首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
LTE-A是一种4G移动通信标准,可满足移动数据业务对传输带宽的要求。为解决移动通信网络中室内信号质量较差的问题,LTE-A标准采用飞蜂窝技术作为室内无线接入解决方案。针对LTE-A飞蜂窝网络的时延边界问题,运用随机网络演算方法分析业务流的自相似性质和MIMO信道的时变特性,构建了LTE-A飞蜂窝网络中自相似业务流的随机到达与随机服务模型。围绕所构建的到达与服务模型,运用有效带宽理论和chernoff界方法,给出了自相似业务流的端到端时延边界。NS3仿真验证表明,在信道带宽和业务流优先级等指标不同的情形下,所给出的理论端到端时延边界与仿真时延的偏差在2ms以内,较为准确有效,可为确保LTE-A飞蜂窝网络的服务质量提供依据。  相似文献   

2.
In this paper, we propose a framework of traffic control to accommodate multimedia connections on an ATM wide-area network. At the lower layer, an efficient bandwidth allocation method and a constant time cell scheduling algorithm are provided in each network node. These mechanisms have the capability of multiplexing traffics and satisfying diverse delay and loss performance requirements. At the higher layer, a three-phase connection establishment procedure is applied. It transforms the end-to-end performance requirement of a connection request into local requirements for each intermediate node of a routing path. If the requirements for each intermediate node can be satisfied, the connection is accepted; otherwise, another routing path will be examined. Without resort to any complicated rate control inside the network, in our system, time distances between successive cells while they are passing through the network are maintained by imposing an upper bound on the end-to-end queueing delay of each cell. Simulation results show that the connection establishment overhead of our system is almost independent of the traffic load of the network. Its value is very small so that the proposed framework is feasible in the future ATM networks. Besides, optimally transforming end-to-end performance requirement into those for each intermediate node to maximize the saturation load of the network has been proved to be an NP-Hard problem. Two heuristic algorithms are proposed. Experiments are performed to evaluate these algorithms.  相似文献   

3.
An optimal circuit allocation problem for all-optical circuit-switched backbone networks with average packet delay cost criterion is considered. Multiple classes of traffic flows arrive at the network edge routers, where they can be queued until an end-to-end optical circuit can be allocated. Assuming fluid traffic and circuit allocation of fixed periods, a lower bound on the optimal average packet delay is derived and the cost of two allocation policies are evaluated exactly. The cost of both policies are demonstrated for a variety of deterministic and random networks and are compared with the lower bound.  相似文献   

4.
Peer-to-peer networks are overlay networks that are constructed over underlay networks. These networks can be structured or unstructured. In these networks, peers choose their neighbors without considering underlay positions, and therefore, the resultant overlay network may have a large number of mismatched paths. In a mismatched path, a message may meet an underlay position several times, which causes redundant network traffic and end-to-end delay. In some of the topology matching algorithms called the heuristic algorithms, each peer uses a local search operator for gathering information about the neighbors of that peer located in its neighborhood radius. In these algorithms, each peer also uses a local operator for changing the connections among the peers. These matching algorithms suffer from two problems; neither the neighborhood radius nor the local operator can adapt themselves to the dynamicity of the network. In this paper, a topology matching algorithm that uses learning automata to adapt the neighborhood radius and an adaptation mechanism inspired from the Schelling segregation model to manage the execution of the local operator is proposed. To evaluate the proposed algorithm, computer simulations were conducted and then the results were compared with the results obtained for other existing algorithms. Simulation results have shown that the proposed algorithm outperforms the existing algorithms with respect to end-to-end delay and number of mismatched paths.  相似文献   

5.
提出了一个典型的模型,该模型考虑到包延时的相关性和串联队列的相关性,这对端到端的抖动有重要影响。针对一个单队列的Poisson流量分布的抖动,给出了一个非常易于计算的公式,然后推广到基于串联队列的标记流的端到端抖动。通过模拟实验可以发现,模型的分析值和模拟值基本吻合,在大流量背景下更为精确,更重要的是对于抖动而言该值是可信的,这样就可以用于网络设计过程中。  相似文献   

6.
Fieldbus communication networks aim to interconnect sensors, actuators and controllers within process control applications. Therefore, they constitute the foundation upon which real-time distributed computer-controlled systems can be implemented. P-NET is a fieldbus communication standard, which uses a virtual token-passing medium-access-control mechanism. In this paper pre-run-time schedulability conditions for supporting real-time traffic with P-NET networks are established. Essentially, formulae to evaluate the upper bound of the end-to-end communication delay in P-NET messages are provided. Using this upper bound, a feasibility test is then provided to check the timing requirements for accessing remote process variables. This paper also shows how P-NET network segmentation can significantly reduce the end-to-end communication delays for messages with stringent timing requirements.  相似文献   

7.
为保证无线多跳网的服务质量(QoS),需要求解其性能边界。基于统计型流量包络建立了无线多跳网的数据流传输模型,在此模型的基础上利用统计网络演算理论推导了无线多跳网单节点的时延统计性边界、端到端的时延统计性边界以及端到端数据积压统计性边界。仿真实验结果表明,不同数据流的测量值都在数值计算的边界范围之内,表明基于统计网络演算理论的无线多跳网QoS边界模型具有较好的性能。  相似文献   

