-D) broadcast MANETs: packet reception rate (PRR) and packet transmission delay. The proposed analytical models account for the impact of broadcast hidden terminal problem, message arrival interval, backoff counter process, space distributions of nodes, and fading transmission channel on the reliability and performance of the broadcast MANETs. As an example, the proposed models are applied to the evaluation of safety-related inter-vehicle communication on a highway. From the obtained numerical results under various offered traffic and network parameters, new observations and effective enhancement suggestions are given.  相似文献   

6.
Vehicular ad hoc networks (VANETs) are an extreme case of mobile ad hoc networks (MANETs). High speed and frequent network topology changes are the main characteristics of vehicular networks. These characteristics lead to special issues and challenges in the network design, especially at the medium access control (MAC) layer. In this paper, we provide a comprehensive evaluation of mobility impact on the IEEE 802.11p MAC performance. The study evaluates basic performance metrics such as packet delivery ratio, throughput, and delay. An unfairness problem due to the relative speed is identified for both broadcast and unicast scenarios. We propose two dynamic contention window mechanisms to alleviate network performance degradation due to high mobility. The first scheme provides dynamic level of service priority via adaptation to the number of neighboring nodes, while the second scheme provides service priority based on node relative speed. Extensive simulation results demonstrate a significant impact of mobility on the IEEE 802.11p MAC performance, the unfairness problem in the vehicle-to-vehicle (V2V) communications, and the effectiveness of the proposed MAC schemes.  相似文献   

7.
In wireless mesh networks, the end-to-end throughput of traffic flows depends on the path length, i.e., the higher the number of hops, the lower becomes the throughput. In this paper, a fair end-to-end bandwidth allocation (FEBA) algorithm is introduced to solve this problem. FEBA is implemented at the medium access control (MAC) layer of single-radio, multiple channels IEEE 802.16 mesh nodes, operated in a distributed coordinated scheduling mode. FEBA negotiates bandwidth among neighbors to assign a fair share proportional to a specified weight to each end-to-end traffic flow. This way traffic flows are served in a differentiated manner, with higher priority traffic flows being allocated more bandwidth on the average than the lower priority traffic flows. In fact, a node requests/grants bandwidth from/to its neighbors in a round-robin fashion where the amount of service depends on both the load on its different links and the priority of currently active traffic flows. If multiple channels are available, they are all shared evenly in order to increase the network capacity due to frequency reuse. The performance of FEBA is evaluated by extensive simulations. It is shown that wireless resources are shared fairly among best-effort traffic flows, while multimedia streams are provided with a differentiated service that enables quality of service.  相似文献   

8.
The design of network topology is an important part of network design, since network topology is directly associated with network operational behavior, capacity, reliability, and cost. This paper is a tutorial paper concerned with illustrating how the optimization capabilities of genetic algorithms can be used to design suitable network topologies considering basic topology problems. Simple genetic algorithms have been developed for the topology problem of mesh networks, considering single node and single link failure tolerance. The algorithms are based on criteria of two important measures: minimizing the length of communication links; and minimizing traffic flow through these links for given traffic loads. The first measure contributes to minimizing the cost of cabling, while the second measure contributes to minimizing the cost of link capacity. The work provides a useful approach and tools to network students and professionals concerned with the topology design of backbone networks. The developed software is made available on the Internet. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

9.
In wireless multihop networks, communication between two end-nodes is carried out by hopping over multiple wireless links. However, the fact that each node has to transmit not only its own traffic, but also traffic on behalf of other nodes, leads to unfairness among the communication rates of the nodes. Traditional Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes, which cannot directly sense each other, thus causing unfair throughput allocation. Although Time Division Multiple Access (TDMA) seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. Several algorithms may be found in the literature for scheduling TDMA transmissions in wireless multihop networks. Their main goal is to determine the optimal scheduling, in order to increase the capacity and reduce the delay for a given network topology, though they do not consider the traffic requirements of the active flows of the multihop network or fairness issues. In this paper, we propose a joint TDMA scheduling/load balancing algorithm, called Load-Balanced-Fair Flow Vector Scheduling Algorithm (LB-FFVSA). This algorithm schedules the transmissions in a fair manner, in terms of throughput per connection, taking into account the communication requirements of the active flows of the network. Simulation results show that the proposed algorithm achieves improved performance compared to other solutions, not only in terms of fairness, but also in terms of throughput. Moreover, it was proved that when a load balancing technique is used, the performance of the scheduling algorithm is further improved.  相似文献   

