The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Results of investigation of impact factors to queue utilization dynamics on telecommunication network routers were presented. As was shown by the analysis, use of dynamic model, obtained by applying a Pointwise Stationary Fluid Flow Approximation (PSFFA), demonstrated that the average queue length converges to a steady state value for some time, which can range from few to tens of seconds. It is determined...
A pipeline of processors can increase the throughput of streaming applications significantly. Communication between processors in such a system can occur via FIFOs, shared memory or both. The use of a cache for the shared memory can improve performance. To see the effect of differing cache configurations (size, line size and associativity) on performance, typical full system simulations for each differing...
In this paper, we propose an analytic model that takes as inputs a) a parametric microarchitecture-independent characterization of the target workload, and b) a hardware configuration of the core and the memory hierarchy, and returns as output an estimation of processor-core performance. To validate our technique, we compare our performance estimates with measurements on an Intel® Xeon® system. The...
Many scientific fields generate, and require manipulation of big data. Known scientific data analysis systems, as well as traditional DBMSs, follow a pull-based architectural design, where the executed queries mandate the data needed. This design, while suitable for traditional transaction-based workloads where number of queries retrieve small parts of data located at various places of the database,...
The Ribosome Flow Model~(RFM) describes the unidirectional movement of interacting particles along a one-dimensional chain of sites. As a site becomes fuller, the effective entry rate into this site decreases. The~RFM has been used to model and analyze mRNA translation, a biological process in which ribosomes (the particles) move along the mRNA molecule (the chain), and decode the genetic information...
We propose a light-weight performance analysis of Wi-Fi offload using a simple Markov model. Although the proposed model does not describe the behavior of the contention window of each station in detail, it allows us to analyze the non-saturation throughput while considering interaction among interfering stations and the queueing behavior of each station. In addition to this, the proposed model does...
Because of the importance of underwater acoustic network MAC layer protocol, feasibility and simulation analysis of underwater acoustic network MAC layer protocol attack were carried out in this article. The principle of underwater acoustic network MAC layer protocol attack was introduced, simulation analysis of performance of attacking methods, including modification of back off time and NAV values,...
This paper proposes an analytical model for performance evaluation of Cellular-WLAN Heterogeneous Networks (HetNets) based on Continuous Time Markov Chain (CTMC) for variable-bit-rate (VBR) data services. This model considers system specific overheads and limitations such as limited number of supported modulation and coding scheme (MCS) of each network. Moreover, this model includes the traffic density...
Cellular based M2M systems generate massive number of access requests which create congestion in the cellular network. The contention-based random access procedures are designed for cellular networks which cannot accommodate a large number of M2M traffic. In this paper, a contention-based slotted Aloha random access procedure for M2M network is first analyzed using different performance metrics. The...
This paper proposes the analytical expressions for the IEEE 802.11 string-topology multi-hop networks using Markov-chain model. For achieving that, the proposed analysis procedure includes two proposals, which are: (i) Bianchi's Markov-chain model is modified for considering a relationship between the backoff timer and frame length, and (ii) the interferences, such as hidden node collision and carrier...
Long Term Evolution (LTE) technology application in Indonesia has limited on contiguous frequency allocation for the cellular operator. Release 10 3GPP generated LTE-Advanced which supports carrier aggregation feature. In this paper, the design of LTE-Advanced uses 20 MHz bandwidth by comparing carrier aggregation inter-band non-contiguous scenario on 900 MHz and 1800 MHz frequency and intra-band...
Image processing algorithms which only work on a local neighbourhood are nearly used in every image processing application. Very often several iterations are performed on a fixed neighbourhood which leads to the description of stencil codes. A promising approach in embedded systems is to use the massively parallel computation power of an FPGA for this kind of algorithms. This not only speeds up processing...
Analytical methods for estimating on-chip network performance can be very useful to accelerate and simplify the design process of Networks on Chip. However, in order to increase the confidence in these approaches it is fundamental to perform systematic studies that assess their potential. We present a methodical investigation on the tightness between analytical end-to-end delay bounds and worst-case...
This paper revolves around the evaluation of the achievable throughput in the context of an IEEE 802.11p-based vehicular subnetwork scenario where a completely isolated source vehicle, S, desires to communicate with a distant stationary Roadside Internet Gateway (RIG), D. Multi-hop inter-vehicular communication is exploited for the purpose of establishing a path between S and D along which downstream...
LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and...
IEEE 802.11ah task group is working on a new amendment of the IEEE 802.11 standard, suitable for high density WLAN networks in the sub 1 GHz band. It is expected to be the prevalent standard in many Internet of Things (IoT) and Machine to Machine (M2M) applications where it will support long-range and energy-efficient communication in dense network environments. Therefore, significant changes in the...
Design Hotspots are features on a silicon chip, which are susceptible to pattern failures. While multiple methods like DRC, ORC and CFM inspection are used to identify these Hotspots, in-line monitoring of these design Hotspots has remained a challenge. Existing methods of Hotspot inspection, which include API and EBI are not suited for large scale inspection due to system limitations and throughput...
Interference management (RF management) remains one of the main challenges facing the design and deployment of large-scale WLAN. RF management involves the detection, estimation and control of power level, channel allocations and link schedules, to improve the performance of the wireless network. Among interfering links, one can find different types of dependencies. While some of these types can be...
A model development for regional airport throughputs is rather a difficult task to perform. It concerns a dynamic and complex system implying demographic and sociological development trends as regards the catchment area of a specific regional airport. These trends are a mirror of the regional industrial development and its transportation infrastructure level. The principal aspects consist in soft...
WiMAX (World Wide Interoperability for Microwave Access) is a standard based technology based on IEEE 802.16 Air Interface. This standard is the future mode of mobile communication. Therefore, it is important to evaluate the performance of WiMAX in different scenarios. In this paper we have presented performance analysis of WiMAX for the CBR (Constant Bit Rate) traffic with and without mobility. Two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.