8.
Eeva  Jorma  Samuli 《Performance Evaluation》2003,54(4):311-330
We consider the calculation of blocking probabilities in multicast trees with dynamic membership. We extend the work by Karvo et al., where an approximate algorithm based on the reduced load approximation (RLA) was given to calculate end-to-end blocking for infinite sized user populations in multicast networks. The new algorithm for calculating end-to-end call blocking exactly for an arbitrary sized user population is based on the known blocking probability algorithm in hierarchical multiservice access networks, where link occupancy distributions are alternately convolved and truncated. We show that the algorithm can be applied to multicast trees embedded in a network with an arbitrary topology carrying also non-multicast traffic. The resource sharing of multicast connections, however, requires the modification of the algorithm by introducing a new type of convolution, the OR-convolution. In addition, we discuss several different user population models for which the algorithm is applicable.  相似文献   

9.
在综合服务模型中非实时通信虽然不要求严格的服务质量保证,但是它承担着绝大多数网络应用,因而传输性能的影响更广泛。目前用于保证实时连接的服务质量的速率比例包调度算法不能公平地处理非实时通信和实时连接,允许实时连接的通信量任意地抢占未预约带宽,使得非实时通信的传输性能恶化。自适应混合包调度算法不仅保证实时连接的服务质量,而且通过限制实时连接的非协议通信量对网络资源的占用,优化了非实时通信的传输性能,提高了带宽资源的效率。  相似文献   

10.
自相似业务网络性能分析   总被引:1,自引:0,他引:1  
最近10多年的大量研究结果表明,网络业务具有普遍的自相似特性.自相似特性对网络的性能分析和设计具有广泛的影响.自相似业务的性能分析问题是一个没有很好解决的问题.提出了自相似业务环境下的分形界到达过程,研究了基于分形界到达过程的自相似业务漏桶参数的优化方法,给出了时延约束条件下漏桶速率和桶深的计算公式.最后研究了网络演算在确保服务性能分析中的建模方法,推导出了基于网络演算的端到端时延界、队列长度界和有效带宽的计算公式.通过具体的应用实例,验证了分析结果的正确性和有效性.  相似文献   

11.
In this paper, we propose a feasibility analysis of periodic hard real-time traffic in packet-switched networks using first come first served (FCFS) queuing but no traffic shapers. Our work constitutes a framework that can be adopted for real-time analysis of switched low-cost networks like Ethernet without modification of the standard network components. Our analysis is based on a flexible network and traffic model, e.g., variable-sized frames, arbitrary deadlines and multiple switches. The correctness of our real-time analysis and the tightness of it for network components in single-switch networks are given by theoretical proofs. The performance of the end-to-end real-time analysis is evaluated by simulations. Moreover, our conceptual and experimental comparison studies between our analysis and the commonly used Network Calculus (NC) shows that our analysis can achieve better performance than NC in many cases.  相似文献   

12.
Yongning  Gee-Swee   《Computer Communications》2006,29(18):3833-3843
Recently, a number of studies have been made based on the concept of Route Interference to provide deterministic end-to-end quality of service (QoS) guarantees. Nonetheless, these studies tend to confine to a simple scheduling scheme and study the traffic in a single-class environment or the highest priority traffic in a multi-class environment. This is rather restrictive. In this paper, we propose a new general service scheme to service flows. This scheme is represented by a Latency-Rate Max–Min service curve (LRMMSC). Subsequently, for a network of LRMMSC, we prove the existence of tight bounds on end-to-end queuing delay and buffer size needed for loss-free packet delivery, provided that all flows obey a given source rate condition in the form of their route interference. Our approach has two salient features: (1) the general nature of the concept of service curve enables the service scheme to be implemented by many well-known scheduling disciplines, (2) the general network model adopted with no constraints on the manner of packet queuing makes the results applicable to many complex networks. In addition, we have also derived a concise expression of end-to-end delay bound that depends only on the service offered to the buffers containing the considered flow. This is very useful in practice as the expression is simple and requires minimum amount of information input. Simulation experiments are conducted to verify the LRMMSC model. The analytical and simulation results exhibit close resemblance. In addition, the advantage of LRMMSC scheme in providing maximum end-to-end delay is also demonstrated.  相似文献   

13.
This paper addresses the problem of computing end-to-end delay bounds for a traffic flow traversing a tandem of FIFO multiplexing network nodes using Network Calculus. Numerical solution methods are required, as closed-form delay bound expressions are unknown except for few specific cases. For the methodology called the Least Upper Delay Bound, the most accurate among those based on Network Calculus, exact and approximate solution algorithms are presented, and their accuracy and computation cost are discussed. The algorithms are inherently exponential, yet affordable for tandems of up to few tens of nodes, and amenable to online execution in cases of practical significance. This complexity is, however, required to compute accurate bounds. As the LUDB may actually be larger than the worst-case delay, we assess how close the former is to the latter by computing lower bounds on the worst-case delay and measuring the gap between the lower and upper bound.  相似文献   