10.
Partitioning QoS management for secure tactical wireless ad hoc networks   总被引:1,自引:0,他引:1  
Addressing quality of service in military wireless ad hoc communication networks involves unique challenges due to imposed tactical requirements and,conditions, such as heterogeneous traffic with stringent-real-time and survivability requirements, mobile wireless nodes in hostile environments, and limited spectrum availability. Encryption adds another layer of complexity because of the partitioning of the network into plain text (unencrypted) and cipher text (encrypted) parts that, by definition, cannot communicate QoS information to one another. A typical communication shelter is composed of unencrypted LANs connected to a packet-encrypted backbone network. This article presents a partitioned QoS approach, focusing on QoS management at the unencrypted LAN that complements QoS management done at the encrypted backbone. Some of the unencrypted LAN QoS techniques being considered for the Warfighter Information Network-Tactical (the future Army tactical backbone network) are outlined.  相似文献   

11.
战术通信的业务可分为会话型、数据型以及协作型三类,当前这三类业务的控制信令与控制方式都截然不同,从而存在一系列问题。未来的战术通信网络向全IP技术体制演进已成为一种必然趋势,而在全IP技术体制下,实现这三类业务的统一通信就成为可能。针对这种情况,提出了一种既能够统一控制这三类业务,又能够适应战术通信网本身的特点并确保各种业务的服务质量,还能够满足未来各种业务的扩展需求的统一通信技术,在此基础上设计了战术统一通信服务端框架,并针对战术通信网络环境的特点分析了一系列关键技术的突破途径。  相似文献   

12.
This paper addresses the performance evaluation of adaptive routing algorithms in non‐geostationary packet‐switched satellite communication systems. The dynamic topology of satellite networks and variable traffic load in satellite coverage areas, due to the motion of satellites in their orbit planes, pose stringent requirements to routing algorithms. We have limited the scope of our interest to routing in the intersatellite link (ISL) segment. In order to analyse the applicability of different routing algorithms used in terrestrial networks, and to evaluate the performance of new algorithms designed for satellite networks, we have built a simulation model of a satellite communication system with intersatellite links. In the paper, we present simulation results considering a network‐uniform source/destination distribution model and a uniform source–destination traffic flow, thus showing the inherent routing characteristics of a selected Celestri‐like LEO satellite constellation. The updates of the routing tables are centrally calculated according to the Dijkstra shortest path algorithm. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

13.
Estimating point-to-point demands from partially available information, such as total demand volumes originating and terminating at nodes and traffic volumes routed on links, has significant applications in various areas, such as communications network planning and transportation planning. Existing methods include matrix and link scaling methods, statistical methods, more complex mathematical programming models, and forecasting using demographic data. We present a new mathematical programming model based on equitable resource allocation. The model considers multiple services, e.g., data, video, and voice, and generates a point-to-point demand matrix for each service. Originating and terminating demands for each service and link loads, aggregated over all services, are viewed as resources. Each point-to-point demand is associated with a performance function that measures its weighted, normalized deviation from a target defined by a service-dependent community of interest matrix. The model formulation has a lexicographic minimax objective function and multiple knapsack resource constraints. The model has an intuitively appealing interpretation and a specialized algorithm can generate demand matrices for large network problems very fast.  相似文献   

14.
This paper presents a prioritized resource allocation algorithm to share the limited communication channel resource among multiple wireless body area networks. The proposed algorithm is designed based on an active superframe interleaving scheme, one of the coexistence mechanisms in the IEEE 802.15.6 standard. It is the first study to consider the resource allocation method among wireless body area networks within a communication range. The traffic source of each wireless body area network is parameterized using the traffic specification, and required service rate for each wireless body area networks can be derived. The prioritized resource allocation algorithm employs this information to allocate the channel resource based on the wireless body area networks’ service priority. The simulation results verified that the traffic specification and the wireless body area network service priority based resource allocation are able to increase quality of service satisfaction, particularly for health and medical services.  相似文献   

15.
以往对有/无线ATM混合网络传输容量(带宽)资源管理的研究或是局限于无线网络部分、或是局限于骨干(有线)网络部分,很少有人研究整个网络中涉及越区切换的链路的传输容量资源管理方案。本文将无线系统中越区切换对传输容量管理的影响扩展到骨干网,分别针对基站(BS)与基站控制器(BSC)之间的链路(包括空中接口)和基站控制器间的虚通道(VP),提出了自适应于各小区中各类呼叫业务量状态的传输容量动态分配和越区切换保护容量(Guard capacity)预约算法。通过对其性能的数值模拟分析,结果表明应用该算法时各类业务的阻塞率的比例与其指标要求的比例基本一致,因而可以适用于各类传输容量需求迥异的多媒体业务传输,使传输容量资源得以有效地利用。  相似文献   

