首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Integration of multicast and unicast data in future radio access networks will be necessary in order to improve the resource efficiency and provide new services. Such integration requires new and efficient resource sharing mechanisms. These mechanisms need to be optimized to provide the best possible trade-off between resource efficiency and fairness. In this article, we consider a case where streaming multicast users are multiplexed together with elastic unicast users on a common time-slotted channel. We derive a system model to study the performance of various resource allocations strategies under proportional and resource fairness constraints. Fairness is directly defined in terms of the users’ utilities rather than of the throughputs they are assigned to. We also describe an extension of the well-known unicast proportional fair scheduler to the multicast scenario. Through extensive simulations we demonstrate the performance of this scheduler for various traffic loads and multicast group sizes.
Gunnar KarlssonEmail:
  相似文献   

2.
p-Cycle reconfiguration methods (for instance complete, incremental, or dynamic-repair) based on the first event adaptive restoration model provide a promising approach for improving the dual-failure restorability characteristics of static p-cycle methods based on the static preplanned restoration model. However, if the reconfiguration process triggered by the first failure is not completed before a second failure occurs, p-cycle reconfiguration methods fail to achieve 100% dual-failure restorability and reduce to the static p-cycle methods which do not take advantage of the spare capacity to be reconfigured. In this study, we propose to use a new restoration model designated as first event locally adaptive restoration model with a coordinated re-restoration effort. This model is aimed to limit the reconfiguration scope to a local p-cycle where the spare capacity is only reconfigured on its straddling links for reducing the reconfiguration overhead (i.e., the average number of reconfigured links during the reconfiguration time.) According to this model, a two-phase locally reconfigurable p-cycle method is proposed. Only the straddling links of the local p-cycle affected by the first failure are reconfigured in the first phase. The second phase is not initialized until the second failure really occurs in the affected local p-cycle. The second phase is to enable the dual-failure restorations with a coordinated re-restoration effort for the first failed link from its original end nodes for any damage that the second failure causes to previously deployed restoration paths. The objective of the proposed method is to maximize the dual-failure restorability within a limited reconfiguration scope. We evaluate the correlation between the normalized spare capacity cost and the dual-failure restorability. The results show that the proposed local reconfiguration heuristic method improves the average dual-failure restorability of the 9n17s and Cost 230 networks by 45.1% and 20.1%, respectively, relative to the static p-cycles method and achieves closely the optimal value obtained using integer linear programming (ILP). Additionally, the spare capacity cost of the proposed local reconfiguration method is smaller than that of previous p-cycle reconfiguration methods in the two test networks.
Chuan-Ching SueEmail:
  相似文献   

3.
Providing resilient inter-domain connections in multi-domain optical GMPLS networks is a challenge. On the one hand, the integration of different GMPLS domains to run traffic engineering operations requires the development of a framework for inter-domain routing and control of connections, while keeping the internal structure and available resources of the domains undisclosed to the other operators. On the other hand, the definition of mechanisms to take advantage of such automatically switched inter-domain connectivity is still an open issue. This article focuses on the analysis of applicability of one of these mechanisms: P-cycle-based protection. The proposed solution is based on the decomposition of the multi-domain resilience problem into two sub-problems, namely, the higher level inter-domain protection and the lower level intra-domain protection. Building a P-cycle at the higher level is accomplished by certain tasks at the lower level, including straddling link connection, capacity allocation and path selection. In this article, we present several methods to realize inter-domain P-cycle protection at both levels and we evaluate their performance in terms of availability and spent resources. A discussion on a proposal of implementation of signalling based on extensions of existing protocols such as RSVP-TE and the PCE architecture illustrates the practical viability of the approach.
David LarrabeitiEmail:
  相似文献   

4.
This article examines all-optical multicast routing for wavelength-routed optical networks with sparse Multicast Capable (MC) nodes in two phases. The first phase is MC node placement and use of a simple and straightforward Maximum Path Count First (MPCF) algorithm to obtain candidates for MC nodes. The second phase is multicast routing with MC-based schemes that minimizes the number of wavelength channels with minimum transmission delay as required by a given multicast session, in that a light-tree is first constructed to connect MC nodes in a multicast group by using two algorithms, namely, the Pre-computing Minimum Cost (PMC) tree algorithm and the Pre-computing Shortest Path (PSP) tree algorithm. System performance of the proposed MPCF MC node placement algorithm is compared with that of the Normalized Cuts (NC) MC node placement algorithm for both PMC and PSP multicast routing. Furthermore, simulation results compare PMC and PSP multicast routing based on MPCF and NC node placement with Re-route-to-Source (RTS), Re-route-to-Any (RTA), Member-First (MF), and Member-Only (MO) multicast routing based on a light forest for a given multicast session in terms of average number of wavelengths needed, average blocking probability, and mean maximum transmission delay.
Tsung-Ching LinEmail:
  相似文献   

