This article proposes algorithms to determine an optimal choice of the Reed-Solomon forward error correction (FEC) code parameters (n,k) to mitigate the effects of packet loss on multimedia traffic caused by buffe...This article proposes algorithms to determine an optimal choice of the Reed-Solomon forward error correction (FEC) code parameters (n,k) to mitigate the effects of packet loss on multimedia traffic caused by buffer overflow at a wireless base station. A network model is developed that takes into account traffic arrival rates, channel loss characteristics, the capacity of the buffer at the base station, and FEC parameters. For Poisson distributed traffic, the theory of recurrent linear equations is applied to develop a new closed form solution of low complexity of the Markov model for the buffer occupancy. For constant bit rate (CBR) traffic, an iterative procedure is developed to compute the packet loss probabilities after FEC recovery.展开更多
When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective mo...When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective monitoring by generating network of queues at given output link.Packets associated with different sessions and originated from different hosts may be mixed up and queuing delay may become longer,depending on network segment state,buffering strategy,users’behavior among other factors.It is interesting to assimilate these stages of packets traveling through network segment to the concept of epidemic control.This paper proposes a SIR(Susceptible-Infected-Recovered)approach in modeling data packets transmission at a leaky bucket at peak hour.We focused our analysis on packets buffering and recovery strategy impact on segment forwarding performance in heavy load situation.Numerical results suggested adapting buffering strategy and packets recovery to enhance transmission and network overall performance.展开更多
文摘This article proposes algorithms to determine an optimal choice of the Reed-Solomon forward error correction (FEC) code parameters (n,k) to mitigate the effects of packet loss on multimedia traffic caused by buffer overflow at a wireless base station. A network model is developed that takes into account traffic arrival rates, channel loss characteristics, the capacity of the buffer at the base station, and FEC parameters. For Poisson distributed traffic, the theory of recurrent linear equations is applied to develop a new closed form solution of low complexity of the Markov model for the buffer occupancy. For constant bit rate (CBR) traffic, an iterative procedure is developed to compute the packet loss probabilities after FEC recovery.
基金supported by the National Social Science Foundation of China(No.18BXW118).
文摘When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective monitoring by generating network of queues at given output link.Packets associated with different sessions and originated from different hosts may be mixed up and queuing delay may become longer,depending on network segment state,buffering strategy,users’behavior among other factors.It is interesting to assimilate these stages of packets traveling through network segment to the concept of epidemic control.This paper proposes a SIR(Susceptible-Infected-Recovered)approach in modeling data packets transmission at a leaky bucket at peak hour.We focused our analysis on packets buffering and recovery strategy impact on segment forwarding performance in heavy load situation.Numerical results suggested adapting buffering strategy and packets recovery to enhance transmission and network overall performance.