共查询到20条相似文献,搜索用时 15 毫秒
1.
James Aweya Michel Ouellette Delfin Y. Montuno 《International Journal of Communication Systems》2002,15(4):287-307
It is now widely accepted that a RED [2] controlled queue certainly performs better than a drop‐tail queue. But an inherent weakness of RED is that its equilibrium queue length cannot be maintained at a preset value independent of the number of TCP active connections. In addition, RED's optimal parameter setting is largely correlated with the number of connections, the round‐trip time, the buffer space, etc. In light of these observations, we propose DRED, a novel algorithm which uses the basic ideas of feedback control to randomly discard packets with a load‐dependent probability when a buffer in a router gets congested. Over a wide range of load levels, DRED is able to stabilize a router queue occupancy at a level independent of the number of active TCP connections. The benefits of stabilized queues in a network are high resources utilization, predictable maximum delays, more certain buffer provisioning, and traffic‐load‐independent network performance in terms of traffic intensity and number of connections. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
2.
针对混合网络中并行链路间TCP流的不公平性,提出一种新的算法.此算法利用跨层设计的思想,以传输层的数据重传率为参数来调整TCP流不公平性,也就是说MAC层上的竞争窗口将根据重传率的动态变化而改变,其目的在于抑制并行链路TCP流接入信道能力的不公平性.并且用仿真工具NS2进行仿真的结果表明,采用改进算法后的网络公平性指数比未改进前提高了17.9%.该算法能明显改善并行链路间TCP流的不公平性. 相似文献
3.
4.
Floyd提出的随机早丢弃(RED,random carly detection)是基于传统的泊松(Possion)模型,不适应网络流量普遍呈现自相似性的特点。基于此目的,提出了一种新的RED算法——Hurst加权随机早检测算法(HWRED,Hurst weighted random early detection)。新算法能够根据输入流量的自相似系数Hurst,调整RED算法参数。仿真结果表明,新算法提高了队列长度的稳定性,减少了丢包率、排队时延和排队抖动,提高了网络的链路利用率。 相似文献
5.
Hamed M. K. Alazemi Mohamed F. Hassan Mohamed Zribi 《Wireless Communications and Mobile Computing》2009,9(10):1430-1441
The stabilizing random early detection (RED) congestion control algorithm in transmission control protocol (TCP)/IP networks is a control theory problem. Significant attention has been drawn to this problem in the networking and control theory research communities. In this paper, we use a nonlinear dynamic model of the TCP RED congestion control algorithm to analyze and design active queue management (AQM) control systems. A linearized model of RED behavior around its nominal operating point which implicitly includes the delay in the control signal is derived. It is assumed that the system model is corrupted at the input and output by zero mean white Gaussian noise signals. An optimal state feedback stochastic controller is designed for the linearized model of the system in conjunction with a Kalman filter for state estimation. To illustrate the proposed design methodology, simulations results are presented and discussed. The proposed stochastic controller is applied to the nonlinear model of the system; Simulation results indicate that the proposed controller keeps the queue length bounded in an appropriate stochastic sense. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
6.
A new scheduling algorithm based on self-clocked fair queueing is proposed. The algorithm employs an array of sorting bins for managing the virtual finishing time of connections and uses token buckets as a behaviour-indicator. It remedies the drawbacks of existing fair queueing algorithms and is able to reserve bandwidth to connections while guaranteeing a class-dependent and rate-independent delay for behaving connections 相似文献
7.
You-Ze Cho Myeong-Yong Lee 《Electronics letters》1997,33(14):1190-1192
A new efficient consolidation algorithm at a branch-point switch for multicast available bit rate (ABR) service is proposed. The scheme can achieve a faster response to congestion status and has a lower consolidation noise compared with existing algorithms. Particularly network environments with a large number of branch points 相似文献
8.
The performance limitation of the “leaky bucket algorithm” is analyzed for usage parameter control and traffic management in asynchronous transfer mode (ATM) networks. Simulation results show that the conventional statistical bandwidth allocation method, which uses “the worst pattern derived from the cell interarrival time moments” permitted by the leaky bucket algorithm, can not guarantee the quality of service (QOS). As a result, this paper proves that the VC/VP bandwidth allocation method based on the leaky bucket algorithm is unsatisfactory 相似文献
9.
