首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
Time‐varying network link loss rate is a useful information for network managers to discover and locate the network link failures. This paper proposes a method to track time‐varying network link loss rates from unicast end‐to‐end measurements. The method first trains a state transition matrix to capture the spatio‐temporal characters of packet link transmission probabilities by sending end‐to‐end probe packets and then estimates the time‐varying link loss rates using the state transition matrix and the end‐to‐end measurements obtained from background traffic (the existed packets in network). We also introduce a validation step to check and retrain the state transition matrix in order to ensure the accuracy of the state transition matrix. Our method is capable of tracking the variation of link loss rates without incessantly sending probe packets, which is very feasible for many practical applications. The ns‐2 simulation results show the good performance of our method.  相似文献   

2.
    
In this paper, we develop a delay‐centric parallel multi‐path routing protocol for multi‐hop cognitive radio ad hoc networks. First, we analyze the end‐to‐end delay of multi‐path routing based on queueing theory and present a new dynamic traffic assignment scheme for multi‐path routing with the objective of minimizing end‐to‐end delay, considering both spectrum availability and link data rate. The problem is formulated as a convex problem and solved by a gradient‐based search method to obtain optimal traffic assignments. Furthermore, a heuristic decentralized traffic assignment scheme for multi‐path routing is presented. Then, based on the delay analysis and the 3D conflict graph that captures spectrum opportunity and interference among paths, we present a route discovery and selection scheme. Via extensive NS2‐based simulation, we show that the proposed protocol outperforms the benchmark protocols significantly and achieves the shortest end‐to‐end delay. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

3.
结合多重分形的网络流量非线性预测   总被引:6,自引:1,他引:5  
通过分析树型多重分形结构的相关性发现,多重分形可以把非平稳且具有长相关(LRD)和分形特性的网络流量序列转化为可用短相关(SRD)模型表示的序列组。利用多重分形这种将时间序列分解为多层的能力,提出了一种结合多重分形的FIR神经网络流量预测模型(MF-FIR,multifractal FIR network)。MF-FIR合理地利用了流量序列的LRD信息,具有很好的多步预测性能,可以满足通信系统在线预测的要求。  相似文献   

4.
    
A traffic matrix can exhibit the volume of network traffic from origin nodes to destination nodes. It is a critical input parameter to network management and traffic engineering, and thus it is necessary to obtain accurate traffic matrix estimates. Network tomography method is widely used to reconstruct end‐to‐end network traffic from link loads and routing matrix in a large‐scale Internet protocol backbone networks. However, it is a significant challenge because solving network tomography model is an ill‐posed and under‐constrained inverse problem. Compressive sensing reconstruction algorithms have been well known as efficient and precise approaches to deal with the under‐constrained inference problem. Hence, in this paper, we propose a compressive sensing‐based network traffic reconstruction algorithm. Taking into account the constraints in compressive sensing theory, we propose an approach for constructing a novel network tomography model that obeys the constraints of compressive sensing. In the proposed network tomography model, a framework of measurement matrix according to routing matrix is proposed. To obtain optimal traffic matrix estimates, we propose an iteration algorithm to solve the proposed model. Numerical results demonstrate that our method is able to pursuit the trace of each origin–destination flow faithfully. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

5.
We present a multiplicative multifractal process to model traffic which exhibits long‐range dependence. Using traffic trace data captured by Bellcore from operations across local and wide area networks, we examine the interarrival time series and the packet length sequences. We also model the frame size sequences of VBR video traffic process. We prove a number of properties of multiplicative multifractal processes that are most relevant to their use as traffic models. In particular, we show these processes to characterize effectively the long‐range dependence properties of the measured processes. Furthermore, we consider a single server queueing system which is loaded, on one hand, by the measured processes, and, on the other hand, by our multifractal processes (the latter forming a MFe/MFg/1 queueing system model). In comparing the performance of both systems, we demonstrate our models to effectively track the behaviour exhibited by the system driven by the actual traffic processes. We show the multiplicative multifractal process to be easy to construct. Through parametric dependence on one or two parameters, this model can be calibrated to fit the measured data. We also show that in simulating the packet loss probability, our multifractal traffic model provides a better fit than that obtained by using a fractional Brownian motion model. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

6.
田芳  沙基昌 《电子学报》1999,27(5):43-45
本文针对具有K类优先级业务的电信网,运用数学理论方法分析其在故障条件下的端-端业务流量。在假设网络采用顺序帐由选择方式下,提出了计算端-端业务流量的理论分析算法。应用该算法可计算得到通信网端-端业务流量的上限值。  相似文献   

7.
    
