The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a single-link loss system of capacity C bandwidth units, accommodating K service-classes of Poisson traffic with different bandwidth-per-call requirements. Calls of all service-classes compete for the available link bandwidth under the bandwidth reservation (BR) policy. The BR policy is used in teletraffic engineering in order to achieve call blocking probability (CBP) equalization among...
With widely application of Peer-to-Peer (P2P) file sharing technique, the P2P traffic occupies most of the current Internet bandwidth. Modeling the behaviors of P2P file sharing systems is important for designing and evaluating such systems. In this paper, we develop a novel model to character the dynamic behaviors of P2P sharing systems. States in microcosmic view are defined and used to describe...
FAST TCP is a new transmission control protocol proposed for future high bandwidth-delay product networks. The stability and performance analysis of FAST TCP is an active research area. Researches show that the performance of FAST TCP, such as throughput, packet drop rate, link utilization, is sensitive to the setting of ??, which is one of the key parameter for FAST TCP. To eliminate the sensitivity,...
In this paper, the statement and solution of the important scientific problem of development the methodology of creation of adequate models simulating the timely changes of network throughput amount, available for the data traffic transmission are considered.
Worldwide interoperability for microwave access (WiMAX) based wireless metropolitan area networks have recently received wide attention as they support high data rates with great quality of service (QoS) capabilities. In order to support QoS, bandwidth request (BW-REQ) mechanisms are suggested in the WiMAX standard for resource reservation. In this letter we propose a simple and accurate analytical...
In order to solve the problem of collaboration and resource sharing of spatial database, this paper combines with the collaboration and resource sharing idea of grid computing, through analyzing the characteristics of grid and spatial database, the author establishes the spatial database model initially in grid environment , studies the spatial data processing operations performance in grid environment...
In this paper, the contention based access mode with a finite retry limit in the IEEE 802.16 media access control (MAC) protocol is modeled and analyzed. In addition, we provides an insight on the effects of various parameters involved in the bandwidth request mechanism on the system performance. The accuracy of the analytical model is verified by simulations.
A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumption that the peers in the system have homogeneous bandwidths. As this is highly unrealistic in real swarms, these models have very limited applicability. Most of all, these models implicitly ignore BitTorrent's most important...
This paper presents dimensioning of an IP-based UMTS Terrestrial Radio Access Network (UTRAN) with multiple Node Bs connected to one RNC, where the applied QoS architecture is based on Differentiated Service (DiffServ) with an integrated Weighted Fair Queue (WFQ) and Strict Priority (SP) scheduling. To provide an appropriate network dimensioning for guaranteeing a desired end-to-end QoS, a general...
Predicting or discovering the possible propagation direction of spreading network worms can efficiently benefit the enforcement of network security countermeasures like blocking them in real-time way. Most worms exhaust all of the network bandwidth maliciously in very short time. This paper proposed a model on predicting the propagation direction between areas based on two key indexes including area-infected-time...
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. The well-known medical model SIR is applied...
Although the popular BitTorrent protocol strives to limit free-riding via its tit-for-tat incentives, recent research efforts have shown that it does not strictly enforce fairness. Free-riding opportunities indeed exist, mainly via optimistic unchokes, a BitTorrent mechanism that facilitates the continuous discovery of better peers to interact with. Our results in this work also show that increasing...
In a Video on Demand system, by forwarding the server video stream client by client, a chain based scheme is formed, which reduces the server load. The existing chaining schemes are not reliable because there are frequent breaks in the chain among the clients due to stringent bandwidth and buffer, stop fail, and hardware and software failures. This leads to stream failures within the client, in turn...
Grid applications need to move large amounts of data between distributed resources within deterministic timeframes. In most cases it is possible to specify the volume and the deadline in advance. We formally define and analyze a mechanism of network reservations of bulk data transfer requests having opportunistic utilization of residual network capacity and analyze it using an M/M/1/N-RPS queue. We...
Based on the Internet self-organized dynamic process, an Internet structure model is presented. When servers are being selected in the Internet, not only the fluid and the bandwidth, but also the distance is needed to be considered. In the self-organized evolution model, the capability of servers is applied to decide the choice of the bandwidth, and the lattice distance of the Kleinberg network model...
Video-on-demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (video cassette recorder) operations, such as pause, rewind, and fast forward/backward, influence the pattern of the access to video segments and viewer(session) sojourn time. Moreover, some VCR features (e.g., bookmarking) newly proposed can further magnify such effects. This work...
We analyze the fairness of bandwidth sharing between competing flows when the flows use different packet sizes. For systems where router buffers are defined in packets, we notice that larger packets get preferential treatment. Specifically, in networks, where a higher capacity link is followed by a lower capacity link, packet loss seen by streams with bigger packet size is smaller. We verify our findings...
The article proposes a new method for calculating occupancy distribution and blocking/loss probability in the limited availability group with bandwidth reservation. The proposed method makes it possible to model groups servicing multi-service BPP traffic streams (Binomial-Poisson-Pascal). The proposed method is based on the analysis of the service process occurring in the considered system on the...
In this paper, a contention model for the IEEE 802.16e is first proposed to analyze the frame-based behavior of contention resolution in 802.16e network. Then a waiting-time dependent increasing rate adapted backoff (WDIA) algorithm is proposed to improve the contention efficiency. We introduce the concept of reduced overlapping between back-off windows of contending stations and we adopt an adapted...
We consider the problem of broadcasting video streams to a large number of users through P2P overlay, which is emerging as a killer application after P2P file sharing. Considerable research has been conducted in this area in recent years. But most of them are experimental or on a particular algorithm/implementation. The lacking of a general model prevents formal studies on P2P streaming. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.