End-to-end performance analysis with traffic aggregation
نویسنده
چکیده
The provisioning of end-to-end services in presence of traffic aggregation is evaluated in the framework of the Differentiated Services QoS architecture. The effect of stream multiplexing on delay and jitter-sensitive traffic is analyzed through an experimental approach. Aggregation is evaluated in three different scenarios: with different aggregate traffic loads, with a variable number of flows multiplexed in the same class and with different packet sizes. Two different scheduling algorithms are considered: Priority Queuing and Weighted Fair Queuing.
منابع مشابه
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route ag...
متن کاملResearch on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks
Wireless sensor network (WSN) is an important part of the Internet of Things (IoT) and technical support for ubiquitous communication. Data aggregation technology reduces the network traffic overhead and extends the effective working time of the network, but the continued operation of the wireless sensor networks will increase the probability of the aggregation node being captured and probabili...
متن کاملEnergy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
A number of routing protocols [1] have been proposed for wireless sensor networks in recent years. Considering energy-efficiency as the primary objective, most of routing protocols focus on reducing the number of packet transmissions by clustering, leveraging geographical information, and so on. These routing protocols in sensor networks have the limitation of lacking application contexts for f...
متن کاملConcealed data aggregation in wireless sensor networks: A comprehensive survey
The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...
متن کاملEnd-to-End Performance Evaluation of Interconnected Optical Multi-ring Metropolitan Networks
Metropolitan ring networks are usually used to connect the high speed backbone networks with the high speed access networks. In this paper, we focus on the end-to-end performance of a multi-ring architecture in which metropolitan access networks (MANs) are interconnected by a metropolitan core network. These rings are synchronized and can be interconnected transparently through single access no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 34 شماره
صفحات -
تاریخ انتشار 2000