On the Tightness of an Optimization-Based Delay Bounding Method for Packet-Oriented Networks under Blind Multiplexing
نویسندگان
چکیده
Communication networks supporting real-time tasks need to guarantee timely delivery of critical data and commands. Worst-case delay performance of these networks can be analyzed using deterministic network calculus. In this report, we identify the discrepancy between existing bit-oriented delay bounding methods and packet-oriented behaviors of network devices. An optimization-based bit-oriented delay bounding method is then augmented for the more realistic packet-oriented settings. An example network is used to demonstrate how to formulate a packetoriented delay bounding problem using theorems for packet-based network devices. Finally, we show that the delay bounds obtained for the example packet-oriented network are theoretically tight under all possible network configurations.
منابع مشابه
Delay Bounds under Arbitrary Multiplexing?
Network calculus has proven as a valuable and versatile methodology for worstcase analysis of communication networks. One issue in which it is still lacking is the treatment of aggregate multiplexing, in particular if the FIFO property cannot be assumed when ows are merged. In this report, we address the problem of bounding the delay of individual tra c ows in feed-forward networks under arbitr...
متن کاملOptimal Coding Subgraph Selection under Survivability Constraint
Nowadays communication networks have become an essential and inevitable part of human life. Hence, there is an ever-increasing need for expanding bandwidth, decreasing delay and data transfer costs. These needs necessitate the efficient use of network facilities. Network coding is a new paradigm that allows the intermediate nodes in a network to create new packets by combining the packets recei...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملThe Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملA New Method based on Intelligent Water Drops for Multicast Routing in Wireless Mesh Networks
In recent years a new type of wireless networks named wireless mesh networks has drawn the attention of researchers. In order to increase the capacity of mesh network, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi channel wireless mesh networks. Therefore, the main challenge of these networks is how to properly assign the channels to the radios. O...
متن کامل