• Title/Summary/Keyword: Erasure network

Search Result 22, Processing Time 0.026 seconds

Analytic Throughput Model for Network Coded TCP in Wireless Mesh Networks

  • Zhang, Sanfeng;Lan, Xiang;Li, Shuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3110-3125
    • /
    • 2014
  • Network coding improves TCP's performance in lossy wireless networks. However, the complex congestion window evolution of network coded TCP (TCP-NC) makes the analysis of end-to-end throughput challenging. This paper analyzes the evolutionary process of TCP-NC against lossy links. An analytic model is established by applying a two-dimensional Markov chain. With maximum window size, end-to-end erasure rate and redundancy parameter as input parameters, the analytic model can reflect window evolution and calculate end-to-end throughput of TCP-NC precisely. The key point of our model is that by the novel definition of the states of Markov chain, both the number of related states and the computation complexity are substantially reduced. Our work helps to understand the factors that affect TCP-NC's performance and lay the foundation of its optimization. Extensive simulations on NS2 show that the analytic model features fairly high accuracy.

Calculation Methods for Slot Utilization Based on Erasure nodes in DQDB Networks (소거노드 기반 DQDB망의 슬롯 이용률 평가식)

  • Cho, Kyoung-Sook;Oh, Bum-Suk;Kim, Chong-Gun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2654-2662
    • /
    • 1998
  • Maximum single bus throughput of standard IEEE 802.6 DQDB(Distributed Queue Dual Bus) is not obtained over 1. Therefore, lots of studies for improving bus throughput have done by QA slot preuse/reuse. We propose three calculation cethods for network's utilization with preuse/reuse scheme based on erasure nodes. One is calculation method by traffic density function, other is calculation method for obtaining maximum throughput. The other is calculation method using probability concept which follows real DQDB operation mechanisms. The calculated throughputs are compared with each others. The results shows some favorite phenomena. The proposed calculation methods can be casily expanded in mumber of nodes or in number of erasure nodes.

  • PDF

A Distributed LT Codes-based Data Transmission Technique for Multicast Services in Vehicular Ad-hoc Networks

  • Zhou, Yuan;Fei, Zesong;Huang, Gaishi;Yang, Ang;Kuang, Jingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.748-766
    • /
    • 2013
  • In this paper, we consider an infrastructure-vehicle-vehicle (I2V2V) based Vehicle Ad-hoc Networks (VANETs), where one base station multicasts data to d vehicular users with the assistance of r vehicular users. A Distributed Luby Transform (DLT) codes based transmission scheme is proposed over lossy VANETs to reduce transmission latency. Furthermore, focusing on the degree distribution of DLT codes, a Modified Deconvolved Soliton Distribution (MDSD) is designed to further reduce the transmission latency and improve the transmission reliability. We investigate the network behavior of the transmission scheme with MDSD, called MDLT based scheme. Closed-form expressions of the transmission latency of the proposed schemes are derived. Performance simulation results show that DLT based scheme can reduce transmission latency significantly compared with traditional Automatic Repeat Request (ARQ) and Luby Transform (LT) codes based schemes. In contrast to DLT based scheme, the MDLT based scheme can further reduce transmission latency and improve FER performance substantially, when both the source-to-relay and relay-to-sink channels are erasure channels.

A Method for Reliable Transmission of Real-Time Multimedia Data over 802.11 WLANs using Broadcast Packets (802.11 WLAN 방송 패킷을 이용한 신뢰성 있는 실시간 멀티미디어 데이터 전송 방법)

  • Kim, Se-Mi;Kim, Dong-Hyun;Kim, Jong-Deok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.681-684
    • /
    • 2011
  • 최근 IEEE 802.11 WLAN(Wireless Local Area Network)에서 실시간 멀티미디어 서비스가 증가하고 있다. WLAN 의 패킷 전송방식은 Unicast 또는 Broadcast 방식이 있다. Unicast 방식은 재전송을 포함하여 유실율이 적으나 사용자가 증가할수록 AP 에서 필요한 무선 자원의 크기가 증가한다. 무선 자원의 크기가 증가하면 AP 부하가 증가하여 서비스 수용에 한계가 있다. Broadcast 방식은 사용자 수에 상관 없이 무선 자원의 크기가 일정하나, 패킷 유실율이 높다. 본 논문에서는 이러한 문제점을 해결하기 위해 Broadcast 와 FEC(Forward Error Correction) Erasure Code 기반 기술을 적용하는 것을 제안한다. 방송 패킷을 이용 AP 의 부하를 줄이고, Reed Solomon Erasure Code 를 적용하여 패킷 유실 복구율을 높인다. 이러한 방법을 통하여 다수의 사용자에게 안정적인 실시간 멀티미디어 방송 서비스를 제공 할 수 있다. 제안한 방법을 검증하기 위해 Android Platform 에서 FEC 적용 유무에 따른 수신율을 측정하였다. 그 결과 유실율 30%미만인 Broadcast 환경에서 96.4% 이상의 수신율을 보였다.