5.
Wireless ATM (W-ATM) microcellular networks encounter severe problems during handovers. Microcellular solutions in W-ATM networks increase the network traffic control as a result of frequent handover requests. This paper presents a two-layer microcellular ATM architecture which optimizes the handoff blocking probability performance of priority subscribers (PS) in a congested urban area. The lower layer of the proposed architecture is based on a microcellular ATM solution for normal subscribers (NS) while the higher layer is based on a high altitude stratospheric platform (HASP) overlay solution for absorbing the traffic load of the existed handoff calls of PS. Analysis is performed using Markov state diagrams, in order to optimize the performance of W-ATM networks.
S. LouvrosEmail:
  相似文献   

6.
This paper presents the design and evaluation of a highly efficient on-demand multicast routing protocol for mobile ad hoc networks (MANETs). The protocol, called Geography-aided Multicast Zone Routing Protocol (GMZRP), eliminates as much as possible duplicate route queries by using a simple yet effective strategy for propagating the multicast route request (MRREQ) packets. GMZRP is the first hybrid multicast protocol taking the advantages of both topological routing and geographical routing. It partitions the network coverage area into small zones and guarantees that each geographic zone is queried only once. GMZRP maintains a multicast forwarding tree at two levels of granularities, i.e., the zone granularity and the node granularity. By doing this, it can easily handle route breakage since the zone level information can help recover the link failure at the node level. The results of the performance evaluation of GMZRP using simulation show that, comparing with the well-known multicast protocol ODMRP (On-Demand Multicast Routing Protocol), GMZRP has much lower protocol overhead in terms of query packets and, meanwhile, achieves competing packet delivery ratio and shorter delivery latency.
Xiaopeng FanEmail:
  相似文献   

7.
This paper formulates a finite-state Markov channel model to represent received signal-to-noise (SNR) ratios having lognormal, K-distribution, chi-square (central) and chi-square (non-central) distributions in a slow fading channel. The range of the SNRs is partitioned into a finite number of states following earlier works in literature. Performance measures like level crossing rates, steady-state probabilities, transition probabilities, and state-time durations are derived, and numerical results are plotted and discussed for the FSMC models for all the distributions.
Vidhyacharan BhaskarEmail:
  相似文献   

8.
Optimization of Handover Parameters for Traffic Sharing in GERAN   总被引:1,自引:1,他引:0  
Cellular network traffic is unevenly distributed both in time and space, which greatly complicates network dimensioning. As a result, some cells in the network are permanently congested, while others are underutilized. In a previous paper, the authors showed that this problem can be effectively solved in GSM/EDGE Radio Access Networks (GERAN) by modifying handover boundaries. However, several drawbacks prevent operators from fully exploiting the potential of this technique. This paper investigates the limitations of current traffic-sharing approaches with tight frequency reuses in GERAN. To deal with such limitations, an algorithm is proposed to jointly optimize handover margins and signal-level constraints based on network statistics for traffic sharing in GERAN. A complementary algorithm is proposed to adjust cell (re)selection offsets to minimize the number of handovers. Simulation results show that the proposed method achieves a significant reduction in call blocking without excessive call quality impairment or increase of network signaling load when compared to the current approaches. More traffic can thus be handled without the need for any hardware upgrades, providing a cost-effective means to increase network capacity.
Volker WilleEmail:
  相似文献   

9.
This study proposes a novel cost-based fault-tolerant WDM-EPON (CFT-WDM-EPON) to provide overall protection. It only equips a backup feeder fiber to recover the system failure. Additionally, a prediction-based fair wavelength and bandwidth allocation (PFWBA) scheme is proposed to enhance the differentiated services for WDM-EPON based on dynamic wavelength allocation (DWA) and prediction-based fair excessive bandwidth reallocation (PFEBR) from our previous work. PFEBR involves an early-DBA mechanism, which improves prediction accuracy by delaying report messages of unstable traffic optical network units (ONUs), and assigns linear estimation credit to predict the arrival of traffic during waiting time. DWA can operate in coordination with an unstable degree list to allocate the available time of wavelength precisely. Simulation results show that the proposed PFWBA scheme outperforms WDM IPACT-ST and DWBA3 in terms of packet delay, jitter performance, throughput, wasted bandwidth, gain ratio of bandwidth, and packet loss.
Jhong-Yue LeeEmail:
  相似文献   

