The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents, through simulation experiments, a performance study of both IEEE 802.11n aggregation methods: A-MPDU (Aggregated MAC Protocol Data Unit) and A-MSDU (Aggregated MAC Service Data Unit), considering scenarios of video streaming. The objectives of this article are: (i) investigate the quality of service achieved, (ii) show which of the two methods of aggregation (A-MPDU or A-MSDU)...
In this paper we assess the interference caused by external (uncontrolled) traffic sources upon real-time flows in IEEE 802.11-based mesh networks. Through a set of simulations, we assess the impact of external traffic sources by analyzing the end-to-end delay, frame loss ratio and deadline miss ratio as performance metrics for a set of real-time flows. We infer the maximum interfering traffic load...
The main goal of the next generation Internet is to support a wide variety of applications with different Quality-of-Service (QoS) requirements. A multi-service network can be achieved by priority scheduling. When connections setup, packet delay for each priority queue is an important issue for route selection. This paper focuses on the head-of-line (HOL) priority queueing system and provides a simple...
We present sensing mechanisms that can be used for implicit high-load and overload detection in SIP networks. By means of measurements and simulations we highlight the characteristics of SIP proxy servers for different load situations and using different transport protocols. Each protocol yields to distinctive patterns that encourage deriving an algorithm that is able to estimate a downstream server's...
This paper deals with a support tool for an automation of simulation of Coloured Petri nets and selected simulation experiments conducted with the aid of the tool. The tool is called CPN Assistant, it has been developed at the home institution of the authors and cooperates with the CPN Tools software. It allows to run and manage multiple customized simulations in a network environment. The experiments...
This paper described a digitally controlled Buck converter. In this converter, the compensator implements the classic linear PID control law by the fixed-point algorithm. A proposed verification method is performed in Simulink environment. The structure of low area and power cost Ring ADC and high resolution DPWM is also introduced, respectively. The consistent mathematic and Spice simulation result...
Heavy truck and bus manufactures in automotive applications extensively use the SAE J1939 protocol definition. In this paper, the SAE J1939 protocol base on CAN bus was discussed. The real-time parameter is a key point of protocol's performance evaluation. The most important thing is to give an effective and reasonable method to simulation. Based on the analysis of the Data Link layer of CAN bus protocol,...
Wireless technology based on the IEEE 802.11 standard is used to support multiple types of communication services (data, voice, and image) with different QoS requirements. Node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or...
Search algorithms have been a widely studied topic in the context of Peer-to-Peer (P2P) networks. Generally speaking, unstructured P2P networks, such as Gnutella, are used for performing arbitrary searches (i.e., the form of a search request is not restricted) and structured networks, such as the ones based on Distributed Hash Table algorithms, are used for performing exact searches (i.e., the form...
The real part of gap impedance reflect the bandwidth of the coupled output cavities. Group delay time also have some relation with the bandwidth. In the simulation, group delay time can be taken as a basic reference, then field analysis method was used to calculate the real part of total gap impedance, thus plenty of time can be saved. We also test the group delay time characteristic using the vector...
In this paper we evaluate performance of three different site allocation policies in a 2-level computational grid with heterogeneous sites. We consider that schedulers are aware of service demands of jobs which show high variability. A simulation model is used to evaluate performance in terms of the average response time and slowdown, under medium and high load. Simulation results show that the proposed...
The discrete-event simulation of entity flows and generalized statistical interpretation of simulation results causes an idea of a mesoscopic simulation. The paper deals with the discrete-event and mesoscopic simulation models of the wagon flow processing. The system under consideration is a railway transport junction. Some basic features of implementation of mesoscopic modelling components are considered...
As the high redundancy of network equipments and paths, connection reliability is no longer the most important parameter for networks. According to network function, this paper advances transmission time reliability as a common parameter to describe network congestion. It is defined to be the probability that networks will transmit material, energy or information timely when used under specified operating...
This paper proposes a new destination initiated (i.e., backward) reservation protocol for lightpath establishment in wavelength division multiplexed (WDM) optical networks. This protocol, named Intelligent Backward Reservation Protocol (iBRP), initially attempts a quick forward reservation using a definite wavelength selected intelligently, failing which it becomes standard BRP. If the initial direct...
In LTE, the control signaling required for scheduling and HARQ on the MAC layer is partly protected by cyclic redundancy checks (CRC) but no ARQ, or other error recovery mechanisms, are used. Therefore, errors occur with a certain probability and may or may not be detected. Errors in HARQ feedback and scheduling grants could cause underutilization of resources, longer delays, redundant retransmissions,...
The Stream Control Transmission Protocol (SCTP) is a new transport layer protocol. Multihoming is one of the most important features in SCTP, which can be used by the data sender to send data to a receiver through different paths. Although SCTP provides support for multihoming, the basic reason for such a provision was to improve reliability of associations. Currently, simultaneous transfer of new...
This paper designs a PCE-based architecture of routing, and proposes two distributed signaling schemes in PCE-based wavelength switching optical network (WSON). Simulation results based on the topology of Chinese core network are given and analyzed.
Large swings in the demand for content are commonplace within the Internet. Although multistage interconnection networks (MINs) are fairly flexible in handling varieties of traffic loads, their performance considerably degrades by hotspot traffic, especially at increasing size networks. As alleviation to the tree saturation problem, the prioritizing of packets is proposed leading to a scheme that...
The paper introduces wireless sensor network's route protocol, then the difference between traditional wireless network and wireless sensor network is analyzed, and the MSAODV route protocol based on AODV route protocol are raised and implemented, the simulation soft tool NS-2 is used, and end-to-end delay and the normalized routing load are chosen to evaluate the performance of the MSAODV. The modified...
In this paper, the linear and nonlinear models are put forward first to describe load balancing system for parallel cluster computing. Through analyzing the stability of linear model, this paper finds the asymptotic stable condition of load balancing system with some assumptions, and the simulation results are given to compare the results in theory later. Based on the analyzing and simulation results,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.