Borrowing and Returning Mechanism for Fairness Control of DQOB-SR on Clinet-Server Environments. (클라이언트-서버 환경에서 슬롯 재사용 분산-큐 이중-버스의 공정성 제어를 위한 빌림과 반환 방식)

  • Kim, Jeong-Hong;Kwon, Oh-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.435-446
    • /
    • 2001
  • In this paper, a new fairness control method is proposed to distribute DQDB-SR (Distributed-Queue Dual-Bus with Slot Reuse) network bandwidth fairly to all stations on client-server environments. By using an access limit that follows a characteristic of client-sever load patterns and a bandwidth borrowing and returning mechanism, the proposed mechanism imparts fairness bandwidth control capability to DQDB-SR. To implement the proposed mechanism, we find the optimal placement of erasure nodes that maximizes network capacity for DQDB-SR, and calculate the access limit. At overload conditions, simulation results show that the proposed mechanism does not deteriorate network throughput, and outperforms other fairness control mechanisms in a success rate and an average packet transfer delay.

  • PDF

Redundancy Minimizing Techniques for Robust Transmission in Wireless Networks

  • Kacewicz, Anna;Wicker, Stephen B.
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.564-573
    • /
    • 2009
  • In this paper, we consider a wireless multiple path network in which a transmitting node would like to send a message to the receiving node with a certain probability of success. These two nodes are separated by N erasure paths, and we devise two algorithms to determine minimum redundancy and optimal symbol allocation for this setup. We discuss the case with N = 3 and then extend the case to an arbitrary number of paths. One of the algorithms minimum redundancy algorithm in exponential time is shown to be optimal in several cases, but has exponential running time. The other algorithm, minimum redundancy algorithm in polynomial time, is sub-optimal but has polynomial worstcase running time. These algorithms are based off the theory of maximum-distance separable codes. We apply the MRAET algorithm on maximum-distance separable, Luby transform, and Raptor codes and compare their performance.

A Simple Coded ARQ for Satellite Broadcasting

  • Liva, Gianluigi;Kissling, Christian;Hausl, Christoph
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.577-581
    • /
    • 2010
  • We introduce a novel packet retransmission technique which improves the efficiency of automatic retransmission query (ARQ) protocols in the context of satellite broadcast/multicast systems. The proposed coded ARQ technique, similarly to fountain coding, performs transmission of redundant packets, which are made by linear combinations of the packets composing the source block. Differently from fountain codes, the packets for the linear combinations are selected on the basis of the retransmission requests coming from the user terminals. The selection is performed in a way that, at the terminals, the source packets can be recovered iteratively by means of simple back-substitutions. This work aims at providing a simple and efficient alternative to reliable multicast protocols based on erasure correction coding techniques.

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

An Efficient Bandwidth Utilization Mechanism for the IEEE 802.6 MAN (IEEE 802.6 MAN을 위한 효율적 대역폭 사용 메카니즘)

  • 강문식;유시훈;조명석;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.310-317
    • /
    • 1993
  • This paper presents a mechanism for improving performance of the IEEE 802.6 MAN(Metropolitan Area Network), a dual-bus structured high-speed communication network, by a more efficient use of bandwidth. The MAN protocol is able to handle various traffic and offers better transmission speed than the conventional LAN, but the unidirectional bus structure and propagation delay of request bits results in unfairness since higher nodes use more bandwidth. As the number of stations and the distances between them are increased, the problem becomes mere serious. As a solution, this paper presents a method that every station enables to identify the used slots, and that a specified class denoted 'erasure station' has with the functions of destination release, slot reuse. As a result, it is export to improve network bandwidth values of each station and the throughput and delay time was analytically analyzed, and it is shown that according to computer simulation results, this mechanism improves the network performance.

  • PDF

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.