共查询到20条相似文献,搜索用时 31 毫秒
1.
Integration of multicast and unicast data in future radio access networks will be necessary in order to improve the resource
efficiency and provide new services. Such integration requires new and efficient resource sharing mechanisms. These mechanisms
need to be optimized to provide the best possible trade-off between resource efficiency and fairness. In this article, we
consider a case where streaming multicast users are multiplexed together with elastic unicast users on a common time-slotted
channel. We derive a system model to study the performance of various resource allocations strategies under proportional and
resource fairness constraints. Fairness is directly defined in terms of the users’ utilities rather than of the throughputs
they are assigned to. We also describe an extension of the well-known unicast proportional fair scheduler to the multicast
scenario. Through extensive simulations we demonstrate the performance of this scheduler for various traffic loads and multicast
group sizes.
相似文献
Gunnar KarlssonEmail: |
2.
Chuan-Ching Sue 《Photonic Network Communications》2009,17(2):129-144
p-Cycle reconfiguration methods (for instance complete, incremental, or dynamic-repair) based on the first event adaptive restoration
model provide a promising approach for improving the dual-failure restorability characteristics of static p-cycle methods based on the static preplanned restoration model. However, if the reconfiguration process triggered by the
first failure is not completed before a second failure occurs, p-cycle reconfiguration methods fail to achieve 100% dual-failure restorability and reduce to the static p-cycle methods which do not take advantage of the spare capacity to be reconfigured. In this study, we propose to use a new
restoration model designated as first event locally adaptive restoration model with a coordinated re-restoration effort. This
model is aimed to limit the reconfiguration scope to a local p-cycle where the spare capacity is only reconfigured on its straddling links for reducing the reconfiguration overhead (i.e.,
the average number of reconfigured links during the reconfiguration time.) According to this model, a two-phase locally reconfigurable
p-cycle method is proposed. Only the straddling links of the local p-cycle affected by the first failure are reconfigured in the first phase. The second phase is not initialized until the second
failure really occurs in the affected local p-cycle. The second phase is to enable the dual-failure restorations with a coordinated re-restoration effort for the first
failed link from its original end nodes for any damage that the second failure causes to previously deployed restoration paths.
The objective of the proposed method is to maximize the dual-failure restorability within a limited reconfiguration scope.
We evaluate the correlation between the normalized spare capacity cost and the dual-failure restorability. The results show
that the proposed local reconfiguration heuristic method improves the average dual-failure restorability of the 9n17s and
Cost 230 networks by 45.1% and 20.1%, respectively, relative to the static p-cycles method and achieves closely the optimal value obtained using integer linear programming (ILP). Additionally, the spare
capacity cost of the proposed local reconfiguration method is smaller than that of previous p-cycle reconfiguration methods in the two test networks.
相似文献
Chuan-Ching SueEmail: |
3.
János Szigeti Ricardo Romeral Tibor Cinkler David Larrabeiti 《Photonic Network Communications》2009,17(1):35-47
Providing resilient inter-domain connections in multi-domain optical GMPLS networks is a challenge. On the one hand, the integration
of different GMPLS domains to run traffic engineering operations requires the development of a framework for inter-domain
routing and control of connections, while keeping the internal structure and available resources of the domains undisclosed
to the other operators. On the other hand, the definition of mechanisms to take advantage of such automatically switched inter-domain
connectivity is still an open issue. This article focuses on the analysis of applicability of one of these mechanisms: P-cycle-based protection. The proposed solution is based on the decomposition of the multi-domain resilience problem into two
sub-problems, namely, the higher level inter-domain protection and the lower level intra-domain protection. Building a P-cycle at the higher level is accomplished by certain tasks at the lower level, including straddling link connection, capacity
allocation and path selection. In this article, we present several methods to realize inter-domain P-cycle protection at both levels and we evaluate their performance in terms of availability and spent resources. A discussion
on a proposal of implementation of signalling based on extensions of existing protocols such as RSVP-TE and the PCE architecture
illustrates the practical viability of the approach.