14.
包延迟跟踪在端到端性能分析和流量控制算法设计中是很重要的度量指标。论文介绍在延迟测量中评估和消除相对时钟误差的convexhulls法,这些算法能大大改善测量的准确性,可以在线和离线使用。  相似文献   

15.
邵华钢  程海英  王辉  李志 《计算机工程》2010,36(20):106-109
为实现对微流的最差延迟最早聚集,并对聚集完成的宏流进行过滤与排序,实现宏流公平调度,提出基于流量隔离的公平聚集器(FAFI)。FAFI解决了在基于流量聚集调度模式中,同一宏流内部各竞争微流之间的突发流量对数据包传输延迟产生影响的问题。通过严格的数学推理与演算,证明FAFI的有效性。仿真实验验证了对FAFI模型的定量分析结果和FAFI模型的性能。  相似文献   

16.
《Computer Communications》1999,22(15-16):1382-1391
To guarantee quality of service (QoS) in future integrated service networks, traffic sources must be characterized to capture the traffic characteristics relevant to network performance. Recent studies reveal that multimedia traffic shows burstiness over multiple time scales and long range dependence (LRD). While researchers agree on the importance of traffic correlation, there is no agreement on how much correlation should be incorporated into a traffic model for performance estimation and dimensioning of networks.In this article, we present an approach for defining a relevant time scale for the characterization of VBR video traffic in the sense of queueing delay. We first consider the Reich formula and characterize traffic by the Piecewise Linear Arrival Envelope Function (PLAEF). We then define the cutoff interval above which the correlation does not affect the queue buildup. The cutoff interval is the upper bound of the time scale which is required for the estimation of queue size and thus the characterization of VBR video traffic. We also give a procedure to approximate the empirical PLAEF with a concave function; this significantly simplifies the calculation in the estimation of the cutoff interval and delay bound with little estimation loss.We quantify the relationship between the time scale in the correlation of video traffic and the queue buildup using a set of experiments with traces of MPEG/JPEG-compressed video. We show that the critical interval, i.e. the range for the correlation relevant to the queueing delay, depends on the traffic load: as the traffic load increases, the range of the time scale required for estimation for queueing delay also increases. These results offer further insights into the implication of LRD in VBR video traffic.  相似文献   

17.
《Performance Evaluation》2006,63(9-10):956-987
Aggregate scheduling has been proposed as a solution for achieving scalability in large-size networks. However, in order to enable the provisioning of real-time services, such as video delivery or voice conversations, in aggregate scheduling networks, end-to-end delay bounds for single flows are required. In this paper, we derive per-flow end-to-end delay bounds in aggregate scheduling networks in which per-egress (or sink-tree) aggregation is in place, and flows traffic is aggregated according to a FIFO policy. The derivation process is based on Network Calculus, which is suitably extended to this purpose. We show that the bound is tight by deriving the scenario in which it is attained. A tight delay bound can be employed for a variety of purposes: for example, devising optimal aggregation criteria and rate provisioning policies based on pre-specified flow delay bounds.  相似文献   

18.
Determining end-to-end delay bounds in heterogeneous networks   总被引:3,自引:0,他引:3  
We define a class of Guaranteed Rate (GR) scheduling algorithms. The GR class includes Virtual Clock, Packet-by-Packet Generalized Processor Sharing and Self-Clocked Fair Queuing. For networks that employ scheduling algorithms belonging to GR, we present a method for determining an upper bound on end-to-end delay. The method facilitates determination of end-to-end delay bounds for a variety of sources. We illustrate the method by determining end-to-end delay bounds for sources conforming to Leaky Bucket and exponentially bounded burstiness.  相似文献   

19.
论文对网络队列系统性能定量分析新型数学工具——网络微积分学进行了归纳和总结,利用网络微积分学证明了利用分形漏桶整形器对自相似业务进行整形不会增加网络端到端延迟上界,计算了通用处理器共享下以分形漏桶包络轨迹为到达曲线和以速度等待时间函数为服务曲线的端到端延迟确定性上界。  相似文献   

20.
A Jackson-like network that supports J types of interactive traffic (e.g., interactive messages) as well as I types of noninteractive traffic (e.g., file transfers, facsimile) is considered. The service-time distributions and the internal routing are homogeneous for all traffic types but can be node (queue) dependent. The problem is to find a scheduling control that minimizes a weighted sum of the average end-to-end delay for the interactive types and at the same time ensures that the average end-to-end delays for the interactive types will be below given design constraints. Conservation laws are first established and shown to yield the base of a polymatroid. The optimal control problem is then transformed into a linear program with the feasible region being the polymatroid base truncated by delay constraints. An optimal control is identified that partitions the traffic types into I+r (0⩽rJ) ordered groups and applies a strict priority rule among the groups. An algorithm is developed that does the grouping and solves the optimization problem. A decentralized implementation of the optimal control is also discussed  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号