16.
In wavelength division multiplexing (WDM) star networks, the construction of the transmission schedule is a key issue, which essentially affects the network performance. Up to now, classic scheduling techniques consider the nodes' requests in a sequential service order. However, these approaches are static and do not take into account the individual traffic pattern of each node. Owing to this major drawback, they suffer from low performance, especially when operating under asymmetric traffic. In this paper, a new class of scheduling algorithms for WDM star networks, which is based on the use of clustering techniques, is introduced. According to the proposed Clustering‐Based Scheduling Algorithm (CBSA), the network's nodes are organized into clusters, based on the number of their requests per channel. Then, their transmission priority is defined beginning from the nodes belonging to clusters with higher demands and ending to the nodes of clusters with fewer requests. The main objective of the proposed scheme is to minimize the length of the schedule by rearranging the nodes' service order. Furthermore, the proposed CBSA scheme adopts a prediction mechanism to minimize the computational complexity of the scheduling algorithm. Extensive simulation results are presented, which clearly indicate that the proposed approach leads to a significantly higher throughput‐delay performance when compared with conventional scheduling algorithms. We believe that the proposed clustering‐based approach can be the base of a new generation of high‐performance scheduling algorithms for WDM star networks. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

17.
Since computer networks play an important role in distributed computing environments, an application's performance depends heavily on the quality of service provided by the communication networks. To ensure a high performance, the characteristics of wide area networks, WANs, must be well understood. This paper presents methodologies to characterize WAN traffic based on real measurements from Bellcore's backbone network that connects remote sites using dedicated T1 links. This paper also suggests some workload models that can be used for wide area network sizing and performance evaluation studies. It is found that the inter-site traffic pattern depends on the time of the day and the day of the week. Furthermore, the traffic between two sites is found to be reasonably symmetric, except for those sites designated as back-up sites. The coefficient of variation is used as a measure for the traffic burstiness and it is found to be 1·5 degree during working hours. The methods presented here are easy to use and cost-effective.  相似文献   

18.
A personal communication system with multiple hierarchical cellular overlays is considered. The system can include a terrestrial segment and a space segment. The terrestrial trail segment, consisting of microcells and macrocells, provides high channel capacity by covering service areas with microcells. Overlaying macrocells cover spots that are difficult in radio propagation for microcells and provide overflow groups of channels for clusters of microcells. At the highest hierarchical level, communications satellites comprise a space segment. The satellite beams overlay clusters of terrestrial macrocells and provide primary access for satellite-only subscribers. Call attempts from cellular/satellite dual subscribers are first directed to the terrestrial cellular network, with satellites providing necessary overlay. At each level of the hierarchy, hand-off calls are given priority access to the channels. The mathematical structure is that of a multilayer hierarchical overflow system. An analytical model for teletraffic performance (including hand-off) is developed. Theoretical performance measures are calculated for users having different mobility characteristics. These show the carried traffic, traffic distribution, blocking, and forced termination probabilities  相似文献   

19.
Wireless mesh networking (WMN) is an emerging technology for future broadband wireless access. The proliferation of the mobile computing devices that are equipped with cameras and ad hoc communication mode creates the possibility of exchanging real-time data between mobile users in wireless mesh networks. In this paper, we argue for a ring-based multicast routing topology with support from infrastructure nodes for group communications in WMNs. We study the performance of multicast communication over a ring routing topology when 802.11 with RTS/CTS scheme is used at the MAC layer to enable reliable multicast services in WMNs. We propose an algorithm to enhance the IP multicast routing on the ring topology. We show that when mesh routers on a ring topology support group communications by employing our proposed algorithms, a significant performance enhancement is realized. We analytically compute the end-to-end delay on a ring multicast routing topology. Our results show that the end-to-end delay is reduced about 33 %, and the capacity of multicast network (i.e., maximum group size that the ring can serve with QoS guarantees) is increased about 50 % as compared to conventional schemes. We also use our analytical results to develop heuristic algorithms for constructing an efficient ring-based multicast routing topology with QoS guarantees. The proposed algorithms take into account all possible traffic interference when constructing the multicast ring topology. Thus, the constructed ring topology provides QoS guarantees for the multicast traffic and minimizes the cost of group communications in WMNs.  相似文献   

20.
The previous research on administration of the transmission capacity in the wired/ wireless ATM networks only focuses on wired part or wireless part. There are very few people do the work extending to the links associating with handoff in the whole network. This paper develops the algorithms of transmission capacity administration on the link connecting the base station and base station controller (including the air interface of the base station) and the VPs among the base station controllers in the wired/ wireless ATM networks, which adapt to the traffic state of each service in every cellular cell to allocate (provision) transmission capacity and to reserve handoff guard capacity on these links, respectively. By simulating and analyzing the performance of the algorithm, it is found that it does well for the multimedia communication in which the transmission capacity requirement of each service may be widely different, so that the network bandwidth resource can be used efficiently.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号