相似文献
David LarrabeitiEmail: |
4.
Performance assessment of multicast node placement for multicast routing in WDM networks with sparse light splitting 总被引:1,自引:0,他引:1
This article examines all-optical multicast routing for wavelength-routed optical networks with sparse Multicast Capable (MC)
nodes in two phases. The first phase is MC node placement and use of a simple and straightforward Maximum Path Count First
(MPCF) algorithm to obtain candidates for MC nodes. The second phase is multicast routing with MC-based schemes that minimizes
the number of wavelength channels with minimum transmission delay as required by a given multicast session, in that a light-tree
is first constructed to connect MC nodes in a multicast group by using two algorithms, namely, the Pre-computing Minimum Cost
(PMC) tree algorithm and the Pre-computing Shortest Path (PSP) tree algorithm. System performance of the proposed MPCF MC
node placement algorithm is compared with that of the Normalized Cuts (NC) MC node placement algorithm for both PMC and PSP
multicast routing. Furthermore, simulation results compare PMC and PSP multicast routing based on MPCF and NC node placement
with Re-route-to-Source (RTS), Re-route-to-Any (RTA), Member-First (MF), and Member-Only (MO) multicast routing based on a
light forest for a given multicast session in terms of average number of wavelengths needed, average blocking probability,
and mean maximum transmission delay.
相似文献
Tsung-Ching LinEmail: |
5.
S. Louvros 《Wireless Personal Communications》2008,47(4):567-573
Wireless ATM (W-ATM) microcellular networks encounter severe problems during handovers. Microcellular solutions in W-ATM networks
increase the network traffic control as a result of frequent handover requests. This paper presents a two-layer microcellular
ATM architecture which optimizes the handoff blocking probability performance of priority subscribers (PS) in a congested
urban area. The lower layer of the proposed architecture is based on a microcellular ATM solution for normal subscribers (NS)
while the higher layer is based on a high altitude stratospheric platform (HASP) overlay solution for absorbing the traffic
load of the existed handoff calls of PS. Analysis is performed using Markov state diagrams, in order to optimize the performance
of W-ATM networks.
相似文献
S. LouvrosEmail: |
6.
This paper presents the design and evaluation of a highly efficient on-demand multicast routing protocol for mobile ad hoc
networks (MANETs). The protocol, called Geography-aided Multicast Zone Routing Protocol (GMZRP), eliminates as much as possible
duplicate route queries by using a simple yet effective strategy for propagating the multicast route request (MRREQ) packets.
GMZRP is the first hybrid multicast protocol taking the advantages of both topological routing and geographical routing. It
partitions the network coverage area into small zones and guarantees that each geographic zone is queried only once. GMZRP
maintains a multicast forwarding tree at two levels of granularities, i.e., the zone granularity and the node granularity.
By doing this, it can easily handle route breakage since the zone level information can help recover the link failure at the
node level. The results of the performance evaluation of GMZRP using simulation show that, comparing with the well-known multicast
protocol ODMRP (On-Demand Multicast Routing Protocol), GMZRP has much lower protocol overhead in terms of query packets and,
meanwhile, achieves competing packet delivery ratio and shorter delivery latency.
相似文献
Xiaopeng FanEmail: |
7.
Vidhyacharan Bhaskar 《International Journal of Wireless Information Networks》2007,14(4):237-250
This paper formulates a finite-state Markov channel model to represent received signal-to-noise (SNR) ratios having lognormal,
K-distribution, chi-square (central) and chi-square (non-central) distributions in a slow fading channel. The range of the
SNRs is partitioned into a finite number of states following earlier works in literature. Performance measures like level
crossing rates, steady-state probabilities, transition probabilities, and state-time durations are derived, and numerical
results are plotted and discussed for the FSMC models for all the distributions.
相似文献
Vidhyacharan BhaskarEmail: |
8.
