首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Owing to the explosive increase in Internet traffic, increasing the throughput and energy efficiency of core routers is an important issue for future internet. Accessing the ternary content addressable memory (TCAM) in a core router can significantly degrade its throughput and energy efficiency owing to its low operating frequency and power consuming operations. To improve the throughput and energy‐efficiency of core routers, packet processing caches (PPCs) can be potentially used. PPCs can reduce the number of TCAM accesses by storing the TCAM lookup results in a fast and low‐energy cache memory and reusing them to process subsequent packets. To enhance the PPC performance, it is important to reduce the number of PPC misses. However, the PPC miss rate of the state‐of‐the‐art PPC is still high owing to its small capacity. In this study, we propose an effective cache replacement policy, called elevator cache (ELC) to improve the PPC miss rate. Our simulation results showed that the 8‐way ELC, which can be implementable at low hardware cost, reduced the number of PPC misses by 17.1% and 5.67% in comparison to the 4‐way least recently used (LRU) and the 4‐way ELC, respectively. Consequently, it was found that the 8‐way ELC can achieve a 1.21 times higher throughput (560 Gbps) while consuming 83% energy in comparison to conventional PPCs.  相似文献   

2.
This paper presents a new type of network simulator for simulating the call‐level operations of telecom networks and especially ATM networks. The simulator is a pure time‐true type as opposed to a call‐by‐call type simulator. It is also characterized as a batch‐type simulator. The entire simulation duration is divided into short time intervals of equal duration, t. During t, a batch processing of call origination or termination events is executed and the time‐points of these events are sorted. The number of sorting executions is drastically reduced compared to a call‐by‐call simulator, resulting in considerable timesaving. The proposed data structures of the simulator can be implemented by a general‐purpose programming language and are well fitted to parallel processing techniques for implementation on parallel computers, for further savings of execution time. We have first implemented the simulator in a sequential computer and then we have applied parallelization techniques to achieve its implementation on a parallel computer. In order to simplify the parallelization procedure, we dissociate the core simulation from the built‐in call‐level functions (e.g. bandwidth control or dynamic routing) of the network. The key point for a parallel implementation is to organize data by virtual paths (VPs) and distribute them among processors, which all execute the same set of instructions on this data. The performance of the proposed batch‐type, time‐true, ATM‐network simulator is compared with that of a call‐by‐call simulator to reveal its superiority in terms of sequential execution time (when both simulators run on conventional computers). Finally, a measure of the accuracy of the simulation results is given. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

3.
Wireless systems migrate towards the era of ‘Beyond the 3rd Generation’ (B3G). A fundamental facilitator of this vision is the evolution of high speed, adaptive networks, needed for better handling the offered demand and improving resource utilization. Adaptive networks dynamically select their configuration, in order to optimally adapt to the changing environment requirements and conditions. This paper presents optimization functionality that can be used to support network adaptability (cognition‐reconfigurability) in a B3G context. The paper starts from the business case that justifies the need for placing research onto adaptive networks and then continues with the management functionality for (re)configuration decisions, which is targeted to the dynamic selection of the appropriate radio access technologies (RATs). RAT selection is modelled through an optimization problem called (RAT, Demand and QoS‐Assignment problem—RDQ‐A), the solution of which assigns in a distributed manner the available RATs to adaptive Base Station transceivers and the demand (users) to these transceivers and to QoS levels, respectively. The RDQ‐A optimization problem is decoupled in several sub‐problems and is implemented in phases corresponding to the aforementioned assignments, while efficient custom greedy algorithms are mobilized in each phase for obtaining the optimum assignment. Finally, indicative results from the application of the proposed functionality to a simulated network are presented. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

4.
In this work we examine how quality of service (QoS) can be achieved in a real network by allowing packets to coordinate using fiat money in a market economy for router queue positions. In this context we implement and evaluate the PacketEconomy mechanism in the discrete‐event simulator OMNET++, using the standard INET library for simulating Internet Protocol version 6 networks and evaluate throughput, end‐to‐end delay, and packet drop rates. Additionally, we examine whether the flows have a game‐theoretic incentive to participate in the market economy, while covering both Transmission Control Protocol– and User Datagram Protocol–based flows in multiple different cases. The mechanism achieves QoS by allowing packets with different QoS requirements waiting to be served in router queues to mutually trade positions by exchanging money. Notably, each flow can independently and selfishly define the ask and bid prices of its packets. In this manner, packets can coordinate to be able to self‐regulate their packet‐specific access to shared network resources. The results are promising and show that the innovative PacketEconomy mechanism provides robust, effective, and fine‐grained QoS while maintaining end‐user control for both rate‐ and window‐based flows.  相似文献   