We consider optimal encoding of video sequences for ATM networks. Two cases are investigated. In one, the video units are coded independently (e.g., motion JPEG), while in the other, the coding quality of a later picture may depend on that of an earlier picture (e.g., H.26x and MPEGx). The aggregate distortion-rate relationship for the latter case exhibits a tree structure, and its solution commands a higher degree of complexity than the former. For independent coding, we develop an algorithm which employs multiple Lagrange multipliers to find the constrained bit allocation. This algorithm is optimal up to a convex-hull approximation of the distortion-rate relations in the case of CBR (constant bit-rate) transmission. It is suboptimal in the case of VBR (variable bit-rate) transmission by the use of a suboptimal transmission rate control mechanism for simplicity. For dependent coding, the Lagrange-multiplier approach becomes rather unwieldy, and a constrained tree search method is used. The solution is optimal for both CBR and VBR transmission if the full constrained tree is searched. Simulation results are presented which confirm the superiority in coding quality of the encoding algorithms. We also compare the coded video quality and other characteristics of VBR and CBR transmission 相似文献
10.
11.
Kalyanaraman S. Jain R. Fahmy S. Goyal R. Vandalore B. 《Networking, IEEE/ACM Transactions on》2000,8(1):87-98
This paper describes the “explicit rate indication for congestion avoidance” (ERICA) scheme for rate-based feedback from asynchronous transfer mode (ATM) switches. In ERICA, the switches monitor their load on each link and determine a load factor, the available capacity, and the number of currently active virtual channels. This information is used to advise the sources about the rates at which they should transmit. The algorithm is designed to achieve high link utilization with low delays and fast transient response. It is also fair and robust to measurement errors caused by the variations in ABR demand and capacity. We present performance analysis of the scheme using both analytical arguments and simulation results. The scheme is being considered for implementation by several ATM switch manufacturers 相似文献
12.
Won-Tae Kim Yong-Jin Park 《IEEE network》2000,14(5):26-31
A Mobile IP multicast prototype that integrates a label-switching wireless asynchronous transfer mode, the mobile core-based multicast architecture, and an Internet multicast infrastructure is presented. MCOM creates multiple core-based layer 2 multicast trees that are independently established in member networks. They are interconnected via the Internet using layer 3 multicast routing. Gateways on the border of the Internet and wireless ATM networks convert ATM multicast traffic to suitable IP packets as well as converting from IP packets to ATM cells for MCOM. To solve the cell interleaving problem that results, ATM block transfer/immediate transmission capability is reasonably modified. Additionally, class-based block buffer management for ATM multicast connections is built into wireless ATM switches for soft quality of service control. Dynamic group management, multicast channel rerouting, and reliable multicasting are also studied in relation to existing Internet protocols like Mobile IP, Internet group management protocols, and multicast routing protocols 相似文献
13.
The long-term virtual path (VP) bandwidth allocation process requires the use of heuristics or artificial intelligence to find the number of virtual circuits that can multiplex by each VP to maximise the quality of service, which is defined here in terms of the call blocking probabilities. The authors propose a new technique, based on simulated annealing, for performing the allocation process. It substantially improves upon previous proposals 相似文献
14.
15.
针对传统码本算法模型建立时间过长、更新效果 差等问题,将视觉背景提取(ViBe)算法中模型建 立和更新的 思想用于改进码本算法,提出了一种基于随机码本(RCB)的运动目标检测算法。为减少计算 量,提出了一种基于 YUV空间的码本模型;为减少背景建模时间、提高模型的洁净度 ,提出了随机选取第1帧图像空间领域内 像素点的码本训练方法;为提高背景模型对复杂场景的适应能力,提出了基于随机策略的码 本更新方式。 与典型算法进行了两组实验。结果表明,本文算法兼有二者的优点,不仅能迅速适应场 景的转换,而 且在检测精度、动态适应能力和实时性等方面都有较大提高。 相似文献
16.
