期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Optimal choice of Reed-Solomon codes to protect against queuing losses in wireless networks 被引量:1
1
作者 Claus Bauer 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第3期71-83,共13页
This article proposes algorithms to determine an optimal choice of the Reed-Solomon forward error correction (FEC) code parameters (n,k) to mitigate the effects of packet loss on multimedia traffic caused by buffe... This article proposes algorithms to determine an optimal choice of the Reed-Solomon forward error correction (FEC) code parameters (n,k) to mitigate the effects of packet loss on multimedia traffic caused by buffer overflow at a wireless base station. A network model is developed that takes into account traffic arrival rates, channel loss characteristics, the capacity of the buffer at the base station, and FEC parameters. For Poisson distributed traffic, the theory of recurrent linear equations is applied to develop a new closed form solution of low complexity of the Markov model for the buffer occupancy. For constant bit rate (CBR) traffic, an iterative procedure is developed to compute the packet loss probabilities after FEC recovery. 展开更多
关键词 FEC packet loss buffer occupancy Markov model
原文传递
SIR approach in modeling data packets forwarding at a leaky bucket
2
作者 Yaming Zhang Yaya H.Koura Yanyuan Su 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2020年第5期118-130,共13页
When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective mo... When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective monitoring by generating network of queues at given output link.Packets associated with different sessions and originated from different hosts may be mixed up and queuing delay may become longer,depending on network segment state,buffering strategy,users’behavior among other factors.It is interesting to assimilate these stages of packets traveling through network segment to the concept of epidemic control.This paper proposes a SIR(Susceptible-Infected-Recovered)approach in modeling data packets transmission at a leaky bucket at peak hour.We focused our analysis on packets buffering and recovery strategy impact on segment forwarding performance in heavy load situation.Numerical results suggested adapting buffering strategy and packets recovery to enhance transmission and network overall performance. 展开更多
关键词 Packets transmission buffer occupancy SIR model congestion control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部