Back‐pressure scheduling has been considered as a promising strategy for resource allocation in wireless multi‐hop networks. However, there still exist some problems preventing its wide deployment in practice. One of the problems is its poor end‐to‐end (E2E) delay performance. In this paper, we study how to effectively use inter‐flow network coding to improve E2E delay and also throughput performance of back‐pressure scheduling. For this purpose, we propose an efficient network coding based back‐pressure algorithm (NBP), and accordingly design detailed procedure regarding how to consider coding gain in back‐pressure based weight calculation and how to integrate it into next hop decision making in the NBP algorithm. We theoretically prove that NBP can stabilize the networks. Simulation results demonstrate that NBP can not only improve the delay performance of back‐pressure algorithm, but also achieve higher network throughput. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

8.
    
In ad hoc networks, malicious nodes can deploy wormhole attacks to fabricate a false scenario on the proximity relationship among mobile nodes. A classification of the attacks according to the format of the wormholes is proposed. This forms a basis to identify the detection capability of various approaches. An analysis shows that earlier approaches focus on the prevention of wormholes among neighbors that trust each other. As a more generic approach, we present an end‐to‐end scheme that can detect wormholes on a multi‐hop route. Only the trust between the source and the destination is assumed. The mechanism uses geographic information to detect anomalies in neighbor relations and node movements. To reduce the computation and storage overhead, we present a scheme called cell‐based open tunnel avoidance (COTA) to manage the information. COTA requires a constant space for every node on the path and the computation overhead increases linearly to the number of detection packets. We prove that the savings do not deteriorate the detection capability. Various schemes to control communication overhead are studied. The simulation and experiments on real devices show that the proposed mechanism can be combined with existent routing protocols to defend against wormhole attacks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

9.
    
With the ever‐increasing mobile demands and proliferation of mobile services, mobile Internet has penetrated into every aspect of human life. Although the 4G mobile communication system is now being deployed worldwide, simply evolving or incrementally improving the current mobile networks can no longer keep the pace with the proliferation of mobile services. Against this background, aiming to achieve service‐oriented 5G mobile networks, this article proposes an end‐to‐end software defining architecture, which introduces a logically centralized control plane and dramatically simplifies the data‐plane. The control plane decomposes the diversified mobile service requirements and, correspondingly, controls the functions and behaviors of data‐plane devices. Consequently, the network directly orients towards services, and the devices are dynamically operated according to the service requirements. Therefore, the proposed architecture efficiently guarantees the end‐to‐end QoS and quality of experience. The challenges and key technologies of our architecture are also discussed in this article. Real traces‐based simulations validate the performance advantages of proposed architecture, including energy efficiency and the whole performance. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

10.
    
Network coding (NC) can greatly improve the performance of wireless mesh networks (WMNs) in terms of throughput and reliability, and so on. However, NC generally performs a batch‐based transmission scheme, the main drawback of this scheme is the inevitable increase in average packet delay, that is, a large batch size may achieve higher throughput but also induce larger average packet delay. In this work, we put our focus on the tradeoff between the average throughput and packet delay; in particular, our ultimate goal is to maximize the throughput for real‐time traffic under the premise of diversified and time‐varying delay requirements. To tackle this problem, we propose DCNC, a delay controlled network coding protocol, which can improve the throughput for real‐time traffic by dynamically controlling the delay in WMNs. To define an appropriate control foundation, we first build up a delay prediction model to capture the relationship between the average packet delay and the encoding batch size. Then, we design a novel freedom‐based feedback scheme to efficiently reflect the reception of receivers in a reliable way. Based on the predicted delay and current reception status, DCNC utilizes the continuous encoding batch size adjustment to control delay and further improve the throughput. Extensive simulations show that, when faced with the diversified and time‐varying delay requirements, DCNC can constantly fulfill the delay requirements, for example, achieving over 95% efficient packet delivery ratio (EPDR) in all instances under good channel quality, and also obtains higher throughput than the state‐of‐art protocol. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

11.
    
