• Title/Summary/Keyword: information bounds

Search Result 304, Processing Time 0.022 seconds

Fish Eye OLSR Scaling Properties

  • Adjih, Cedric;Baccelli, Emmanuel;Clausen, Thomas Heide;Jacquet, Philippe;Rodolakis, Georgios
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.343-351
    • /
    • 2004
  • Scalability is one of the toughest challenges in ad hoc networking. Recent work outlines theoretical bounds on how well routing protocols could scale in this environment. However, none of the popular routing solutions really scales to large networks, by coming close enough to these bounds. In this paper, we study the case of link state routing and OLSR, one of the strongest candidates for standardization. We analyze how these bounds are not reached in this case, and we study how much the scalability is enhanced with the use of Fish eye techniques in addition to the link state routing framework. We show that with this enhancement, the theoretical scalability bounds are reached.

An Algorithm for Computing the Weight Enumerating Function of Concatenated Convolutional Codes (연쇄 컨볼루션 부호의 가중치 열거함수 계산 알고리듬)

  • 강성진;권성락;이영조;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.1080-1089
    • /
    • 1999
  • The union upper bounds to the bit error probability of maximum likelihood(ML) soft-decoding of parallel concatenated convolutional codes(PCCC) and serially concatenated convolutional codes(SCCC) can be evaluated through the weight enumerating function(WEF). This union upper bounds become the lower bounds of the BER achievable when iterative decoding is used. In this paper, to compute the WEF, an efficient error event search algorithm which is a combination of stack algorithm and bidirectional search algorithm is proposed. By computor simulation, it is shown that the union boounds obtained by using the proposed algorithm become the lower bounds to BER of concatenated convolutional codes with iterative decoding.

  • PDF

Generalization of Tanner′s Minimum Distance Bounds for LDPC Codes (LDPC 부호 적용을 위한 Tanner의 최소 거리 바운드의 일반화)

  • Shin Min Ho;Kim Joon Sung;Song Hong Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1363-1369
    • /
    • 2004
  • LDPC(Low Density Parity Check) codes are described by bipartite graphs with bit nodes and parity-check nodes. Tanner derived minimum distance bounds of the regular LDPC code in terms of the eigenvalues of the associated adjacency matrix. In this paper we generalize the Tanner's results. We derive minimum distance bounds applicable to both regular and blockwise-irregular LDPC codes. The first bound considers the relation between bit nodes in a minimum-weight codeword, and the second one considers the connectivity between parity nodes adjacent to a minimum-weight codeword. The derived bounds make it possible to describe the distance property of the code in terms of the eigenvalues of the associated matrix.

Bounds for Network Reliability

  • Jeong, Mi-Ok;Lim, Kyung-Eun;Lee, Eui-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • A network consisting of a set of N nodes and a set of links is considered. The nodes are assumed to be perfect and the states of links to be binary and associated to each other. After defining a network structure function, which represents the state of network as a function of the states of links, we obtain some lower and upper bounds on the network reliability by adopting minmax principle and minimal path and cut set arguments. These bounds are given as functions of the reliabilities of links. The bridge network is considered as an example.

  • PDF

Real-time traffic service in network with DiffServ (DiffServ 기반 네트워크에서의 실시간 트래픽 서비스)

  • Joung, Jin-No
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.53-60
    • /
    • 2007
  • We investigate the end-to-end delay bounds in large scale networks with Differentiated services (DiffServ) architecture. It is generally understood that networks with DiffServ architectures, where packets are treated according to the class they belong, can guarantee the end-to-end delay for packets of the highest priority class, only in lightly utilized cases. We focus on tree networks, which are defined to be acyclic connected graphs. We obtain a closed formula for delay bounds for such networks. We show that, in tree networks, the delay bounds exist regardless of the level of network utilization. These bounds are quadratically proportional to the maximum hop counts in heavily utilized networks; and are linearly proportional to the maximum hop counts in lightly utilized networks. Considering that tree networks, especially the Ethernet networks are being accepted more and more for access networks as well as provider networks, we argue that based on these delay bounds DiffServ architecture is able to support real time applications even for a large network. Throughout the paper we use Latency-Rate (LR) server model, with which it has proven that FIFO and Strict Priority are LR servers to each flows in certain conditions.

Stability Robustness of Unified Decentralized Systems (단일 분산시스템의 강인안정성 해석)

  • Lee, Dong-Gi;Heo, Gwang-Hee;Oh, Do-Chang;Lee, Giu;Lee, Woo-Sang
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.2 s.314
    • /
    • pp.1-9
    • /
    • 2007
  • In this paper, new results for perturbation bounds for unified decentralized systems by a unified approach using $\delta$ (defined as a shift operator at unified approach) are presented. Robust stability analysis of unified decentralized system is investigated by new robust stability bound under system uncertainties. New unified stability bounds are developed based on the unified Lyapunov matrix equation. It is shown that the system maintains its stability when new unified bounds are applied. Numerical example is presented to illustrate the proposed analysis.

Capacity Bound for Discrete Memoryless User-Relaying Channel

  • Moon, Ki-Ryang;Yoo, Do-Sik;Oh, Seong-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.855-868
    • /
    • 2012
  • In this paper, we consider the discrete memoryless user relaying channel (DMURC) in which a user-relay switches its operational mode symbol-by-symbol. In particular, we obtain upper and lower bounds on the channel capacity for the general DMURC and then show that these the upper and lower bounds coincide for degraded DMURC. It is also shown that the capacity of the degraded DMURC can be achieved using two separate codebooks corresponding to the two UR states. While the UR is assumed to switch states symbol-by-symbol, the results in this paper is the same as when the UR switches states packet-by-packet.

A Study on the Approximating Reliability Analysis of communication Networks (통신망의 신뢰도 근사해석에 관한 연구)

  • 유재영;오영환
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.145-149
    • /
    • 1991
  • In this paper, an algorithm is proposed to analyze the approximating reliability of the capacity considered communication networks. In the case ofthe former methods to evaluate the source-to-termianl node reliability, it is very difficult to contract and delete the jointed terms in the simple path group. Therefore, the reliability bounds are used and compared to the exact reliability by TURBO PROLOG, the natural lanquage of artficial intelligence. In the reliability bounds, the upper bound used the valid cutset that isthe group of simple path and the lower bound used the minimal cutset by complement operation and the esact reiability is compared to this reliability bounds.

Minimizing Frequency Drop Cost and Interference Cost in Reconfiguring Radio Networks (이동통신 네트워크에서 주파수간 간섭과 서비스 장애를 최소화하는 주파수 재할당 방법)

  • Han, Jung-Hee
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.107-121
    • /
    • 2010
  • In this paper, we present a frequency reassignment problem (FRP) that arises when we install new base stations or reconfigure radio networks to increase the capacity or to expand service area. For this problem, we develop an integer programming (IP) model, and develop cutting planes to enhance the mathematical representation of the model. Also, we devise an effective tabu search algorithm to obtain tight upper bounds within reasonable time bounds. Computational results exhibit that the developed cutting planes are effective for reducing the computing time as well as for increasing lower bounds. Also, the proposed tabu search algorithm finds a feasible solution of good quality within reasonable time bound.