Optimization of Handover Parameters for Traffic Sharing in GERAN 总被引:1,自引:1,他引:0
Cellular network traffic is unevenly distributed both in time and space, which greatly complicates network dimensioning. As
a result, some cells in the network are permanently congested, while others are underutilized. In a previous paper, the authors
showed that this problem can be effectively solved in GSM/EDGE Radio Access Networks (GERAN) by modifying handover boundaries.
However, several drawbacks prevent operators from fully exploiting the potential of this technique. This paper investigates
the limitations of current traffic-sharing approaches with tight frequency reuses in GERAN. To deal with such limitations,
an algorithm is proposed to jointly optimize handover margins and signal-level constraints based on network statistics for
traffic sharing in GERAN. A complementary algorithm is proposed to adjust cell (re)selection offsets to minimize the number
of handovers. Simulation results show that the proposed method achieves a significant reduction in call blocking without excessive
call quality impairment or increase of network signaling load when compared to the current approaches. More traffic can thus
be handled without the need for any hardware upgrades, providing a cost-effective means to increase network capacity.
相似文献
Volker WilleEmail: |
9.
I-Shyan Hwang Zen-Der Shyu Chun-Che Chang Jhong-Yue Lee 《Photonic Network Communications》2009,18(2):160-173
This study proposes a novel cost-based fault-tolerant WDM-EPON (CFT-WDM-EPON) to provide overall protection. It only equips
a backup feeder fiber to recover the system failure. Additionally, a prediction-based fair wavelength and bandwidth allocation
(PFWBA) scheme is proposed to enhance the differentiated services for WDM-EPON based on dynamic wavelength allocation (DWA)
and prediction-based fair excessive bandwidth reallocation (PFEBR) from our previous work. PFEBR involves an early-DBA mechanism,
which improves prediction accuracy by delaying report messages of unstable traffic optical network units (ONUs), and assigns
linear estimation credit to predict the arrival of traffic during waiting time. DWA can operate in coordination with an unstable
degree list to allocate the available time of wavelength precisely. Simulation results show that the proposed PFWBA scheme
outperforms WDM IPACT-ST and DWBA3 in terms of packet delay, jitter performance, throughput, wasted bandwidth, gain ratio
of bandwidth, and packet loss.
相似文献
Jhong-Yue LeeEmail: |
10.
Jae-Hoon Kim 《Wireless Personal Communications》2008,45(1):121-129
This paper deals with one of the most important cell planning issues in a CDMA based multicast network. In a CDMA based wireless
network, a terminal can significantly reduce the bit error rate via the cohesion of data streams from multiple base stations
that share a common time line and are operated according to it. The cells whose base stations are operated as such are called
soft-combining cells. Therefore, a terminal in a soft-combining cell can take advantage of error rate reduction, if the cell
has at least one neighboring soft-combining cell. However, as soft-combining operation gives heavy burden to the network controller,
the number of soft-combining cells should be limited. Our problem is to find a limited number of soft-combining cells such
that each soft-combining cell has at least one neighboring soft-combining cell and that the sum of traffic demands of the
selected cells is maximized.
相似文献
Jae-Hoon KimEmail: |
11.
Igor M. Moraes Rafael P. Laufer Daniel de O. Cunha Otto Carlos M. B. Duarte 《Photonic Network Communications》2009,18(1):65-76
This article proposes the load-level-based admission control (LLAC) mechanism in order to provide service differentiation
for optical burst-switched networks. The LLAC mechanism admits bursts of a given service class according to the network load
and a class-associated parameter. Based on this parameter, called load level, the proposed mechanism differentiates the burst blocking probability experienced by each service class. We develop an analytical
model for the proposed mechanism and evaluate its performance for different configurations through mathematical analysis.
