Scheduling packet transmissions in a multi-hop packet switched network based on message length
نویسنده
چکیده
This paper describes two algorithms for scheduling packets in a multi-hop network. The objective of the algorithms is to reduce end-to-end message (not packet) transmission delays. Both algorithms schedule packet transmissions based on the length of the original message that the packet belongs to. The first algorithm is preemptive and is based on the shortest-message-first principle and the second is based on the shortest-remaimng-transmit-time principle. We develop simulation models for analyzing the algorithms. The simulations show that when message sizes vary widely, these algorithms can significantly reduce average end-to-end message delays compared to First-Come-FirstServe scheduling.
منابع مشابه
Scheduling Packet Transmissions on Logical Topologies in WDM Optical Star Networks
In this paper, we address the design of multi-hop packet transmissions for the All-to-All Broadcast (AAB) problem in a Wavelength Division Multiplexing (WDM) optical star network with N nodes. The tunable transmitter on each node needs a nonnegligible tuning latency δ to switch between wavelengths. To decrease the affection of the packet delay in multi-hop scheduling, the maximum of hop distanc...
متن کاملThe Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملGroup Allocation Multiple Access in Single-Channel Wireless LANs
The Group Allocation Multiple Access (GAMA) protocol for scheduling variable-length packet transmissions in a single-hop packet-radio network is specified and analyzed. By maintaining a dynamically-sized cycle that changes in length depending on the amount of network traffic, GAMA is able to provide the advantages of both TDMA and CSMA. Each cycle contains a contention period and a group-transm...
متن کامل