Wireless sensor networks consist of a large number of wireless sensor nodes that organize themselves into multihop radio networks. With different link quality, different distance to the sink, nodes in a network are not treated equally, especially in a network with high traffic. In this paper, we propose a fairness adaptive time division multiple access scheduling algorithm (FATS) considering the fairness of network resource allocation. This algorithm, combining several heuristic algorithms, can assign network resources to the nodes to lead to maximizing the minimum end‐to‐end packet delivery success ratio. Because the wireless link is usually time‐varying, this algorithm can also assign the time slots to the nodes adaptively and energy‐efficiently according to the variation of link quality. We define several criteria for the slot assignment and adjustment. The change in slot assignment can be finished quickly during normal packet transmission, which causes little affect to the network. Meanwhile, considering the required data rate, FATS can achieve the maximum transmission capacity of the network with specified static or dynamic reliability. The simulation results show that the FATS can significantly reduce the difference of the end‐to‐end packet delivery ratio, track the variation of link quality quickly, and achieve the fairness of resource allocation.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

12.
Traditional traffic identification methods based on well‐known port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network‐based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG‐MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.  相似文献   

13.
    
Underwater acoustic sensor networks (UASNs) are subjected to harsh characteristics of underwater acoustic channel such as severe path losses, noise, and high propagation delays. Among these constraints, propagation delay (more generally, end‐to‐end delay) is the most dominating limitation especially for time‐critical UASN applications. Although the minimization of end‐to‐end delay can be achieved by using the minimum hop routing, this solution cannot lead prolonged lifetimes since nodes consume excessive energy for transmission over long links. On the other hand, the maximization of network lifetime is possible by using energy efficient paths, which consist of relatively short links but high number of hops. However, this solution results in long end‐to‐end delays. Hence, there is a trade‐off between maximizing the network lifetime and minimizing the end‐to‐end delay in UASNs. In this work, we develop a novel multi‐objective–optimization (MOO) model that jointly maximizes the network lifetime while minimizing the end‐to‐end delay. We systematically analyze the effects of limiting the end‐to‐end delay on UASN lifetime. Our results reveal that the minimum end‐to‐end delay routing solution results in at most 72.93% reduction in maximum network lifetimes obtained without any restrictions on the end‐to‐end delay. Nevertheless, relaxing the minimum end‐to‐end delay constraint at least by 30.91% yields negligible reductions in maximum network lifetimes.  相似文献   

14.
In this paper, an orthogonal frequency division multiple access (OFDMA)‐based minimum end‐to‐end delay (MED) distributed routing scheme for mobile backhaul wireless mesh networks is proposed. The proposed scheme selects routing paths based on OFDMA subcarrier synchronization control, subcarrier availability, and delay. In the proposed scheme, OFDMA is used to transmit frames between mesh routers using type‐I hybrid automatic repeat request over multipath Rayleigh fading channels. Compared with other distributed routing algorithms, such as most forward within radius R, farthest neighbor routing, nearest neighbor routing, and nearest with forwarding progress, simulation results show that the proposed MED routing can reduce end‐to‐end delay and support highly reliable routing using only local information of neighbor nodes.  相似文献   

15.
    