5.
In order to satisfy quality‐of‐service requirements for real‐time multimedia applications over wireless networks, IEEE 802.11e has been proposed to enhance wireless‐access functionalities. In IEEE 802.11e, collisions occur frequently as the system load becomes heavy, and then, the latency for successfully transmitting data is lengthened seriously because of contention, handshaking, and backoff overheads for collision avoidance. In this paper, we propose a fragment‐based retransmission (FBR) scheme with quality‐of‐service considerations for IEEE 802.11e‐based wireless local area networks. Our FBR can be used in all proposed fragmentation‐based schemes and greatly decrease redundant transmission overheads. By utilizing FBR, the retransmission delay will be significantly improved to conform strict time requirements for real‐time multimedia applications. We develop an analytical model and a simulation model to investigate the performance of FBR. The capability of the proposed scheme is evaluated by a series of simulations, for which we have encouraging results. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

6.
This paper presents a study of a cross‐layer design through joint optimization of spectrum allocation and power control for cognitive radio networks (CRNs). The spectrum of interest is divided into independent channels licensed to a set of primary users (PUs). The secondary users are activated only if the transmissions do not cause excessive interference to PUs. In particular, this paper studies the downlink channel assignment and power control in a CRN with the coexistence of PUs and secondary users. The objective was to maximize the total throughput of a CRN. A mathematical model is presented and subsequently formulated as a binary integer programming problem, which belongs to the class of non‐deterministic polynomial‐time hard problems. Subsequently, we develop a distributed algorithm to obtain sub‐optimal results with lower computational complexity. The distributed algorithm iteratively improves the network throughput, which consists of several modules including maximum power calculation, excluded channel sets recording, base station throughput estimation, base station sorting, and channel usage implementation. Through investigating the impacts of the different parameters, simulation results demonstrates that the distributed algorithm can achieve a better performance than two other schemes. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

7.
In this article, performance of delay‐sensitive traffic in multi‐layered satellite Internet Protocol (IP) networks with on‐board processing (OBP) capability is investigated. With OBP, a satellite can process the received data, and according to the nature of application, it can decide on the transmission properties. First, we present a concise overview of relevant aspects of satellite networks to delay‐sensitive traffic and routing. Then, in order to improve the system performance for delay‐sensitive traffic, specifically Voice over Internet Protocol (VoIP), a novel adaptive routing mechanism in two‐layered satellite network considering the network's real‐time information is introduced and evaluated. Adaptive Routing Protocol for Quality of Service (ARPQ) utilizes OBP and avoids congestion by distributing traffic load between medium‐Earth orbit and low‐Earth orbit layers. We utilize a prioritized queueing policy to satisfy quality‐of‐service (QoS) requirements of delay‐sensitive applications while evading non‐real‐time traffic suffer low performance level. The simulation results verify that multi‐layered satellite networks with OBP capabilities and QoS mechanisms are essential for feasibility of packet‐based high‐quality delay‐sensitive services which are expected to be the vital components of next‐generation communications networks. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

8.
Network functions virtualization (NFV) is transforming how networks are operated and how network services are delivered. The network is more flexible and adaptable, and it can scale with traffic demands. To manage video traffic in the network, or acquire protection from cyber‐attacks, Deep Packet Inspection (DPI) is increasingly deployed at specific locations in the network. The virtual DPI (vDPI) engines can be dynamically deployed as software on commodity servers within emerging network functions virtualization infrastructures. For a network operator, deploying a set of vDPIs over the network is a matter of finding the appropriate placement that meets the traffic management or cyber‐security targets (such as the number of inspected flows) and operational cost constraints (licence fees, network efficiency or power consumption). In this work, we formulate the vDPI placement problem as a cost minimization problem. The cost captures the different objectives that the operator is pursuing. A placement of vDPIs on the network nodes realizes a trade‐off between these possibly conflicting goals. We cast the problem as a multi‐commodity flow problem and solve it as an integer linear program. We then devise a centrality‐based greedy algorithm and assess its validity by comparing it with the integer linear program optimal solution on a real dataset (GEANT network with 22 nodes and real traffic matrix). We further analyse the scalability of the heuristic by applying it to larger random networks of up to 300 nodes. The results show the network structure and the costs influence time performance. Finally, they demonstrate that the heuristic approximates the optimal on small and medium problem instances well. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

