• 제목/요약/키워드: throughput bounds

검색결과 24건 처리시간 0.018초

IEEE 802.11 무선랜에서 연결정보 기반의 신뢰성 있는 멀티캐스트 MAC 프로토콜을 위한 쓰루풋의 하한 유도 (Tighter Throughput Lower Bounds of Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs)

  • 최우용
    • 대한산업공학회지
    • /
    • 제38권4호
    • /
    • pp.285-288
    • /
    • 2012
  • The connectivity-based reliable multicast MAC protocol was proposed for IEEE 802.11 wireless LANs and the formulae for the lower bounds of the multicast downlink throughput and the uplink throughput of the connectivity-based reliable multicast MAC protocol were derived in our previous study. We provide the tighter throughput lower bounds of the connectivity-based reliable multicast MAC protocol than the lower bounds presented in our previous study.

다종류(多種類)의 고객을 지닌 폐쇄형(閉鎖型) 대기행렬 네트워크 모형(模型)의 출력률(出力率) 한계(限界) (On the Throughput Bounds of the Closed Queueing Networks with Multiple Classes of Customers)

  • 유인선;김성식
    • 대한산업공학회지
    • /
    • 제17권2호
    • /
    • pp.87-95
    • /
    • 1991
  • The exact solution of the closed queueing networks(CQN) is known only for the product form (BCMP) queueing networks. Various computational algorithms are available to derive system throughput(the rate at which a system completes units of computational work) of the networks. However, the computational expense of an exact solution is often excessive when there are multiple classes of cutomers. Instead of computing the exact values, it may be sufficient to derive bounds on the performance measures. Techniques for obtaining bounds on BCMP queueing networks have appeared in the past years. This paper also presents bounds on throughput in CQN models with multiple classes of customers.

  • PDF

봉쇄현상이 있는 조립/분해 대기행렬망의 산출율 상한 및 하한에 대한 연구 (Throughput Upper and lower Bounds for Assembly/Disassembly Queueing Networks with Blocking)

  • 백천현
    • 대한산업공학회지
    • /
    • 제23권4호
    • /
    • pp.769-778
    • /
    • 1997
  • Assembly/Disassembly Queueing Networks (ADQNs) with finite buffers have been used as a major tool for evaluating the performances of manufacturing and parallel processing systems. In this study, we present simple but effective methods which yield throughput upper and lower bounds for ADQNs with exponential service times and finite buffers. These methods are based on the monotonicity properties of throughputs with respect to service times and buffer capacities. The throughput-upper bounding method is elaborated on with general network configuration (specifically acyclic configuration). But our lower bounding method is restricted to the ADQNs with more specialized configuration. Computational experiments will be performed to confirm the effectiveness of our throughput-bounding methods.

  • PDF

Interference and Throughput in Spectrum Sensing Cognitive Radio Networks using Point Processes

  • Busson, Anthony;Jabbari, Bijan;Babaei, Alireza;Veque, Veronique
    • Journal of Communications and Networks
    • /
    • 제16권1호
    • /
    • pp.67-80
    • /
    • 2014
  • Spectrum sensing is vital for secondary unlicensed nodes to coexist and avoid interference with the primary licensed users in cognitive wireless networks. In this paper, we develop models for bounding interference levels from secondary network to the primary nodes within a spectrum sensing framework. Instead of classical stochastic approaches where Poisson point processes are used to model transmitters, we consider a more practical model which takes into account the medium access control regulations and where the secondary Poisson process is judiciously thinned in two phases to avoid interference with the secondary as well as the primary nodes. The resulting process will be a modified version of the Mat$\acute{e}$rn point process. For this model, we obtain bounds for the complementary cumulative distribution function of interference and present simulation results which show the developed analytical bounds are quite tight. Moreover, we use these bounds to find the operation regions of the secondary network such that the interference constraint is satisfied on receiving primary nodes. We then obtain theoretical results on the primary and secondary throughputs and find the throughput limits under the interference constraint.

Throughput and Delay of Single-Hop and Two-Hop Aeronautical Communication Networks

  • Wang, Yufeng;Erturk, Mustafa Cenk;Liu, Jinxing;Ra, In-ho;Sankar, Ravi;Morgera, Salvatore
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.58-66
    • /
    • 2015
  • Aeronautical communication networks (ACN) is an emerging concept in which aeronautical stations (AS) are considered as a part of multi-tier network for the future wireless communication system. An AS could be a commercial plane, helicopter, or any other low orbit station, i.e., Unmanned air vehicle, high altitude platform. The goal of ACN is to provide high throughput and cost effective communication network for aeronautical applications (i.e., Air traffic control (ATC), air traffic management (ATM) communications, and commercial in-flight Internet activities), and terrestrial networks by using aeronautical platforms as a backbone. In this paper, we investigate the issues about connectivity, throughput, and delay in ACN. First, topology of ACN is presented as a simple mobile ad hoc network and connectivity analysis is provided. Then, by using information obtained from connectivity analysis, we investigate two communication models, i.e., single-hop and two-hop, in which each source AS is communicating with its destination AS with or without the help of intermediate relay AS, respectively. In our throughput analysis, we use the method of finding the maximum number of concurrent successful transmissions to derive ACN throughput upper bounds for the two communication models. We conclude that the two-hop model achieves greater throughput scaling than the single-hop model for ACN and multi-hop models cannot achieve better throughput scaling than two-hop model. Furthermore, since delay issue is more salient in two-hop communication, we characterize the delay performance and derive the closed-form average end-to-end delay for the two-hop model. Finally, computer simulations are performed and it is shown that ACN is robust in terms of throughput and delay performances.

