• Title/Summary/Keyword: Exponential Scheme

Search Result 156, Processing Time 0.022 seconds

A Study on Rate-Based Congestion Control Using EWMA for Multicast Services in IP Based Networks (IP 기반 통신망의 멀티캐스팅 서비스를 위한 지수이동 가중평판을 이용한 전송률기반 폭주제어에 관한 연구)

  • Choi, Jae-Ha;Lee, Seng-Hyup;Chu, Hyung-Suk;An, Chong-Koo;Shin, Soung-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.39-43
    • /
    • 2007
  • In high speed communication networks, the determination of a transmission rate is critical for the stability of a closed-loop network system with the congestion control scheme. In ATM networks, the available bit rate (ABR) service is based on a feedback mechanism, i.e., the network status is transferred to the ABR source by a resource management (RM) cell. RM cells contain the traffic information of the downstream nodes for the traffic rate control. However, the traffic status of the downstream nodes can not be directly transferred to the source node in the IP based networks. In this paper, a new rate-based congestion control scheme using an exponential weighted moving average algorithm is proposed to build an efficient feedback control law for congestion avoidance in high speed communication networks. The proposed congestion control scheme assures the stability of switch buffers and higher link utilization of the network. Moreover, we note that the proposed congestion scheme can flexibly work along with the increasing number of input sources in the network, which results in an improved scalability.

  • PDF

Improving the TCP Retransmission Timer Adjustment Mechanism for Constrained IoT Networks

  • Chansook Lim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.29-35
    • /
    • 2024
  • TCP is considered as one of the major candidate transport protocols even for constrained IoT networks..In our previous work, we investigated the congestion control mechanism of the uIP TCP. Since the uIP TCP sets the window size to one segment by default, managing the retransmission timer is the primary approach to congestion control. However, the original uIP TCP sets the retransmission timer based on the fixed RTO, it performs poorly when a radio duty cycling mechanism is enabled and the hidden terminal problem is severe. In our previous work, we proposed a TCP retransmission timer adjustment scheme for uIP TCP which adopts the notion of weak RTT estimation of CoCoA, exponential backoffs with variable limits, and dithering. Although our previous work showed that the proposed retransmission timer adjustment scheme can improve performance, we observe that the scheme often causes a node to set the retransmission timer for an excessively too long time period. In this work, we show that slightly modifying the dithering mechanism of the previous scheme is effective for improving TCP fairness.

A Deterministic Back-off Algorithm for Wireless Networks

  • Jin Jung-woo;Kim Kyung-Jun;Kim Dong-hwan;Lee Ho-seung;Han Ki-jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.310-312
    • /
    • 2004
  • Binary Exponential Back-off (BEB) scheme is widely adopted in both wire and wireless networks for collision resolution. The BEB suffers from several performance drawbacks including long packet delay and low utilization since it doubles the back-off size after each collision. In addition, operation of the BEB algorithm may lead to the last-come-first-serve result among competing users and the BEB is further unstable for every arrival rate greater than 0 due to its random access property[1,2]. In this paper, we propose a deterministic back-off algorithm to reduce contention interval as much as possible for accessing the channel without collision in the back-off process. Simulation results show that our scheme offers a higher throughput as well as a lower packet transfer delay than the BEB by taking advantage of its lower collision ratio in saturation state.

  • PDF

Efficient Anonymous Fingerprinting with Improved Automatic Identification of Redistributors (재분배자의 자동 식별기능을 갖는 효율적인 익명성을 제공하는 핑거프린팅)

  • 정찬주;오수현;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.47-57
    • /
    • 2000
  • This paper proposes efficient anonymous fingerprinting with improved automatic identification of redistributors in electronic commerce of digital contents. The proposed scheme by Domingos in Eletronic Letters is inefficient in electronic commerce, because of pass numbers in registration protocol and exponential computations in identification protocol. Our scheme is reduced 2-pass in registraton protocol and is required only 1 time exponential computation than his in identification protocol. According to electronic commerce of digital contents used in ordinary life, our schemes values are increased.

EXPONENTIALLY FITTED NUMERICAL SCHEME FOR SINGULARLY PERTURBED DIFFERENTIAL EQUATIONS INVOLVING SMALL DELAYS

  • ANGASU, MERGA AMARA;DURESSA, GEMECHIS FILE;WOLDAREGAY, MESFIN MEKURIA
    • Journal of applied mathematics & informatics
    • /
    • v.39 no.3_4
    • /
    • pp.419-435
    • /
    • 2021
  • This paper deals with numerical treatment of singularly perturbed differential equations involving small delays. The highest order derivative in the equation is multiplied by a perturbation parameter 𝜀 taking arbitrary values in the interval (0, 1]. For small 𝜀, the problem involves a boundary layer of width O(𝜀), where the solution changes by a finite value, while its derivative grows unboundedly as 𝜀 tends to zero. The considered problem contains delay on the convection and reaction terms. The terms with the delays are approximated using Taylor series approximations resulting to asymptotically equivalent singularly perturbed BVPs. Inducing exponential fitting factor for the term containing the singular perturbation parameter and using central finite difference for the derivative terms, numerical scheme is developed. The stability and uniform convergence of difference schemes are studied. Using a priori estimates we show the convergence of the scheme in maximum norm. The scheme converges with second order of convergence for the case 𝜀 = O(N-1) and for the case 𝜀 ≪ N-1, the scheme converge uniformly with first order of convergence, where N is number of mesh intervals in the domain discretization. We compare the accuracy of the developed scheme with the results in the literature. It is found that the proposed scheme gives accurate result than the one in the literatures.

