首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Scheduling Time-Constrained Communication in Linear Networks   总被引:1,自引:0,他引:1  
  相似文献   

2.
We consider the problem of time-constrained scheduling of packets in a communication network. Each packet has, in addition to its source and its destination, a release time and a deadline. The goal of an algorithm is to maximize the number of packets that arrive to their destinations by their respective deadlines, given the network constraints.  相似文献   

3.
线性网络上分布式任务调度算法   总被引:1,自引:0,他引:1  
针对一种已有的分布式计算理论模型(单位长度的任务由处理器独立产生,没有全局控制,彼此通信需要花费时间),研究了在线性网络上的任务有效调度问题.通过考虑算法中任务处理时间和通信时间之间的平衡,给出了一个近似比为5.88的分布式算法,该算法无需全局信息,且处理策略简单.对该问题的近似比下界也做了研究,证明了该问题不存在近似比小于1.16的算法.  相似文献   

4.
时间约束调度中功能单元的下限估算   总被引:1,自引:0,他引:1  
针对高层次综合中时间约束下的调度问题,提出了对功能单元的2种下限估算算法:单位长度调度法和最大网络流法.其主要思想是将原调度问题的不同约束放松,得到多项式可解的新问题,并使得新问题的最优解是原调度问题的下限值.将2种算法与已有的最小重叠法和整数线性规划给出的最优解做了理论和实验上的比较.实验结果表明:2种估算算法运行时间合理,并且单位长度调度法比最小重叠法更准确.最后总结了各种约束对下限估算准确性的影响.  相似文献   

5.
Adler  Khanna  Rajaraman  Rosén 《Algorithmica》2008,36(2):123-152
Abstract. The time-constrained packet routing problem is to schedule a set of packets to be transmitted through a multinode network, where every packet has a source and a destination (as in traditional packet routing problems) as well as a release time and a deadline. The objective is to schedule the maximum number of packets subject to deadline constraints. This problem is studied in [1], where it is shown that the problem is NP-Complete even when the underlying topology is a linear array. Approximation algorithms are also provided in [1] for the linear array and the unidirectional ring for both the case where packets may be buffered in transit and the case where they may not be. In this paper we extend the results of [1] in two directions. First, we consider the more general network topologies of trees and two-dimensional meshes. Second, we associate with each packet a measure of utility, called a weight, and study the problem of maximizing the total weight of the packets that are scheduled subject to their timing constraints. For the bufferless case, we provide constant factor approximation algorithms for the time-constrained scheduling problem with weighted packets on trees and meshes. We also provide logarithmic approximations for the same problems in the buffered case. These results are complemented by new lower bounds, which demonstrate that we cannot hope to achieve the same results for general network topologies. For example, we show that if k packets are required to follow prescribed paths in an arbitrary graph, then unless NP = ZPP, there is no polynomial-time k 1-ε -approximation, for any ε > 0 , to the optimal set of packets that can be scheduled.  相似文献   

6.
Adler  Khanna  Rajaraman  Rosén 《Algorithmica》2003,36(2):123-152
The time-constrained packet routing problem is to schedule a set of packets to be transmitted through a multinode network, where every packet has a source and a destination (as in traditional packet routing problems) as well as a release time and a deadline. The objective is to schedule the maximum number of packets subject to deadline constraints. This problem is studied in [1], where it is shown that the problem is NP-Complete even when the underlying topology is a linear array. Approximation algorithms are also provided in [1] for the linear array and the unidirectional ring for both the case where packets may be buffered in transit and the case where they may not be. In this paper we extend the results of [1] in two directions. First, we consider the more general network topologies of trees and two-dimensional meshes. Second, we associate with each packet a measure of utility, called a weight, and study the problem of maximizing the total weight of the packets that are scheduled subject to their timing constraints. For the bufferless case, we provide constant factor approximation algorithms for the time-constrained scheduling problem with weighted packets on trees and meshes. We also provide logarithmic approximations for the same problems in the buffered case. These results are complemented by new lower bounds, which demonstrate that we cannot hope to achieve the same results for general network topologies. For example, we show that if k packets are required to follow prescribed paths in an arbitrary graph, then unless NP = ZPP, there is no polynomial-time k1-ε -approximation, for any ε > 0 , to the optimal set of packets that can be scheduled.  相似文献   

7.
研究一个无线网络中信道分配的最大化问题.对该问题的离线版本给出了一个O(n2)时间的算法.对在线问题的一般情况,证明了k-look-ahead算法的下界至少为(k 2)*/(k 1);还给出了一个竞争比为2的1-look-ahead算法.  相似文献   

