首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Label-switching technology enables high performance and flexible layer-3 packet forwarding based on the fixed-length label information that is mapped to the layer-3 packet stream. A label-switching router (LSR) forwards layer-3 packets based on their layer-3 address information or their label information that is mapped to the layer-3 address information. Two label-mapping policies have been proposed. One is traffic driven mapping, where the label is mapped for a layer-3 packet stream of each host-pair according to the actual packet arrival. The other is topology driven mapping, where the label is mapped in advance for a layer-3 packet stream toward the same destination network, regardless of actual packet arrival to the LSR. This paper evaluates the required number of labels under each of these two label-mapping policies using real backbone traffic traces. The evaluation shows that both label-mapping policies require a large number of labels. In order to reduce the required number of labels, we propose a label-mapping policy that is a combination of the two label-mapping policies above. This is traffic-driven label mapping for the packet stream toward the same destination network. The evaluation shows that the proposed label-mapping policy requires only about one-tenth as many labels as the traffic-driven label mapping for the host-pair packet stream and the topology-driven label mapping for the destination-network packet stream  相似文献   

2.
Efficient QoS support in a slotted multihop WDM metro ring   总被引:1,自引:0,他引:1  
A novel distributed access protocol for a slotted wavelength-division-multiplexing (WDM) metro ring employing all-optical packet switching and supporting quality-of-service (QoS) classes is presented and analyzed. Since we assume that there are more nodes than available wavelengths in the network, we obtain a scalable multihop WDM ring as underlying network architecture. By dividing each channel into several time slots and further applying destination release and slot reuse, data packets can be efficiently transmitted and received in a statistically multiplexed manner. In our architecture, each node is equipped with one tunable transmitter and one fixed-tuned receiver. Furthermore, as we generally consider so-called a posteriori access strategies, different packet selection schemes are proposed and compared. An analytical model based on the semi-Markov process methodology is developed to quantify the performance of one of these schemes. As a key element of the protocol, an efficient QoS support access mechanism is proposed and its performance is evaluated. The new QoS control scheme adopts a frame-based slot reservation strategy including connection setup and termination, which only slightly increases the signaling and node processing overhead. Thus, an efficient hybrid protocol combining connectionless and connection-oriented packet transmissions is proposed  相似文献   

3.
In this paper, we investigate the problem of optimal reliable relay selection in multiuser cooperative wireless networks in the presence of malicious relay nodes. A general discrete time queueing model for such networks is introduced which takes into account the dynamic variations of the channel state, the dynamic malicious behaviour of relay nodes as well as stochastic arrival of data packets into the system. The model consists of a set of mobile users, one destination node and a set of relay nodes which may be either mobile or fixed. The system uses the benefit of cooperative diversity by relaying in the decode and forward mode. We assume that each user either transmits its packets directly to the destination (direct mode) or transmits them with the cooperation of a selected relay node (cooperative mode). It is assumed that a centralized network controller manages the relay selection process in the system. At each time slot, a malicious relay node in the system may behave spitefully and refuse to cooperate with a user deliberately when it is selected to cooperate with that user. A malicious relay node usually acts stochastically to hide its malicious behaviour for longer time. In such a system, at each time slot the network controller should decide whether a user has to cooperate with any relay node or not and if so, which relay node must be selected for cooperation. First, we show that the malicious behaviour of relay nodes makes the stable throughput region shrink. Then, we propose a throughput optimal secure relay selection policy that can stabilize the system for all the arrival rate vectors strictly inside the network stability region. We show that the optimal policy is equivalent to finding the maximum weighted matching in a weighted bipartite graph at each time slot. Finally, we use simulations to compare the performance of the proposed policy with that of four other sub-optimal policies in terms of average queue occupancy (or queueing delay).  相似文献   

4.
We present a novel queuing analytical framework for the performance evaluation of a distributed and energy-aware medium access control (MAC) protocol for wireless packet data networks with service differentiation. Specifically, we consider a node (both buffer-limited and energy-limited) in the network with two different types of traffic, namely, high-priority and low-priority traffic, and model the node as a MAP (Markovian arrival process)/PH (phase-type)/1/K nonpreemptive priority queue. The MAC layer in the node is modeled as a server and a vacation queuing model is used to model the sleep and wakeup mechanism of the server. We study standard exhaustive and number-limited exhaustive vacation models both in multiple vacation case. A setup time for the head-of-line packet in the queue is considered, which abstracts the contention and the back-off mechanism of the MAC protocol in the node. A nonideal wireless channel model is also considered, which enables us to investigate the effects of packet transmission errors on the performance behavior of the system. After obtaining the stationary distribution of the system using the matrix-geometric method, we study the performance indices, such as packet dropping probability, access delay, and queue length distribution, for high-priority packets as well as the energy saving factor at the node. Taking into account the bursty traffic arrival (modeled as MAP) and, therefore, the nonsaturation case for the queuing analysis of the MAC protocol, using phase-type distribution for both the service and the vacation processes, and combining the priority queuing model with the vacation queuing model make the analysis very general and comprehensive. Typical numerical results obtained from the analytical model are presented and validated by extensive simulations. Also, we show how the optimal MAC parameters can be obtained by using numerical optimization  相似文献   

5.
We consider a slotted system with N queues, and independent and identically distributed (i.i.d.) Bernoulli arrivals at each queue during each slot. Each queue is associated with a channel that changes between "on" and "off" states according to i.i.d. Bernoulli processes. We assume that the system has K identical transmitters ("servers"). Each server, during each slot, can transmit up to C packets from each queue associated with an "on" channel. We show that a policy that assigns the servers to the longest queues whose channel is "on" minimizes the total queue size, as well as a broad class of other performance criteria. We provide several extensions, as well as some qualitative results for the limiting case where N is very large. Finally, we consider a "fluid" model under which fractional packets can be served, and subject to a constraint that at most C packets can be served in total from all of the N queues. We show that when K=N, there is an optimal policy which serves the queues so that the resulting vector of queue lengths is "Most Balanced" (MB)  相似文献   

6.
在通信网互连中,若被连子网具有不同的最大允许分组长度,那么有信关中一个较长的分组就可能要被拆分为多个较小的分组,这就是公组再分问题,已经证明,在某些情况下。再分后的公组流可以用一个修正的开关泊松过程来,本文RSPP和RSPP/M/1排队。文中推导出了RSPP到达间隔分布的表达式,并给出了平均到达率。文中还给出了队长分布,平均等候时间的表达式;信关输出流的特性对于全网的性能分析是必需的,因此本文着重  相似文献   

7.
This paper presents performance results that indicate that packetized voice service can be provided on a token-passing ring without adversely affecting the performance of data traffic. This is accomplished by introducing a relatively mild priority structure: stations are limited to a single packet transmission per medium access, and voice packets are given access priority over data packets at the same station. In addition, voice traffic is allowed longer packet lengths than data traffic. Several versions of this basic scheme are considered: 1) the number of active stations is constrained so that voice packets are guaranteed access within one packetization period, 2) no guarantee on access time is provided and voice packets are discarded when the waiting time exceeds one packetization period, and 3) no guarantee on access time is provided and voice packets are buffered until they can be transmitted.  相似文献   

8.
该文提出了一种新的应用于IEEE 802.11e EDCA (Enhanced Distributed Channel Access)中提供QoS(Quality of Service)的方法。这种方法是将几个时隙组合起来构成一个超时隙,每个超时隙的开始分配给不同的业务来进行发包。时隙的分配是根据各种业务的不同优先级来实现的。这种方法可以保证高优先级业务具有较大的吞吐量,较少的MAC延时和较低的丢包率。与802.11e EDCA草案中提出的不同冲突窗口大小的方法相比,这种方法具有可以提高吞吐量,降低丢包率,并能减小站点数目变化对高优先级业务吞吐量的影响等优点。这种新的提供QoS的方法优于不同冲突窗口大小的方法,在IEEE 802.11e EDCA中应用超时隙方法可以大大提高EDCA的性能。  相似文献   

9.
In reservation-based multiple access protocols, before obtaining a contention-free access to the channel, a mobile terminal must wait for its request packet to be successfully sent to the base station. A pseudo-Bayesian ALOHA algorithm with multiple priorities is proposed in this paper to reduce the waiting time of delay sensitive request packets in a multimedia environment. Packets are transmitted in each slot according to a transmission probability based on the channel history and a priority parameter assigned to their respective priority class. An adaptation of the slotted protocol to the framed environment proposed for wireless ATM is also described. Simulation results are presented to show that the protocol offers a significant delay improvement for high priority packets with both Poisson and self-similar traffic while low priority packets only experience a slight performance degradation.  相似文献   