The results show that the load-level-based mechanism reduces the blocking probability of high-priority bursts by two orders
of magnitude or more depending on the analyzed scenario. In addition, compared to other similar mechanisms, the load-level-based
mechanism effectively differentiates the services in all analyzed configurations, requires less states in optical burst switching
(OBS) nodes, and does not suffer from priority inversion.
相似文献
Otto Carlos M. B. DuarteEmail: |
12.
The IEEE 802.16 standard (namely WiMAX) is proposed to support QoS-aware transmission of real-time service in Wireless Metropolitan
Area Networks (WMANs). WiMAX also can operate as a wireless backbone, and then cooperates with WiFi to form a heterogeneous
wireless network. Thus, hot spots of WiFi belonging to different WiMAX networks can communicate with each other. For achieving
that a Base Station (BS) serves a large number of Subscriber Stations (SSs), WiMAX uses a centralized polling access mechanism
instead of a random access mechanism. WiMAX thus avoids occurring access collisions but causes long polling delay under a
high-density SSs situation. Consequently, IEEE 802.16 does not schedule real-time service (rtPS) while the BS is in multicast
polling mode. This problem of long polling delay becomes worse when the BS serves high-density SSs, because the BS only polls
some SSs or groups in every frame time. This paper thus proposes an adaptive polling approach with a cross-layer mechanism,
which dynamically polls SSs among different polling modes while continuously supporting the rtPS service. The approach consists
of two phases. The first phase adopts two hysteresises of number of SSs and residual bandwidth to determine the optimal polling
mode for each connection. The second phase presents a novel QoS-aware rtPS service (QrtPS) that provides an Average Delay
requirement instead of the Maximum Delay requirement to take over the rtPS service when a SS is polled by the multicast mode.
Additionally, a cross-layer mechanism is proposed to achieve that the real-time applications can be sent with a high-quality
or low-quality video codec when the SS is in unicast or multicast mode, respectively. Numerical results demonstrate that the
proposed approach significantly outperforms IEEE 802.16 in average delay and network utilization. Furthermore, the collision
probabilities of using different numbers of contention slots of an uplink subframe and different numbers of groups within
a BS are evaluated for the multicast mode. The results meet the experiments.
相似文献
Chien-Ming ChouEmail: |
13.
Xu Shao Luying Zhou Teck Yoong Chai Chava Vijaya Saradhi Yixin Wang 《Photonic Network Communications》2008,15(2):171-181
Shared-path protection (SPP) is a capacity- efficient mechanism to provide 100% single-link failure protection in WDM mesh
networks. After the first link failure, however, if reconfiguration is unavailable, a second link failure may lead to tremendous
service interruption. Vulnerability of a link is the percentage of links that are vulnerable to the arbitrary second link
failure after the link failed and network vulnerability is defined as the average vulnerability of links in the network. In
this article, we present three policies that can reduce network vulnerability by reducing backup sharing in shared-path protection.
The first policy tries to restrict the times of sharing a wavelength-link by connections. The second policy tries to avoid
backup sharing on highly vulnerable links. The third policy tries to avoid backup sharing on highly vulnerable wavelength-links.
Algorithms to implement these policies based on a similar framework are presented. Numerical results suggest that there is
a trade-off between capacity efficiency and network vulnerability in all the three policies. The third policy can deliver
a better performance in terms of blocking probability and network vulnerability.
相似文献
Yixin WangEmail: |
14.
P. P. Sahu 《Photonic Network Communications》2008,16(3):233-238
In this paper, two traffic grooming approaches based on alternate path routing are proposed to accommodate a greater number
of connections in optical networks. In the first approach (called as Source_SWG), the connections of same source and different
destinations along a path are groomed in a wavelength channel, whereas in the second approach (called as Des_SWG), the connections
of the same destination and different sources along a path are groomed in a wavelength channel. These approaches are compared
with existing heuristic traffic grooming algorithms based on fixed routing. It is found that both the approaches provide less
wavelengths than the existing heuristic traffic grooming algorithms for establishment of all the connections present in the
network. The comparative studies of these approaches are also made under restricted shared protection. It is seen that in
case of Source_SWG, the number of wavelengths required for establishment of all the connections present in the network is
less than that for Des_SWG.
