• Title/Summary/Keyword: 공평 전송률

Search Result 55, Processing Time 0.02 seconds

A Hierarchical Multicast Routing Protocol based on Zone Routing Technique for Wireless multi-hop Network (무선 다중 홉 네트워크에서의 지역 기반의 계층적 멀티캐스트 라우팅 프로토콜)

  • Gui, Yi-Qi;Zhang, Jie;Yang, Dong-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.149-156
    • /
    • 2011
  • In wireless multi-hop network, many applications need multicast communication where the group leader needs to send data to all members of the group. Multicast routing provides a balanced, efficient, and fairness network environment for the group members. However, large load for transmission management to leader node and signal interference between several paths for multi-hop links always took long transmission delay and low throughput efficiency. In this paper, we propose a Zone-based Hierarchical Multicast Routing Protocol (ZHMP). This routing protocol is designed based on zone routing schemes, where proactive routing is applied for intra-zone node level multicasting and reactive routing is used for searching inter-zone paths. By each hierarchical and independent multicast working in separated zones, load of multicast source node will be distributed by several zone-level routings for a better load balance and signal interference between each multi-hop paths will be resisted for a maximum multicast throughput.

Borrowing and Returning Mechanism for Fairness Control of DQOB-SR on Clinet-Server Environments. (클라이언트-서버 환경에서 슬롯 재사용 분산-큐 이중-버스의 공정성 제어를 위한 빌림과 반환 방식)

  • Kim, Jeong-Hong;Kwon, Oh-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.435-446
    • /
    • 2001
  • In this paper, a new fairness control method is proposed to distribute DQDB-SR (Distributed-Queue Dual-Bus with Slot Reuse) network bandwidth fairly to all stations on client-server environments. By using an access limit that follows a characteristic of client-sever load patterns and a bandwidth borrowing and returning mechanism, the proposed mechanism imparts fairness bandwidth control capability to DQDB-SR. To implement the proposed mechanism, we find the optimal placement of erasure nodes that maximizes network capacity for DQDB-SR, and calculate the access limit. At overload conditions, simulation results show that the proposed mechanism does not deteriorate network throughput, and outperforms other fairness control mechanisms in a success rate and an average packet transfer delay.

  • PDF

Double Queue CBOKe Mechanism for Congestion Control (이중 큐 CHOKe 방식을 사용한 혼잡제어)

  • 최기현;신호진;신동렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11A
    • /
    • pp.867-875
    • /
    • 2003
  • Current end-to-end congestion control depends only on the information of end points (using three duplicate ACK packets) and generally responds slowly to the network congestion. This mechanism can't avoid TCP global synchronization in which TCP congestion window size is fluctuated during congestion period. Furthermore, if RTT(Round Trip Time) is increased, three duplicate ACK packets are not correct congestion signals because congestion might already disappear and the host may send more packets until it receives three duplicate ACK packets. Recently there are increasing interests in solving end-to-end congestion control using AQM(Active Queue Management) to improve the performance of TCP protocols. AQM is a variation of RED-based congestion control. In this paper, we first evaluate the effectiveness of the current AQM schemes such as RED, CHOKe, ARED, FRED and SRED, over traffic with different rates and over traffic with mixed responsive and non-responsive flows, respectively. In particular, CHOKe mechanism shows greater unfairness, especially when more unresponsive flows exist in a shared link. We then propose a new AQM scheme using CHOKe mechanism, called DQC(Double Queue CHOKe), which uses two FIFO queues before applying CHOKe mechanism to adaptive congestion control. Simulation shows that it works well in protecting congestion-sensitive flows from congestion-causing flows and exhibits better performances than other AQM schemes. Also we use partial state information, proposed in LRURED, to improve our mechanism.

An Aggregate Three Color Marker without Per Flow Management for End-to-End QoS Improvement of Assured Service in DiffServ (DiffServ 방식에서 플로별 관리 없이 Assured Service의 End-to-End QoS를 향상하기위한 Aggregate Three Color Marker)

  • Hur, Kyeong;Park, Ji-Hoon;Roh, Young-Sup;Eom, Doo-Seop;Tchah, Kyun-Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6B
    • /
    • pp.588-603
    • /
    • 2003
  • In this paper, we propose an Aggregate Three Color Marker without per flow management which is required for an Edge router to improve End-to-End QoS of Assured Service in DiffServ. Proposed Aggregate Three Color Marker is used with the Adaptive RIO-DC scheme to achieve the minimum rate guarantee without per flow management. Assuming that the admission control for Assured Service has been performed, proposed Aggregate Three Color Marker measures incoming In-profile traffic rate at the output link of an edge router using a token-bucket with a token rate equal to the sum of contracted rates of admitted flows passing the edge router. If there are token losses from the token bucket, out-of-profile packets are promoted to Yellow packets within the aggregate traffic profile. And yellow packets are demoted to out-of-profile packets at the input link to an Edge router fer the purpose of fairness maintenance. In-profile packets and Yellow packets are processed identically at the RIO-DC buffer management scheme in our proposed method. Simulation results show that through using proposed Aggregate Three Color Marker with the Adaptive RIO-DC scheme, the minimum rate guarantee for Assured Service can be achieved without per flow management at multiple DiffServ domains.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.