March 2008
Systems Science;2008, Vol. 34 Issue 1, p59
Academic Journal
In this paper, the congestion control problem in a multi-source connection-oriented network is addressed. The network considered employs control units, generated by each source once every M data packets, to deliver feedback information used to regulate the transfer speed of the sources. Since the sources adjust the transmission rate only upon the control unit arrival, the interval between successive rate modifications is input dependent and varies with time. A new, nonlinear strategy effectively combining the Smith principle with the proportional controller with saturation is proposed. Conditions for no data loss and full bottleneck link bandwidth utilization are presented and strictly proved with explicit consideration of the aperiodic feedback information availability. Moreover. since the controller saturation limits are fully adjustable, the algorithm performance may be easily tuned according to the existing system resources. Special attention is given to the analysis of the algorithm robustness with respect to imprecise delay time estimation, and it is shown that all of the favorable properties of the proposed scheme are preserved, even though the propagation delays are estimated by the controller with decreased accuracy.


Related Articles

  • Choice of source states for compression of tomograms. Sushko, D. // Journal of Communications Technology & Electronics;Jun2011, Vol. 56 Issue 6, p716 

    n algorithm for finding the thresholds determining the set of the source states in a method for compression of tomograms is proposed. The algorithm presumes successive solving of one-dimensional extremum problems and its implementation in the process of compression does not lead to large time...

  • Coded Mark Inversion.  // Network Dictionary;2007, p106 

    An encyclopedia entry for "Coded Mark Inversion (CMI)" is presented. In telecommunication, this term refers to an encoding algorithm specified for STS-3c transmissions and DS-1 systems which doubles the data rate. A zero is sent as a low-to-high transition, while one may be sent as one or zero...

  • A New Method for Security Isolation and Data Transfer. Xu Xian Cheng; Yuan Chuan You // Applied Mechanics & Materials;2014, Vol. 701/702, p902 

    This paper presents both physical and logical methods that are completely one-way transmission without feedback. The imposed hardware isolation is achieved based on the light transmission property with low cost optic components, while the efficiency and accuracy of data transmission is...

  • Performance Analysis and Improvement of WPAN MAC for Home Networks. Mehta, Saurabh; Kyung Sup Kwak // Sensors (14248220);2010, Vol. 10 Issue 4, p2821 

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for...

  • Dynamic distributed unicast routing: optimal incremental paths. Heydarian, Mohsen // Journal of Supercomputing;Apr2014, Vol. 68 Issue 1, p214 

    Developing new mathematical frameworks such as distributed dynamic routing algorithms for constructing optimal incremental paths from a node to another node is an important challenge in data communication networks. These new algorithms can model network resources optimally and increase network...

  • On improving the Fast Mode Decision of the Enhancement Layer in Scalable Video Coding extension of H.264/AVC. Sangwoo Lee; Sang Ju Park // International Journal of Control & Automation;Sep2012, Vol. 5 Issue 3, p207 

    Scalable video coding (SVC) is an extension of H.264/MPEG 4 AVC approved by JVT on November, 2007. The characteristic of the SVC is the encoding of a high-quality video bitstream that contains one or more enhancement layer bitstreams in addition to the base layer bitstream. We propose a fast...

  • WITNESS BASED AND VOTING BASED DATA FUSION ASSURANCE MECHANISM IN SENSOR NETWORKS. Umashankar, M.; Chandrasekar, C. // International Journal of Research & Reviews in Applied Sciences;2010, Vol. 4 Issue 2, p194 

    Security is a very important issue when designing or deploying any network or protocol. The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. One or several sensors then collect the detection results from other sensors. The collected...

  • Bit Rate Optimization with MMSE Detector for Multicast LP-OFDM Systems. Maiga, Ali; Baudais, Jean-Yves; Hélard, Jean-François // Journal of Electrical & Computer Engineering;2012, p1 

    We propose a new resource allocation algorithm with minimum mean square error (MMSE) detector formulticast linear precoded orthogonal frequency division multiplexing (LP-OFDM) systems. To increase the total multicast bit rate, this algorithm jointly uses the LP-OFDM modulation technique and an...

  • Computational aspects of optimal schedules with power control and multiple bitrates selection in multihop wireless networks. Peng Wang; Bohacek, Stephan // Wireless Networks (10220038);Aug2010, Vol. 16 Issue 6, p1639 

    significant amount of research on optimal scheduling has focused on the case where links can transmit with only a single bit-rate and a single transmission power. This paper develops techniques to accommodate multiple bit-rates and multiple transmission powers as well as a continuum of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics