首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   0篇
无线电   29篇
自动化技术   2篇
  2009年   1篇
  2003年   2篇
  2001年   1篇
  1997年   1篇
  1996年   3篇
  1995年   1篇
  1994年   2篇
  1991年   1篇
  1990年   1篇
  1989年   3篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   3篇
  1981年   1篇
  1980年   3篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
排序方式: 共有31条查询结果,搜索用时 31 毫秒
1.
This paper studies the use of multicast together with proxy nodes for reliably disseminating data from a single source to a large number of receivers. In order to achieve reliability, data must be retransmitted in case of loss either by the source or by special network nodes, called proxies. Each proxy is responsible for reliably delivering the data to a subgroup it is assigned. The multicast tree is partitioned into subgroups that form a hierarchy rooted at the source, hence the term hierarchical reliable multicast. The performance of this approach strongly depends on the topology and the loss characteristics of the underlying tree and the location of proxies. In the first part of the paper, we study the processing and bandwidth performance of such a reliable multicast dissemination given the tree and the placement of proxies. In the second part of the paper, we develop dynamic programming algorithms that give a placement of a fixed number of proxies on an arbitrary tree that minimizes the bandwidth used for reliable transfer. The first algorithm provides an optimal solution to the multicast proxies location problem in polynomial time, in the number of nodes and proxies. The second is an approximation algorithm that gives a solution with cost within a chosen precision from the optimal, in an improved running time. An optimal and an approximate solution are also provided for the proxies location problem if unicast is used for transmissions. Applications of this dynamic programming approach to related problems are discussed.  相似文献   
2.
The performance of 10Base-T and 100Base-T Ethernet segments carrying audio/video traffic is presented. End-to-end delay requirements suitable for a wide range of multimedia applications are considered (ranging from 20-500 ms). Given the specific nature of the network considered and the maximum latency requirement, some data is lost. Data loss at the receiver causes quality degradations in the displayed video in the form of discontinuities, referred to as glitches. We define various quantities characterizing the glitches, namely, the total amount of information lost in glitches, their duration, and the rate at which glitches occur. We study these quantities for various network and traffic scenarios, using a computer simulation model driven by real video traffic generated by encoding video sequences. We also determine the maximum number of video streams that can be supported for given maximum delay requirement and glitch rate. We consider various types of video contents (video conferencing, motion pictures, commercials), two encoding schemes (H.261 and MPEG-1), and two encoder control schemes [constant bit rate (CBR) and constant-quality variable bit rate (CQ-VBR)] and compare their results. Furthermore, we consider scenarios with mixtures of video and data traffic (with various degrees of burstiness), and determine the effect of one traffic type over the other  相似文献   
3.
We continue in this paper our study of two-hop centralized packet radio networks in view of understanding the behavior of these systems. Traffic originates at terminals, is destined to a central station, and requires for its transport the relaying of packets by store-and-forward repeaters. We consider here that all devices employ the nonpersistent carrier sense multiple-access mode. System capacity and through-put-delay tradeoffs are derived and compared to those obtained for slotted ALOHA in Part I [l].  相似文献   
4.
The need for multiaccess protocols arises whenever a resource is shared by many independent contending users. Two major factors contribute to such a situation: the need to share expensive resources in order to achieve their efficient utilization, or the need to provide a high degree of connectivity for communication among independent subscribers (or both). In data transmission systems, the communication bandwidth is often the prime resource, and it is with respect to this resource that we view multiaccess protocols here. We give in this paper a unified presentation of the various multiaccess techniques which we group into five categories: 1) fixed assignment techniques, 2) random access techniques, 3) centrally controlled demand assignment techniques, 4) demand assignment techniques with distributed control, and 5) mixed strategies. We discuss their applicability to different enivironments, namely, satellite channels, local area communication networks and multihop store-and-forward broadcast networks, and their applicability to different types of data traffic, namely stream traffic and bursty traffic. We also present the performance of many of the multiaccess protocols in terms of bandwidth utilization and message delay.  相似文献   
5.
Local area communication networks based on packet broadcasting techniques provide simple architectures and flexible and efficient operation. Unidirectional broadcast systems use a unidirectional transmission medium which, due to their physical ordering on the medium, users can access according to some efficient distributed conflict-free round-robin algorithm. Two systems of this type have been presented in the literature: Expressnet and Fasnet. In this paper we briefly describe these two. We identify three different service disciplines achievable by these systems and discuss and compare the performance of each. These systems overcome some of the performance limitations of existing random-access schemes, making them particularly well suited to the high bandwidth requirements Of an integrated services digital local network.  相似文献   
6.
Packet radio and satellite networks   总被引:1,自引:0,他引:1  
  相似文献   
7.
The design of packet radio systems involves a large number of design variables that interact in a very complex fashion. As this design problem in its general form is quite complex, a viable approach is to analyze some simple but typical configurations in an attempt to understand the behavior of these systems. In this paper, a two-hop centralized configuration is considered in which traffic originates at terminals, is destined to a central station, and requires for its transport the relaying of packets by store-and-forward repeaters. The through-put-delay performance is derived, and its dependence on such key system variables as the network topology, the transmission protocol, and the repeaters' storage capacities, is given. In this part, devices are assumed to be utilizing the slotted ALOHA access mode. Carrier sense multiple access is treated in Part II of this series [1].  相似文献   
8.
In two companion papers a method for multiplexing a population of terminals communicating with a central station over a packet-switched radio channel was introduced; this method is known as Carrier Sense Multiple Access (CSMA). CSMA, as with ALOHA multiaccess broadcast channels, has the unfortunate property that the throughput falls to zero as the channel load increases beyond a critical value. The dynamic behavior and stability of slotted ALOHA channels have been studied extensively and have led to a definition of stability. In this paper, similar techniques are used to analyze CSMA, which is shown to have a behavior not unlike that of ALOHA. However, contrary to ALOHA channels where steady-state performance is badly degraded when true stability is to be guaranteed, hence requiring dynamic control, we find that CSMA provides excellent stable performance even with as large a population as 1000 terminals. Furthermore, we study a simple adaptive retransmission control procedure which provides a significantly improved channel performance which is insensitive to the population size.  相似文献   
9.
In this paper, we propose a combined voice/data protocol suitable for multiple access broadcast networks that provide round robin service to the stations. Such networks are well suited to the integration of voice and data since they guarantee bounded delay and provide high utilization even for high bandwidth channels. Using one such network proposal-namely Expressnet-as a representative scheme, we examine the characteristics of the service that voice traffic experiences under the voice/data protocol. We show that the access protocol is able to utilize the channel efficiently to support a large population of voice sources while maintaining low packet delay and guaranteeing some prespecified minimum bandwidth for data traffic. In addition, we show the advantages of silence suppression, i.e., discarding speech that constitutes silent periods, and we examine the cost of overloading the network in terms of the amount of speech discarded.  相似文献   
10.
An analysis is presented of the throughput performance of some recently proposed token-passing local area network (LAN) protocols under a heavy load assumption. The IEEE 802.4 token bus standard which uses a cycle-dependent timing mechanism to control station access to the channel, is studied. It is shown that the cycle-dependent timing mechanism limits the token circulation times properly. Moreover, priority among different access classes is being implemented. Analytic results for computations of throughputs and cycle lengths are derived. These results provide insights into the cycle-dependent timing mechanism and also guidelines for design. Using the results derived, examples concerning the throughput behavior under different heavy load configurations, the sensitivity to parameters, system optimization with delay and bandwidth constraints, and comparison with the other integrated access schemes are studied  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号