8.
由于延迟容忍网络(DTN)的两个节点之间路径呈间歇性且每个节点的存储量有限,使得传统网络中广泛使用的协议大多不适用于延迟容忍网络(DTN)。为了避免DTN中的节点出现缓存溢出现象,通过建立DNT结构模型并定义了数据流与网络节点最大占用的比率,提出了一种基于改变节点之间接触时间长度的传输调度算法,利用较小比率的传输路径来限制传输,以便为较大比率的传输路径腾出更多的传输空间,通过实验仿真表明,所提算法可以有效避免节点的缓存溢出且增加了网络吞吐量,进而提高了整体的网络性能。  相似文献   

9.
Time-Constrained Keyframe Selection Technique   总被引:1,自引:0,他引:1  
In accessing large collections of digitized videos, it is often difficult to find both the appropriate video file and the portion of the video that is of interest. This paper describes a novel technique for determining keyframes that are different from each other and provide a good representation of the whole video. We use keyframes to distinguish videos from each other, to summarize videos, and to provide access points into them. The technique can determine any number of keyframes by clustering the frames in a video and by selecting a representative frame from each cluster. Temporal constraints are used to filter out some clusters and to determine the representative frame for a cluster. Desirable visual features can be emphasized in the set of keyframes. An application for browsing a collection of videos makes use of the keyframes to support skimming and to provide visual summaries.  相似文献   

10.
在能量受限的传感器网络中,尽量延长网络寿命同时保证服务质量(如感知覆盖和数据完整)是关键的研究问题.节点睡眠调度能有效延长网络寿命.研究数据驱动的睡眠调度机制,利用感知数据的时空相关性识别冗余节点.核心思想是用非参数回归方法为节点建立预测模型,求解最大支配数的节点支配集,调度多个支配集轮流工作.睡眠节点的数据可以由支配集节点恢复.分别给出集中式、半分布式和分布式3个睡眠调度方法.据知,这是第1个将统计回归模型用于睡眠调度并扩展到大规模网络的研究.实验结果表明,该方法能够有效地减少活跃节点个数,节省能耗从而延长网络寿命,同时在用户指定误差范围内保证数据的完整性.  相似文献   

11.
Radio networks model wireless data communication when the bandwidth is limited to one wave frequency. The key restriction of such networks is mutual interference of packets arriving simultaneously at a node. The many-to-many (m2m) communication primitive involves p participant nodes from among n nodes in the network, where the distance between any pair of participants is at most d. The task is to have all the participants get to know all the input messages. We consider three cases of the m2m communication problem. In the ad-hoc case, each participant knows only its name and the values of n, p and d. In the partially centralized case, each participant knows the topology of the network and the values of p and d, but does not know the names of the other participants. In the centralized case, each participant knows the topology of the network and the names of all the participants. For the centralized m2m problem, we give deterministic protocols, for both undirected and directed networks, working in time, which is provably optimal. For the partially centralized m2m problem, we give a randomized protocol for undirected networks working in time with high probability (whp), and we show that any deterministic protocol requires time. For the ad-hoc m2m problem, we develop a randomized protocol for undirected networks that works in time whp. We show two lower bounds for the ad-hoc m2m problem. One lower bound states that any randomized protocol for the m2m ad hoc problem requires expected time. Another lower bound states that for any deterministic protocol for the m2m ad hoc problem, there is a network on which the protocol requires time when np(n)=Ω(n) and d>1, and that it requires Ω(n) time when np(n)=o(n). The results of this paper appeared in a preliminary form in “On many-to-many communication in packet radio networks” in Proceedings of the 10th Conference on Principles of Distributed Systems (OPODIS), Bordeaux, France, 2006, Lecture Notes in Computer Science 4305, Springer, Heidelberg, pp. 258–272. The work of B.S. Chlebus was supported by NSF Grant 0310503.  相似文献   

12.
Aggregation is an important and commonplace operation in wireless sensor networks. Due to wireless interferences, aggregation in wireless sensor networks often suffers from packet collisions. In order to solve the collision problem, aggregation scheduling is extensively researched in recent years. In many sensor network applications such as real-time monitoring, aggregation time is the most concerned performance. This paper considers the minimum-time aggregation scheduling problem in duty-cycled wireless sensor networks for the first time. We show that this problem is NP-hard and present an approximation algorithm based on connected dominating set. The theoretical analysis shows that the proposed algorithm is a nearly-constant approximation. Simulation shows that the scheduling algorithm has a good performance.  相似文献   

13.
无线网络包调度算法综述   总被引:4,自引:0,他引:4  
无线网络介质的广播特性使得相邻用户的业务传输产生竞争,并且网络所支持的支持业务也呈多样发展,而调度规则不仅可以解决竞争问题,还可以保证不同业务的QoS。该文概述了当前提出的用于无线网络的包调度算法,提出了还需解决的问题。  相似文献   