Relaying Protocols and Delay Analysis for Buffer-aided Wireless Powered Cooperative Communication Networks

  • Zhan, Jun;Tang, Xiaohu;Chen, Qingchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3542-3566
    • /
    • 2018
  • In this paper, we investigate a buffer-aided wireless powered cooperative communication network (WPCCN), in which the source and relay harvest the energy from a dedicated power beacon via wireless energy transfer, then the source transmits the data to the destination through the relay. Both the source and relay are equipped with an energy buffer to store the harvested energy in the energy transfer stage. In addition, the relay is equipped with a data buffer and can temporarily store the received information. Considering the buffer-aided WPCCN, we propose two buffer-aided relaying protocols, which named as the buffer-aided harvest-then-transmit (HtT) protocol and the buffer-aided joint mode selection and power allocation (JMSPA) protocol, respectively. For the buffer-aided HtT protocol, the time-averaged achievable rate is obtained in closed form. For the buffer-aided JMSPA protocol, the optimal adaptive mode selection scheme and power allocation scheme, which jointly maximize the time-averaged throughput of system, are obtained by employing the Lyapunov optimization theory. Furthermore, we drive the theoretical bounds on the time-averaged achievable rate and time-averaged delay, then present the throughput-delay tradeoff achieved by the joint JMSPA protocol. Simulation results validate the throughput performance gain of the proposed buffer-aided relaying protocols and verify the theoretical analysis.

Research on Per-cell Codebook based Channel Quantization for CoMP Transmission

  • Hu, Zhirui;Feng, Chunyan;Zhang, Tiankui;Gao, Qiubin;Sun, Shaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.1828-1847
    • /
    • 2014
  • Coordinated multi-point (CoMP) transmission has been regarded as a potential technology for LTE-Advanced. In frequency division duplexing systems, channel quantization is applied for reporting channel state information (CSI). Considering the dynamic number of cooperation base stations (BSs), asymmetry feature of CoMP channels and high searching complexity, simply increasing the size of the codebook used in traditional multiple antenna systems to quantize the global CSI of CoMP systems directly is infeasible. Per-cell codebook based channel quantization to quantize local CSI for each BS separately is an effective method. In this paper, the theoretical upper bounds of system throughput are derived for two codeword selection schemes, independent codeword selection (ICS) and joint codeword selection (JCS), respectively. The feedback overhead and selection complexity of these two schemes are analyzed. In the simulation, the system throughput of ICS and JCS is compared. Both analysis and simulation results show that JCS has a better tradeoff between system throughput and feedback overhead. The ICS has obvious advantage in complexity, but it needs additional phase information (PI) feedback for obtaining the approximate system throughput with JCS. Under the same number of feedback bits constraint, allocating the number of bits for channel direction information (CDI) and PI quantization can increase the system throughput, but ICS is still inferior to JCS. Based on theoretical analysis and simulation results, some recommendations are given with regard to the application of each scheme respectively.

가중치 작업들의 온라인 비선점 마감시한 스케줄링 (Online Non-preemptive Deadline Scheduling for Weighted Jobs)

  • 김재훈;장정환
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제32권2호
    • /
    • pp.68-74
    • /
    • 2005
  • 마감시한 스케줄링에서 작업들은 수행을 완료해야 하는 마감시한을 가진다 스케줄링 알고리즘은 각 시간에 어떠한 작업이 수행되어야 하는 지 결정한다. 수행이 마감시한 안에 완료된 작업들만이 알고리즘의 처리량 또는 이익에 포함된다. 작업들은 임의의 가중치를 가지고 알고리즘의 이익은 완료된 작업들의 가중치의 합으로 주어진다. 스케줄링 알고리즘의 목표는 이익을 최대화하는 것이다. 본 논문에서 우리는 온라인 비선점 스케줄링을 생각한다. 여기서 작업들은 온라인으로 도착하고, 스케줄링 알고리즘은 앞으로 도착할 작업들의 정보를 미리 알 수 없다. 작업들은 스케줄 되고 나서 수행 도중에 멈출 수 없다. 이 문제에 대해서, 우리는 임의의 온라인 알고리즘의 성능의 하한을 구한다. 또한 이 하한과 일치하는 성능을 가지는 최적의 온라인 알고리즘을 제안하다.

Joint Optimization of Mobile Charging and Data Gathering for Wireless Rechargeable Sensor Networks

  • Tian, Xianzhong;He, Jiacun;Chen, Yuzhe;Li, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3412-3432
    • /
    • 2019
  • Recent advances in radio frequency (RF) power transfer provide a promising technology to power sensor nodes. Adoption of mobile chargers to replenish the nodes' energy has recently attracted a lot of attention and the mobility assisted energy replenishment provides predictable and sustained power service. In this paper, we study the joint optimization of mobile charging and data gathering in sensor networks. A wireless multi-functional vehicle (WMV) is employed and periodically moves along specified trajectories, charge the sensors and gather the sensed data via one-hop communication. The objective of this paper is to maximize the uplink throughput by optimally allocating the time for the downlink wireless energy transfer by the WMV and the uplink transmissions of different sensors. We consider two scenarios where the WMV moves in a straight line and around a circle. By time discretization, the optimization problem is formulated as a 0-1 programming problem. We obtain the upper and lower bounds of the problem by converting the original 0-1 programming problem into a linear programming problem and then obtain the optimal solution by using branch and bound algorithm. We further prove that the network throughput is independent of the WMV's velocity under certain conditions. Performance of our proposed algorithm is evaluated through extensive simulations. The results validate the correctness of our proposed theorems and demonstrate that our algorithm outperforms two baseline algorithms in achieved throughput under different settings.