10.
传感器网络拥塞避免与控制的模糊AQM算法   总被引:2,自引:0,他引:2  
罗成  谢维信 《电子学报》2014,42(4):679-684
传感器网络节点通信能力有限,当数据到达速率持续超过节点转发能力时网络会发生拥塞;传感器网络是任务型网络,对不同优先级的信息具有不同的服务质量要求.针对传感器网络信息传输的上述特性,提出了一种新的拥塞避免与控制算法FAQM(Fuzzy Active Queue Management).该算法在综合考虑数据包的随机指数标记概率和优先级权值的基础上,建立了模糊逻辑推理系统,并以数据包丢弃因子作为参量来实现数据流的智能调控.NS2仿真实验结果表明:FAQM算法能减少高优先级数据包的丢弃率和节点间链路的时延,稳定节点队列长度,在有效避免与控制拥塞网络的同时提升网络整体QoS(Quality of Service)性能.  相似文献   

11.
In a multihop network, packets go through a number of hops before they are absorbed at their destinations. In routing to its destination using minimum path, a packet at a node may have a preferential output link (the so-called “care” packet) or may not (the so-called “don't care” packet). Since each node in an optical multihop network may have limited buffer, when such buffer runs out, contention among packets for the same output link can be resolved by deflection. In this paper, we study packet scheduling algorithms and their performance in a buffered regular network with deflection routing. Using shufflenet as an example, we show that high performance (in terms of throughput and delay) can he achieved if “care” packets can be scheduled with higher priority than “don't care” packets. We then analyze the performance of a shufflenet with this priority scheduling given the buffer size per node. Traditionally, the deflection probability of a packet at a node is solved from a transcendental equation by numerical methods which quickly becomes very cumbersome when the buffer size is greater than one packet per node. By exploiting the special topological properties of the shufflenet, we are able to simplify the analysis greatly and obtain a simple closed-form approximation of the deflection probability. The expression allows us to extract analytically the performance trend of the shufflenet with respect to its buffer and network sizes. We show that a shufflenet indeed performs very well with only one buffer, and can achieve performance close to the store-and-forward case using a buffer size as small as four packets per node  相似文献   

12.
Routing strategies for maximizing throughput in LEO satellite networks   总被引:1,自引:0,他引:1  
This paper develops routing and scheduling algorithms for packet transmission in a low Earth orbit satellite network with a limited number of transmitters and buffer space. We consider a packet switching satellite network, where time is slotted and the transmission time of each packet is fixed and equal to one time slot. Packets arrive at each satellite independently with a some probability during each time slot; their destination satellite is uniformly distributed. With a limited number of transmitters and buffer space on-board each satellite, contention for transmission inevitably occurs as multiple packets arrive at a satellite. First, we establish the stability region of the system in terms of the maximum admissible packet arrival rate that can possibly be supported. We then consider three transmission scheduling schemes for resolving these contentions: random packet win, where the winning packet is chosen at random; oldest packet win, where the packet that has traveled the longest distance wins the contention; and shortest hops win (SHW), where the packet closest to its destination wins the contention. We evaluate the performance of each of the schemes in terms of throughput. For a system without a buffer, the SHW scheme attains the highest throughput. However, when even limited buffer space is available, all three schemes achieve about the same throughput performance. Moreover, even with a buffer size of just a few packets the achieved throughput is close to that of the infinite buffer case.  相似文献   

13.
This paper shows how to optimize the routing decisions in a nondeterministic routing algorithm called convergence routing in which routes may change depending on the traffic conditions. The routing algorithm guarantees a loss-free delivery of data packets from bursty sources, and a deterministic bound on the route length in arbitrary topology networks. The routing decisions are based on assigning routing priorities to the links such that a packet is forwarded to the highest priority link which is not blocked. Routing priorities are assigned using a local-greedy metric which minimizes the distance (number of hops) to the destination. This work shows that routing decisions using a local-greedy metric are not optimal, and the performance of the algorithm can be improved substantially by using new measures. Thus, various look-ahead metrics which take into account the potential gain on the other switching nodes toward the destination of a packet are suggested. The contributions of this work are: (1) a new analytical model to capture the behavior of a switching node; (2) an iterative optimization technique to set routing priorities according to various look-ahead measures; and (3) heuristics to ensure the stability of the routing priorities. The optimization objective is to maximize the throughput by minimizing the maximum total flow carried on a link in the network under static traffic model. The performance is studied computationally on various networks and traffic matrices. It is shown that up to a 50% performance increase can be obtained by optimizing the routing priorities  相似文献   