In this paper, we are interested in providing deterministic end‐to‐end guarantees to real‐time flows in a distributed system. We focus on the end‐to‐end response time, quality of service (QoS) parameter of the utmost importance for such flows. We assume that each node uses a Fixed Priority scheduling. We determine a bound on the end‐to‐end response time of any real‐time flow with a worst case analysis using the trajectory approach. We establish new results that we compare with those provided by the classical holistic approach for flows visiting the same sequence of nodes. These results show that the trajectory approach is less pessimistic than the holistic one. Moreover, the bound provided by our worst‐case analysis is reached in various configurations, as shown in the examples presented. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

16.
本文从移动网络端到端容灾的角度对网络容灾建设思路进行探讨,论文主要分析了基础网络、业务网络、支撑网络等不同层面的网络容灾需求,以基础网络为例对端到端的网络容灾进行了分析,提出了全网络容灾目标,并给出网络容灾实施建议。  相似文献   

17.
何宝宏 《电信科学》2005,21(5):28-30
因为现实和演进等原因.电信网络IP化的趋势不可阻挡,IP技术最成功的应用就是Internet,但30多年来Internet已经从教育科研走向了商业化应用,再加上技术和社会进步,相关政策的调整等原因,其核心设计理念“端到端的透明性”面临着严峻挑战,已经成为很多问题(尤其是商业模式和安全问题)的根源。因此,构建IP电信网不应是简单地在现有的IP之上增加业务控制、QoS和安全机制等,而是要更新Internet的设计理念,从体系架构开始重新考虑。  相似文献   

18.
    
In this work, we propose an end‐to‐end retransmission framework for dynamically calculating efficient retransmission time‐out intervals in delay‐tolerant networks (DTNs) with scheduled connectivity. The proposed framework combines deterministic and statistical information about the network state to calculate worst‐case estimates about the expected round trip times. Such information includes connectivity schedules, convergence layer protocols specifics, communication link characteristics, and network statistics about the maximum expected packet error rates and storage congestion. We detail the implementation of the proposed framework within the end‐to‐end application data conditioning layer proposed for the DTN architecture, realized by the Delay‐Tolerant Payload Conditioning protocol, as part of the Interplanetary Overlay Network–DTN reference implementation, and evaluate its performance in a complex deep‐space emulation scenario in our DTN testbed. Our results show that our approach achieves great accuracy in round‐trip time estimations and, therefore, faster retransmissions of lost data, in comparison to the statically configured retransmission mechanism of the original Delay‐Tolerant Payload Conditioning protocol. As a result, in‐order data reception rate and storage requirements on the receiver side are significantly improved, at minimum or even zero extra cost in transmission overhead due to duplicate transmissions.  相似文献   

19.
    
Since a TCP sender cannot distinguish between packet losses arising from transmission errors from those due to congestion, TCP tends to perform poorly on wireless links that are prone to transmission errors. Several techniques have previously been proposed to improve TCP performance over wireless links. Existing schemes typically require an intermediate node (typically, a base station) to be TCP‐aware. For instance, the Snoop scheme requires the base station to interpret TCP headers and take appropriate action to help improve TCP performance. This paper proposes an alternative TCP‐unaware technique that attempts to mimic the behavior of the Snoop protocol. Performance evaluation shows that the proposed Delayed Dupacks scheme performs quite well. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

20.
    
Hybrid networks, comprising a conventional cellular network overlaid with Device‐to‐Device (D2D), offer efficient way to improve system throughput. In this paper, a novel orthogonal frequency‐division multiple access channel‐assignment method is proposed for hybrid network. The proposed approach is optimal in terms of throughput and is subjected to a sensible QoS requirement, which guarantees that macrocell and D2D achieve a prescribed data rate and outage probability, respectively. Our solution consists of two phases. In the first phase, the minimum sub‐channels are allocated to the macrocell to satisfy their data rate requirements. This problem is mapped to the 0‐1 Knapsack Problem and solved by integer programming based Lagrange dual approach. In the second phase, the redundant sub‐channels are allocated to D2D pairs to maximize the throughput of D2D networks. An interference management scheme is proposed to guarantee the outage probability of D2D communications. A cluster is taken as the unit for frequency reuse among D2D pairs. The problem of clustering is mapped to the MAX k‐CUT problem in graph theory and is solved by graph‐based heuristic algorithm. Extensive simulations demonstrate the superior performance of the proposed solution compared with the existing scheme. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号