相似文献
P. P. SahuEmail: |
15.
This paper is concerned with the problem of delay-dependent H
∞ control for two-dimensional (2-D) discrete state delay systems described by the second Fornasini and Marchesini (FM) state-space
model. Based on a summation inequality, a sufficient condition to have a delay-dependent H
∞ noise attenuation for this 2-D system is given in terms of linear matrix inequalities (LMIs). A delay-dependent optimal state
feedback H
∞ controller is obtained by solving an LMI optimization problem. Finally, a simulation example of thermal processes is given
to illustrate the effectiveness of the proposed result.
相似文献
Li Yu (Corresponding author)Email: |
16.
Pedro Reviriego Anna Maria Guidotti Carla Raffaelli Javier Aracil 《Photonic Network Communications》2008,16(1):61-70
Loss modeling of asynchronous optical burst switches with shared wavelength converters is considered. An exact analysis based
on continuous time Markov chains is proposed and validated by comparison with simulation for balanced and unbalanced traffic.
A computationally efficient approximated analysis is also proposed and compared with the exact model to find applicability
conditions. Approximate loss performance evaluation is presented for ranges of values which are not tractable either by simulation
or exact analysis.
相似文献
Javier AracilEmail: |
17.
Hongbo Zhou Matt W. Mutka Lionel M. Ni 《International Journal of Wireless Information Networks》2006,13(4):317-328
Globally unique ID allocation is usually not applicable in a sensor network due to the massive production of cheap sensor nodes, the limited bandwidth, and the size of the payload. However, locally unique IDs are still necessary for nodes to implement unicast communications to save power consumption. Several solutions have been proposed for locally unique ID assignment in sensor networks. However, they bring much communication overhead, which is not desirable due to the limited power supply in a sensor node. Combined with a directed diffusion communication paradigm, a reactive ID assignment scheme with security mechanisms is proposed in this paper. It defers ID conflict resolution until data communications are initiated and thus saves communication overhead.
相似文献
Lionel M. NiEmail: |
18.
This letter deals with robust direction of arrival (DOA) estimation based on the recursive H
∞ algorithm for the forward linear predictor. This recursive H
∞ criterion is different from traditional H
2 estimation criterions which minimize the squared prediction error. The forward linear predictor with recursive H
∞ algorithm is a worst case optimization approach, which minimizes the total effect of the worst disturbances on the prediction
error. Some computer simulation examples are provided for illustrating the effectiveness of the proposed method.
相似文献
Ann-Chen ChangEmail: |
19.
Providing differentiated services in IP/MPLS over WDM networks has attracted a lot of recent attention. This article extends
the Path Inflation Control (PIC) policy recently proposed by us to provide differentiated services in IP/MPLS over WDM networks
with traffic grooming. Three different algorithms are considered for provisioning differentiated services. The simulation
results show that, with two of the three algorithms, the network cannot only provide differentiated services when the traffic
load is high but also gives significantly lower blocking for the lower priority class traffic and for the overall traffic
at low traffic loads.
相似文献
Sanjay K. BoseEmail: |
20.
By taking advantage of statistical multiplexing gain in the burst level, optical burst switching (OBS) technology enables
optical Internet to handle huge volume of data in an efficient manner without requiring optical buffers in the optical domain.
However, when congestion builds up in the optical network core, large amount of data might be lost. In this article, we propose
an efficient optical burst control algorithm that operates based on the awareness of future burst traffic condition to eliminate
the effect of congestion reaction delay. The proposed algorithm takes advantage of multiple statistics to improve the estimation
accuracy.Through performance evaluation, it is verified that the proposed algorithm proactively controls inbound burst traffic
so that the OBS network can stay in a stable traffic condition while keeping the network throughput high.
相似文献
Myungsik YooEmail: |