Comment on \ A Deterministic Approach to the End - to - end Analysis of Packet Flows in Connection Oriented Networks
نویسنده
چکیده
We prove that the bu er bound in [CFZF98] can be improved, by using a modi cation of the proofs in the original paper [CFZF98], together with so-called network calculus bounds. We also show that the delay bound in [CFZF98] is the sum of worst case queuing delays at all nodes along the path of a connection.
منابع مشابه
The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کامل“ TCP Over OBS : To Split or Not To Split ? ”
Internet technology has advanced significantly over last decade. Now Internet is used not only to check emails or access information. Today’s Internet demands services such as video on demand, grid computing and very high data send rates which are bursty in nature. Current technology is unable to service such high bandwidth demands. Optical Burst Switching (OBS) technology shows huge potential ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملDeterministic End-to-End Delay Guarantees in a Heterogeneous Route Interference Environment
Some of the known results for delivering deterministic bounds on endto-end queuing delay in networks with constant packet sizes and constant link rates rely on the concept of Route Interference. Namely, it is required to know the number of ows joining on any output link in the whole network. In this paper we extend the existing results for the more generic cases of connection-oriented networks ...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999