10.
This paper deals with one of the most important cell planning issues in a CDMA based multicast network. In a CDMA based wireless network, a terminal can significantly reduce the bit error rate via the cohesion of data streams from multiple base stations that share a common time line and are operated according to it. The cells whose base stations are operated as such are called soft-combining cells. Therefore, a terminal in a soft-combining cell can take advantage of error rate reduction, if the cell has at least one neighboring soft-combining cell. However, as soft-combining operation gives heavy burden to the network controller, the number of soft-combining cells should be limited. Our problem is to find a limited number of soft-combining cells such that each soft-combining cell has at least one neighboring soft-combining cell and that the sum of traffic demands of the selected cells is maximized.
Jae-Hoon KimEmail:
  相似文献   

11.
This article proposes the load-level-based admission control (LLAC) mechanism in order to provide service differentiation for optical burst-switched networks. The LLAC mechanism admits bursts of a given service class according to the network load and a class-associated parameter. Based on this parameter, called load level, the proposed mechanism differentiates the burst blocking probability experienced by each service class. We develop an analytical model for the proposed mechanism and evaluate its performance for different configurations through mathematical analysis. The results show that the load-level-based mechanism reduces the blocking probability of high-priority bursts by two orders of magnitude or more depending on the analyzed scenario. In addition, compared to other similar mechanisms, the load-level-based mechanism effectively differentiates the services in all analyzed configurations, requires less states in optical burst switching (OBS) nodes, and does not suffer from priority inversion.
Otto Carlos M. B. DuarteEmail:
  相似文献   

12.
The IEEE 802.16 standard (namely WiMAX) is proposed to support QoS-aware transmission of real-time service in Wireless Metropolitan Area Networks (WMANs). WiMAX also can operate as a wireless backbone, and then cooperates with WiFi to form a heterogeneous wireless network. Thus, hot spots of WiFi belonging to different WiMAX networks can communicate with each other. For achieving that a Base Station (BS) serves a large number of Subscriber Stations (SSs), WiMAX uses a centralized polling access mechanism instead of a random access mechanism. WiMAX thus avoids occurring access collisions but causes long polling delay under a high-density SSs situation. Consequently, IEEE 802.16 does not schedule real-time service (rtPS) while the BS is in multicast polling mode. This problem of long polling delay becomes worse when the BS serves high-density SSs, because the BS only polls some SSs or groups in every frame time. This paper thus proposes an adaptive polling approach with a cross-layer mechanism, which dynamically polls SSs among different polling modes while continuously supporting the rtPS service. The approach consists of two phases. The first phase adopts two hysteresises of number of SSs and residual bandwidth to determine the optimal polling mode for each connection. The second phase presents a novel QoS-aware rtPS service (QrtPS) that provides an Average Delay requirement instead of the Maximum Delay requirement to take over the rtPS service when a SS is polled by the multicast mode. Additionally, a cross-layer mechanism is proposed to achieve that the real-time applications can be sent with a high-quality or low-quality video codec when the SS is in unicast or multicast mode, respectively. Numerical results demonstrate that the proposed approach significantly outperforms IEEE 802.16 in average delay and network utilization. Furthermore, the collision probabilities of using different numbers of contention slots of an uplink subframe and different numbers of groups within a BS are evaluated for the multicast mode. The results meet the experiments.
Chien-Ming ChouEmail:
  相似文献   

13.
Shared-path protection (SPP) is a capacity- efficient mechanism to provide 100% single-link failure protection in WDM mesh networks. After the first link failure, however, if reconfiguration is unavailable, a second link failure may lead to tremendous service interruption. Vulnerability of a link is the percentage of links that are vulnerable to the arbitrary second link failure after the link failed and network vulnerability is defined as the average vulnerability of links in the network. In this article, we present three policies that can reduce network vulnerability by reducing backup sharing in shared-path protection. The first policy tries to restrict the times of sharing a wavelength-link by connections. The second policy tries to avoid backup sharing on highly vulnerable links. The third policy tries to avoid backup sharing on highly vulnerable wavelength-links. Algorithms to implement these policies based on a similar framework are presented. Numerical results suggest that there is a trade-off between capacity efficiency and network vulnerability in all the three policies. The third policy can deliver a better performance in terms of blocking probability and network vulnerability.
Yixin WangEmail:
  相似文献   