TCP Veno: TCP enhancement for transmission over wireless access networks 总被引:18,自引:0,他引:18
Wireless access networks in the form of wireless local area networks, home networks, and cellular networks are becoming an integral part of the Internet. Unlike wired networks, random packet loss due to bit errors is not negligible in wireless networks, and this causes significant performance degradation of transmission control protocol (TCP). We propose and study a novel end-to-end congestion control mechanism called TCP Veno that is simple and effective for dealing with random packet loss. A key ingredient of Veno is that it monitors the network congestion level and uses that information to decide whether packet losses are likely to be due to congestion or random bit errors. Specifically: (1) it refines the multiplicative decrease algorithm of TCP Reno-the most widely deployed TCP version in practice-by adjusting the slow-start threshold according to the perceived network congestion level rather than a fixed drop factor and (2) it refines the linear increase algorithm so that the connection can stay longer in an operating region in which the network bandwidth is fully utilized. Based on extensive network testbed experiments and live Internet measurements, we show that Veno can achieve significant throughput improvements without adversely affecting other concurrent TCP connections, including other concurrent Reno connections. In typical wireless access networks with 1% random packet loss rate, throughput improvement of up to 80% can be demonstrated. A salient feature of Veno is that it modifies only the sender-side protocol of Reno without changing the receiver-side protocol stack. 相似文献
17.
拥塞控制中的随机检测算法研究 总被引:1,自引:0,他引:1
作为主动队列管理(AQM)的典型代表,RED(Random Early Detection)算法得到了较为广泛的应用。出于改进其稳定性和公平性的考虑,研究者开发出了ARED,SRED,FRED,RIO和WRED等几种算法。重点研究了RED及其多种变种方法的设计思想、算法,并比较了它们的优缺点。在此基础上,分析了IP复接器中适用的算法。 相似文献
18.
Beomjoon Kim Dongmin Kim Jaiyong Lee 《Communications Letters, IEEE》2004,8(9):600-602
There have been a lot of works to avoid retransmission timeout (RTO) of transmission control protocol (TCP) that takes place in an unnecessary situation. However, most current TCP implementations, even if selective acknowledgment (SACK) option is used, do not have a mechanism to detect a lost retransmission and avoid subsequent RTO. In this letter, we propose a simple modification that enables a TCP sender using SACK option to detect a lost retransmission, which is called TCP SACK+ in simple. We use a stochastic model to evaluate the performance of TCP SACK+. Numerical results evaluated by simulations show that TCP SACK+ improves the loss recovery of TCP SACK significantly in presence of random losses. 相似文献
19.
Cell level analysis of ATM networks by means of simulation requires an accurate model for traffic sources. We present a simple model for TCP over ATM traffic sources in an ATM LAN, which captures the fundamental characteristics of the behaviour of tcp in this environment. The model was developed by extensive statistical analysis of numerous traffic traces recorded in an atm testbed. Simulated traffic generated by our model has roughly the same properties as observed in real traffic, even on the time scale of milliseconds. This makes it suitable for use by the analysis of various scheduling and congestion management algorithms. 相似文献
20.
Ajmone Marsan M. de Souza e Silva E. Lo Cigno R. Meo M. 《Telecommunication Systems》1999,12(4):341-368
This paper focuses on the development of an approximate Markov chain model and a detailed simulation model for the performance analysis of TCP connections supporting long file transfers within highspeed ATM networks. The Markov model construction is first illustrated, emphasizing the simplifying assumptions introduced to maintain an acceptable complexity in the performance study. Then the model validation is described, comparing the analytical results with those produced by a very detailed simulation setup in which the officially distributed BSD 4.3 TCPreno code was adapted to run on top of a software tool for the simulation of ATM networks. Numerical results indicate that the analytical model is able to capture the overall behavior of the system with respect to the performance measures we consider, with a cost which is orders of magnitude less than the one necessary to obtain reliable estimates from the detailed simulation model. 相似文献