9.
The scheduling algorithm based on the three-way handshaking scheme in IEEE 802.16d-2004 standard has some serious problems because of the complexity of the algorithm and low scheduling efficiency.To enhance the scheduling efficiency and improve the performance of multi-hop wireless mesh networks (WMNs), one distributed scheduling algorithm that can maximize the spatial and time reuse with an interference-based network model is proposed.Compared to the graph-based network model, the proposed network model can achieve a better throughput performance with maximal spatial reuse.Furthermore, this proposed scheduling algorithm also keeps fairly scheduling to all links, with a priority-based polling policy.Both the theoretical analysis and simulation results show that this proposed distributed scheduling algorithm is simple and efficient.  相似文献   

10.
The practical success of pervasive services running in mobile wireless networks relies largely on its flexibility in providing adaptive and cost‐effective services. Service discovery is an essential mechanism to achieve this goal. As an enhancement to our previous work for service discovery, that is, model‐based service discovery (MBSD), this paper proposes a location‐based service advertisement (SA) algorithm named as MBSD‐sa. MBSD‐sa advocates the importance of service location to the service availability and integrates the service location information together with the service semantic information into service information for advertisement. MBSD‐sa utilizes prediction to estimate the service location so as to reduce the number of SA messages (SAMs). Two complementary types of SA mechanisms (Types 1 and 2) are employed by MBSD‐sa to strike the balance between the SAM overhead and the accuracy of service information. The performance of MBSD‐sa is analyzed both numerically and using simulations. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

11.
顾成杰  张顺颐  孙雁飞 《通信学报》2011,32(11):168-175
提出了一种基于业务感知和策略选择的认知路由(cognitive network routing)算法。该算法面向认知网络环境综合考虑了网络资源、业务流、策略选择等要素,在获知网络中业务流的宏观特征和需求的前提下,首先通过离线资源分配将网络资源按照业务流的固有分配特征预先配置给不同类型的业务流,然后通过在线路径计算实时得出各个业务流的最优路径。仿真实验验证了认知路由算法的有效性,对比于MIRA、SWP路由算法,CNR算法可以提高网络资源利用率,避免因资源不均衡产生的网络拥塞,能够在业务流和资源2个层面优化网络性能。  相似文献   

12.
In this paper, the power allocation problem in a wireless sensor network (WSN) with binary distributed detection is considered. It is assumed that the sensors independently transmit their local decisions to a fusion center (FC) through a slow fading orthogonal multiple access channel (OMAC), where, in every channel, the interferences from other devices are considered as correlated noises. In this channel, the associated power allocation optimization problem with equal power constraint is established between statistical distributions under different hypotheses by using the Jeffrey divergence (J‐divergence) as a performance criterion. It is shown that this criterion for the power allocation problem is more efficient compared to other criteria such as mean square error (MSE). Moreover, several numerical simulations and examples are presented to illustrate the effectiveness of the proposed approach.  相似文献   

13.
The key impediments to a successful wireless sensor network (WSN) application are the energy and the longevity constraints of sensor nodes. Therefore, two signal processing oriented cluster management strategies, the proactive and the reactive cluster management, are proposed to efficiently deal with these constraints. The former strategy is designed for heterogeneous WSNs, where sensors are organized in a static clustering architecture. A non‐myopic cluster activation rule is realized to reduce the number of hand‐off operations between clusters, while maintaining desired estimation accuracy. The proactive strategy minimizes the hardware expenditure and the total energy consumption. On the other hand, the main concern of the reactive strategy is to maximize the network longevity of homogeneous WSNs. A Dijkstra‐like algorithm is proposed to dynamically form active cluster based on the relation between the predictive target distribution and the candidate sensors, considering both the energy efficiency and the data relevance. By evenly distributing the energy expenditure over the whole network, the objective of maximizing the network longevity is achieved. The simulations evaluate and compare the two proposed strategies in terms of tracking accuracy, energy consumption and execution time. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