A spent nuclear fuel source term calculation code BESNA with a new modified predictor-corrector scheme

  • Duy Long Ta ;Ser Gi Hong ;Dae Sik Yook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.12
    • /
    • pp.4722-4730
    • /
    • 2022
  • This paper introduces a new point depletion-based source term calculation code named BESNA (Bateman Equation Solver for Nuclear Applications), which is aimed to estimate nuclide inventories and source terms from spent nuclear fuels. The BESNA code employs a new modified CE/CM (Constant Extrapolation - Constant Midpoint) predictor-corrector scheme in depletion calculations for improving computational efficiency. In this modified CE/CM scheme, the decay components leading to the large norm of the depletion matrix are excluded in the corrector, and hence the corrector calculation involves only the reaction components, which can be efficiently solved with the Talyor Expansion Method (TEM). The numerical test shows that the new scheme substantially reduces computing time without loss of accuracy in comparison with the conventional scheme using CRAM (Chebyshev Rational Approximation Method), especially when the substep calculations are applied. The depletion calculation and source term estimation capability of BESNA are verified and validated through several problems, where results from BESNA are compared with those calculated by other codes as well as measured data. The analysis results show the computational efficiency of the new modified scheme and the reliability of BESNA in both isotopic predictions and source term estimations.

Adaptive and Prioritized Random Access and Resource Allocation Schemes for Dynamic TDMA/TDD Protocols

  • Choi, Hyun-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.28-36
    • /
    • 2017
  • The medium access control (MAC) protocol based on dynamic time division multiple access/time division duplex (TDMA/TDD) is responsible for random access control and radio resource allocation in dynamic traffic environments. These functions of random access and resource allocation are very important to prevent wastage of resources and improve MAC performance according to various network conditions. In this paper, we propose new random access and resource allocation schemes to guarantee quality of service (QoS) and provide priority services in a dynamic TDMA/TDD system. First, for the QoS guarantee, we propose an adaptive random access and resource allocation scheme by introducing an access probability. Second, for providing priority service, we propose a priority-based random access and resource allocation scheme by extending the first adaptive scheme in both a centralized and a distributed manner. The analysis and simulation results show that the proposed MAC protocol outperforms the legacy MAC protocol using a simple binary exponential backoff algorithm, and provides good differential performance according to priorities with respect to the throughput and delay.

Performance Analysis of Hybrid Location Update Strategy in Wireless Communication System (이동 통신망에서의 혼합형 위치 갱신 방법의 성능분석)

  • Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.191-198
    • /
    • 2006
  • In this paper, we focus on a question. Which is better between time-based location update method and movement-based location update method? Or, does any other method combining the two methods show better performance? For the question, we propose a hybrid location update scheme, which integrates the time-based and the movement-based methods. In the proposed scheme, a mobile terminal updates its location after n cell boundary crossing and a time interval of T, or the inverse. We derive an analytical solution for the performance of the hybrid scheme with exponential cell resident time. From the numerical analysis, we conclude that the movement-based method seems to have better performance than the time-based and hybrid methods, that is the optimal costs occur at T=0.

  • PDF

Doubly-Selective Channel Estimation for OFDM Systems Using a Pilot-Embedded Training Scheme

  • Wang, Li-Dong;Lim, Dong-Min
    • Journal of electromagnetic engineering and science
    • /
    • v.6 no.4
    • /
    • pp.203-208
    • /
    • 2006
  • Channel estimation and data detection for OFDM systems over time- and frequency-selective channels are investigated. Relying on the complex exponential basis expansion channel model, a pilot-embedded channel estimation scheme with low computational complexity and spectral efficiency is proposed. A periodic pilot sequence is superimposed at a low power on information bearing sequence at the transmitter before modulation and transmission. The channel state information(CSI) can be estimated using the first-order statistics of the received data. In order to enhance the performance of channel estimation, we recover the transmitted data which can be exploited to estimate CSI iteratively. Simulation results show that the proposed method is suitable for doubly-selective channel estimation for the OFDM systems and the performance of the proposed method can be better than that of the Wiener filter method under some conditions. Through simulations, we also analyze the factors which can affect the system performances.

2D continuum viscodamage-embedded discontinuity model with second order mid-point scheme

  • Do, Xuan Nam;Ibrahimbegovic, Adnan
    • Coupled systems mechanics
    • /
    • v.7 no.6
    • /
    • pp.669-690
    • /
    • 2018
  • This paper deals with numerical modeling of dynamic failure phenomena in rate-sensitive brittle and/or ductile materials. To this end, a two-dimensional continuum viscodamage-embedded discontinuity model, which is based on our previous work (see Do et al. 2017), is developed. More specifically, the pre-peak nonlinear and rate-sensitive hardening response of the material behavior, representing the fracture-process zone creation, is described by a rate-dependent continuum damage model. Meanwhile, an embedded displacement discontinuity model is used to formulate the post-peak response, involving the macro-crack creation accompanied by exponential softening. The numerical implementation in the context of the finite element method exploiting the second-order mid-point scheme is discussed in detail. In order to show the performance of the model several numerical examples are included.