14.
Among the various issues lying in optical burst switching (OBS) networks, burstification, i.e., assembling multiple IP packets into bursts, is an important one. Between the two important aspects related to burst assembly, the burst assembly algorithm aspect has been extensively studied in the literature. However, as far as we know, there is no research about the burstification queue management (BQM) aspect, which refers to how many burstification queues (BQ) we should set at each OBS edge node and how to manage these BQs. Suppose there are G destinations (egress edge nodes) and the OBS network provides S different quality of service (QoS) classes. Traditionally, it is simply regarded that each ingress edge node needs G· S queues to sort incoming packets, one for each possible destination and QoS class. For simplicity, we call this policy the static dedicate BQM (SDB) policy. The SDB policy, though simple, lacks scalability since we have to add S BQs at each OBS edge node if an extra OBS edge node is added to the OBS network. To solve this problem, we propose in this paper two BQM policies: quasi-static BQM (QSB) policy and dynamic BQM (DB) policy. For the QSB policy, we derive the packet loss probability due to lacking BQs based on a Markov chain, from which we can work out the employed number of BQs for a given packet loss probability. Based on these results, the scalability of the QSB policy is also studied. With the DB policy, we not only can dynamically assign BQs for incoming packets, but also can dynamically allocate buffer capacity for each BQ by using a least-mean-square (LMS)-based linear prediction filter. The performance of the DB policy is investigated by analysis and extensive simulations. We also compared the performance of the QSB policy and the DB policy. Results from analysis and simulation demonstrate that the DB policy is the best.  相似文献   

15.
由于无线网络环境下网络节点的增加,网络延时成为一个亟待解决的问题。为了提高服务质量(QoS),提高吞吐量,文中提出了一种基于优先级的队列延迟模型,通过将每一个包预设置优先级来区分其重要性和实时性,同时将每一个AP设备中的队列根据优先级划分为3种类型,并将预设优先级的包放入其中进行传输,从而有效减少发送端的队列延迟。通过分析和仿真可以发现,与未划分优先级队列的节点网络相比,这种方案不仅使单个节点的延迟大幅减少,也使整个网络的平均延迟明显降低,网络整体性能显著提高。  相似文献   

16.
The information-theoretic capacity of discrete-time queues   总被引:1,自引:0,他引:1  
The information-theoretic capacity of continuous-time queues was analyzed recently by Anantharam and Verdu (see ibid. vol.42, p.4-18, 1996). Along similar lines, we analyze the information-theoretic capacity of two models of discrete-time queues. The first model has single packet arrivals and departures in a time slot and independent packet service times, and is the discrete-time analog of the continuous-time model analyzed by Anantharam and Verdu. We show that in this model, the geometric service time distribution plays a role analogous to that of the exponential distribution in continuous-time queues, in that, among all queues in this model with a given mean service time, the queue with geometric service time distribution has the least capacity. The second model allows multiple arrivals in each slot, and the queue is modeled as serving an independent random number of packets in each slot. We obtain upper and lower bounds on the capacity of queues with an arbitrary service distribution within this model, and show that the bounds coincide in the case of the queue that serves a geometrically distributed number of packets in each slot. We also discuss the extremal nature of the geometric service distribution within this model  相似文献   

17.
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.  相似文献   

18.
This letter suggests a modified priority scheduling policy for the asynchronous transfer mode (ATM) multiplexer, which is called DQLT. In the dual queue length threshold (DQLT) method, there exist two queues: (1) Q1 is for nonreal-time traffic and (2) Q2 is for real-time traffic and each queue has its own threshold to adaptively control the buffer congestion. If Q1 is congested over the threshold T1 one cell at the head of Q1 moves into Q2 in a slot time. It is shown that the DQLT method gives intermediate performance between those of minimum laxity threshold (MLT) and queue length threshold (QLT) policy, but its control method is quite simpler  相似文献   

19.
Integrated voice/data multiplexers that provide packet services for both voice and data traffic are discussed. A slotted service is assumed, so that packet transmissions are synchronized to slot boundaries. Nongated service, in which packets are transmitted as soon as the transmission capacity becomes available, is also assumed. The performance of nongated and slotted multiplexers is obtained by analytic and simulation approaches. In particular, a PRIO (head-of-the-line priority to voice packets) and a BVFD (busy-voice, fixed-data) multiplexer are shown to be suitable for such a nongated environment  相似文献   

20.
Self-similarity characteristic of network traffic will lead to the continuous burstness of data in the network.In order to effectively reduce the queue delay and packet loss rate caused by network traffic burst,improve the transmission capacity of different priority services,and guarantee the service quality requirements,a queue scheduling algorithm P-DWRR based on the self-similarity of network traffic was proposed.A dynamic weight allocation method and a service quantum update method based on the self-similar traffic level grading prediction results were designed,and the service order of the queue according was determined to the service priority and queue waiting time,so as to reduce the queuing delay and packet loss rate.The simulation results show that the P-DWRR algorithm can reduce the queueing delay,delay jitter and packet loss rate on the basis of satisfying the different service priority requirements of the network,and its performance is better than that of DWRR and VDWRR.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号