14.
In this paper, two traffic grooming approaches based on alternate path routing are proposed to accommodate a greater number of connections in optical networks. In the first approach (called as Source_SWG), the connections of same source and different destinations along a path are groomed in a wavelength channel, whereas in the second approach (called as Des_SWG), the connections of the same destination and different sources along a path are groomed in a wavelength channel. These approaches are compared with existing heuristic traffic grooming algorithms based on fixed routing. It is found that both the approaches provide less wavelengths than the existing heuristic traffic grooming algorithms for establishment of all the connections present in the network. The comparative studies of these approaches are also made under restricted shared protection. It is seen that in case of Source_SWG, the number of wavelengths required for establishment of all the connections present in the network is less than that for Des_SWG.
P. P. SahuEmail:
  相似文献   

15.
This paper is concerned with the problem of delay-dependent H control for two-dimensional (2-D) discrete state delay systems described by the second Fornasini and Marchesini (FM) state-space model. Based on a summation inequality, a sufficient condition to have a delay-dependent H noise attenuation for this 2-D system is given in terms of linear matrix inequalities (LMIs). A delay-dependent optimal state feedback H controller is obtained by solving an LMI optimization problem. Finally, a simulation example of thermal processes is given to illustrate the effectiveness of the proposed result.
Li Yu (Corresponding author)Email:
  相似文献   

16.
Loss modeling of asynchronous optical burst switches with shared wavelength converters is considered. An exact analysis based on continuous time Markov chains is proposed and validated by comparison with simulation for balanced and unbalanced traffic. A computationally efficient approximated analysis is also proposed and compared with the exact model to find applicability conditions. Approximate loss performance evaluation is presented for ranges of values which are not tractable either by simulation or exact analysis.
Javier AracilEmail:
  相似文献   

17.
Globally unique ID allocation is usually not applicable in a sensor network due to the massive production of cheap sensor nodes, the limited bandwidth, and the size of the payload. However, locally unique IDs are still necessary for nodes to implement unicast communications to save power consumption. Several solutions have been proposed for locally unique ID assignment in sensor networks. However, they bring much communication overhead, which is not desirable due to the limited power supply in a sensor node. Combined with a directed diffusion communication paradigm, a reactive ID assignment scheme with security mechanisms is proposed in this paper. It defers ID conflict resolution until data communications are initiated and thus saves communication overhead.
Lionel M. NiEmail:
  相似文献   

18.
This letter deals with robust direction of arrival (DOA) estimation based on the recursive H algorithm for the forward linear predictor. This recursive H criterion is different from traditional H 2 estimation criterions which minimize the squared prediction error. The forward linear predictor with recursive H algorithm is a worst case optimization approach, which minimizes the total effect of the worst disturbances on the prediction error. Some computer simulation examples are provided for illustrating the effectiveness of the proposed method.
Ann-Chen ChangEmail:
  相似文献   

19.
Providing differentiated services in IP/MPLS over WDM networks has attracted a lot of recent attention. This article extends the Path Inflation Control (PIC) policy recently proposed by us to provide differentiated services in IP/MPLS over WDM networks with traffic grooming. Three different algorithms are considered for provisioning differentiated services. The simulation results show that, with two of the three algorithms, the network cannot only provide differentiated services when the traffic load is high but also gives significantly lower blocking for the lower priority class traffic and for the overall traffic at low traffic loads.
Sanjay K. BoseEmail:
  相似文献   

20.
By taking advantage of statistical multiplexing gain in the burst level, optical burst switching (OBS) technology enables optical Internet to handle huge volume of data in an efficient manner without requiring optical buffers in the optical domain. However, when congestion builds up in the optical network core, large amount of data might be lost. In this article, we propose an efficient optical burst control algorithm that operates based on the awareness of future burst traffic condition to eliminate the effect of congestion reaction delay. The proposed algorithm takes advantage of multiple statistics to improve the estimation accuracy.Through performance evaluation, it is verified that the proposed algorithm proactively controls inbound burst traffic so that the OBS network can stay in a stable traffic condition while keeping the network throughput high.
Myungsik YooEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号