14.
Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks   总被引:2,自引:0,他引:2  
Routing is one of the most challenging development issues in Delay-Tolerant Networks (DTNs) because of lack of continuous connection. Existing routing schemes for DTNs provide best effort service, but are unable to optimize QoS and support message priority. In this paper, we present a Look-Ahead Routing and Message Scheduling approach (ALARMS) which exploits more accurate knowledge about various parameters regarding routing to achieve better QoS in the DTN. We assume a variation of the well-known ferry model, in which there are ferry nodes moving along pre-defined routes to exchange messages with the gateway node of each region on the route and also pass to the gateway nodes look-ahead routing information about when it will arrive at each gateway node on the route in the next two rounds and how long it will stay. The gateway nodes use this information to estimate the delivery delay of each message when being delivered by different ferries, and schedule the message to be delivered by the ferry which arrives earliest at the destination. Simulation results show that ALARMS outperforms three existing routing protocols: epidemic routing, Spray-and-Wait, and Spray-and-Focus, in terms of delay time, delivery ratio, and overhead. We also discuss five enhancement strategies on ALARMS and how ALARMS can support message prioritization.  相似文献   

15.
线型无线传感器网络是一种较为特殊的无线传感器网络类型,其传感器节点的分布区域接近线型区域。在满足监控性能的要求下,通过调度节点,让部分节点工作,其余节点休眠,可有效延长系统生命期。现有的调度算法在线型无线传感器网络下的性能不是很好,针对线型无线传感器网络的特点,提出了异步调度算法和同步调度算法。仿真实验表明,同步调度算法得到的覆盖集的大小为异步调度算法的76%左右,平均覆盖度接近理想最优情况。  相似文献   

16.
无线多跳Ad hoc网络中节点在业务发送过程中需要竞争共享信道,容易发生局部拥塞导致网络性能下降,而且节点内部采用的先入先出(FIFO)队列容易使队头阻塞,影响队列中后续分组的发送。本文提出了一种机会分组调度算法CBOS,发送节点采用多播RTS的方式同时指向多个接收节点,可以支持可变长分组,提高了Ad hoc网络的空间重用率,接收节点根据拥塞程度按照一定概率返回CTS,有利于节点网络的拥塞控制。仿真结果表明,该算法提高了网络端到端的饱和吞吐量和信道利用率,并提高了业务流之间的公平性。  相似文献   

17.
视觉传感器网络中节点感知模型为有向感知模型,感知范围被限定在节点的视野范围内.节点拥有多个感知方向,在一个工作时刻,节点只能工作于一个方向.针对视觉传感器网络的有向感知模型的点目标覆盖问题,提出一种贪婪算法(GreedyAlgorithm),在优化网络对于目标点覆盖的同时,解决了节点自身覆盖冲突的问题.在此基础上,引入贡献率概念反映节点在其感知方向上对于覆盖的贡献,提出了基于贡献率的贪婪算法(Contribution Rate Greedy Algorithm)以增大网络覆盖率.仿真实验表明了该算法的有效性.  相似文献   

18.
In an adversarial queueing network, the incoming traffic is decided by an adversary, who operates under a reasonable rate restriction. This model provides a valuable, complementary point of view to that of the traditional queueing network model in which arrivals are modeled by stochastic processes. As a result, the adversarial queueing network model has attracted much attention in recent years, especially as a way of modeling packet injections into a communication network. Our main result is a simple, effective packet routing and scheduling algorithm with a provably good performance. Specifically, our algorithm keeps the system stable (bounded number of packets in the system), with the bound on the number of packets in the system that is O((1 - r)-1), where r can be interpreted as the arrival rate of the packets into the communication network. This improves upon the work of Gamarnik, who designed an algorithm for which the number of packets in the system is O((1 - r)-2); moreover, our result matches the traditional queueing-theoretic number-in-system bound.  相似文献   

19.
LonWorks网络中的节点通讯   总被引:5,自引:0,他引:5  
本文简单介绍了LonWorks的技术特点。描绘了基于LonWorks的全分布控制网络。详细说明了LonWorks网络中的网络变量通信方式和显式报文通信方式的具体操作,最后简单讨论了这两种方式如何应用于显式寻址。  相似文献   

20.
We study communication problems in wireless networks supporting multiple interfaces. In such networks, two nodes can communicate if they are close enough and share a common interface. The activation of each interface has a cost reflecting the energy consumed when a node uses this interface. We distinguish between the homogeneous and heterogeneous case, depending on whether all nodes have the same activation cost for each interface or not. For the homogeneous case, we present a (3/2+?)-approximation algorithm for the problem of achieving connectivity with minimum activation cost, improving a previous bound of 2. For the heterogeneous case, we show that the connectivity problem is not approximable within a sublogarithmic factor in the number of nodes and present a logarithmic approximation algorithm for a more general problem that models group communication.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号