14.
移动自组网络中一种基于选播策略的路由恢复方法   总被引:5,自引:0,他引:5  
独立于路由算法对路由恢复方法进行了研究,并在选播策略的基础上,提出了一种路由恢复方法。模拟测试表明该方法具有平均路由恢复延时较短和平均控制字节数较少的特点。  相似文献   

15.
16.
Information‐centric networking (ICN) has emerged as a promising candidate for designing content‐based future Internet paradigms. ICN increases the utilization of a network through location‐independent content naming and in‐network content caching. In routers, cache replacement policy determines which content to be replaced in the case of cache free space shortage. Thus, it has a direct influence on user experience, especially content delivery time. Meanwhile, content can be provided from different locations simultaneously because of the multi‐source property of the content in ICN. To the best of our knowledge, no work has yet studied the impact of cache replacement policy on the content delivery time considering multi‐source content delivery in ICN, an issue addressed in this paper. As our contribution, we analytically quantify the average content delivery time when different cache replacement policies, namely, least recently used (LRU) and random replacement (RR) policy, are employed. As an impressive result, we report the superiority of these policies in term of the popularity distribution of contents. The expected content delivery time in a supposed network topology was studied by both theoretical and experimental method. On the basis of the obtained results, some interesting findings of the performance of used cache replacement policies are provided.  相似文献   

17.
Multi-valued and universal binary neurons (MVN and UBN) are the neural processing elements with the complex-valued weights and high functionality. It is possible to implement an arbitrary mapping described by partially defined multiple-valued function on the single MVN. An arbitrary mapping described by partially defined or fully defined Boolean function, which can be non-threshold, may be implemented on the single UBN. The quickly converging learning algorithms exist for both types of neurons. Such features of the MVN and UBN may be used for solving the different problems. One of the most successful applications of the MVN and UBN is their usage as basic neurons in the Cellular Neural Networks (CNN). It opens the new effective opportunities in nonlinear image filtering and its applications to noise reduction, edge detection and solving of the super resolution problem. A number of experimental results are presented to illustrate the performance of the proposed algorithms.An erratum to this article can be found at  相似文献   

18.
An efficient cryptography mechanism should enforce an access control policy over the encrypted data to provide flexible, fine‐grained, and secure data access control for secure sharing of data in cloud storage. To make a secure cloud data sharing solution, we propose a ciphertext‐policy attribute‐based proxy re‐encryption scheme. In the proposed scheme, we design an efficient fine‐grained revocation mechanism, which enables not only efficient attribute‐level revocation but also efficient policy‐level revocation to achieve backward secrecy and forward secrecy. Moreover, we use a multiauthority key attribute center in the key generation phase to overcome the single‐point performance bottleneck problem and the key escrow problem. By formal security analysis, we illustrate that our proposed scheme achieves confidentiality, secure key distribution, multiple collusions resistance, and policy‐ or attribute‐revocation security. By comprehensive performance and implementation analysis, we illustrate that our proposed scheme improves the practical efficiency of storage, computation cost, and communication cost compared to the other related schemes.  相似文献   

19.
Alternative broadband infrastructures are emerging and developing fast. These networks are based on different technologies and offer assorted services, applied through various organisational structures, using diverse business models. Due to their alternative nature, these emerging infrastructures operate on other premises than existing operators and face different potentials and challenges in their operations.

This article uses four detailed case studies from Denmark to identify the technological, economic and political/regulatory drivers and barriers of alternative broadband infrastructures, including the role of the government in fostering their existence.  相似文献   


20.
A predictive model‐based mobility tracking method, called dead reckoning, is developed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead. The basic technique is optimized to use ‘distance effect’, where distant nodes maintain less accurate tracking information to save overheads. The dead reckoning‐based location service mechanism is evaluated against three known location dissemination service protocols: simple, distance routing effect algorithm for mobility (DREAM) and geographic region summary service (GRSS). The evaluation is done with geographic routing as an application. It is observed that dead reckoning significantly outperforms the other protocols in terms of packet delivery fraction. It also maintains low‐control overhead. Its packet delivery performance is only marginally impacted by increasing speed or noise in the mobility model, that affects its predictive ability. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号