Results 1 - 10
of
5,203
Exact admission control in networks with bounded delay services
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1996
"... To support the requirements for the transmission of continuous media, such as audio and video, multiservice packet switching networks must provide service guarantees to connections, including guarantees on throughput, network delays, and network delay variations. For the most demanding applications, ..."
Abstract
-
Cited by 175 (19 self)
- Add to MetaCart
, the network must offer a service which can provide deterministic guarantees for the maximum delay ofpackets from all connections, referred to as bounded delay service. The admission control functions in a network with a bounded delay service must have available schedulability conditions that detect violations
Contention Resolution with Bounded Delay
- In Proc. FOCS'95, IEEE Computer
"... When distributed processes contend for a shared resource, we need a good distributed contention resolution protocol, e.g., for multiple-access channels (ALOHA, Ethernet), PRAM emulation, and optical routing. Under a stochastic model of request generation from n synchronous processes, Raghavan & ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
; Upfal have shown a protocol which is stable for a positive request rate; their main result is that for every resource request, its expected delay (time to get serviced) is O(log n). Assuming that the initial clock times of the processes are within a known bound of each other, we present a stable
Survivable Networks with Bounded Delay
, 1999
"... We investigate new classes of graphs which guarantee constant delays even in the case of multiple edge failures. This means the following: as long as two vertices remain connected if some edges have failed, then the distance between these vertices in the faulty graph is at most a constant factor k t ..."
Abstract
- Add to MetaCart
We investigate new classes of graphs which guarantee constant delays even in the case of multiple edge failures. This means the following: as long as two vertices remain connected if some edges have failed, then the distance between these vertices in the faulty graph is at most a constant factor k
Bounding Delays in Packet-Routing Networks
- In Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing
, 1995
"... Consider the problem of computing the average packet delay in a general dynamic packet-routing network with Poisson input stream, during steady-state. Any packet-routing network can be formulated as a queueing network, where each server has a constant service time. If each server had exponentially-d ..."
Abstract
-
Cited by 27 (1 self)
- Add to MetaCart
-distributed service time, queueing theory techniques could be used to determine the expected packet delay. However, it is not known how to compute the average packet delay for all but the simplest networks with constant time servers. It has been conjectured that to get an upper bound on expected packet delay
Bounded Delay for Weighted Round Robin
"... Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation : : : : : : : : : : 2 1.2 System Configuration and Assumptions : : : : : : : : : : : : : 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler : : : : : : 6 2.1.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation : : : : : : : : : : 2 1.2 System Configuration and Assumptions : : : : : : : : : : : : : 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler : : : : : : 6 2.1.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 6 2.1.2 Validation by Simulation : : : : : : : : : : : : : : : : : 12 2.2 Sliding Window Shaper and Distributed WRR Scheduler : : : : : 18 2.2.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 18 2.2.2 Validation by Simulation : : : : : : : : : : : : : : : : : 19 2.3 Leaky Bucket Shaper and Block WRR Scheduler : : : : : : : : : 21 2.3.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 21 2.3.2 Validation by Simulation : : : : : : :
Bounded Delay with High Efficiency in Multihop Wireless Networks
"... Jahromizadeh, Soroush (2013). Join rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. (Unpublished Doctoral thesis, City University London) ..."
Abstract
- Add to MetaCart
Jahromizadeh, Soroush (2013). Join rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. (Unpublished Doctoral thesis, City University London)
Bounded Delay Scheduling with Packet Dependencies
"... Abstract—A common situation occurring when dealing with multimedia traffic is having large data frames fragmented into smaller IP packets, and having these packets sent independently through the network. For real-time multimedia traffic, dropping even few packets of a frame may render the entire fra ..."
Abstract
- Add to MetaCart
, and are derived from stringent delay constraints posed by the application. The figure of merit in such environments is maximizing the system’s goodput, namely, the number of frames successfully delivered. We study online algorithms for the problem of maximizing goodput of delay-bounded traffic with inter
Bounded Delay for Weighted Round Robin
, 1995
"... Contents 1 Introduction 2 2 Description of Burst Crediting 2 3 Results 10 3.1 Maximum Delay for Bursty Sources :::::::::::::::: 10 3.1.1 Sliding Window Shaper :::::::::::::::::: 10 3.1.2 Leaky Bucket Shaper ::::::::::::::::::: 17 3.2 Maximum Delay for Nonbursty Sources :::::::::::::: 22 3.2.1 Slidi ..."
Abstract
- Add to MetaCart
Contents 1 Introduction 2 2 Description of Burst Crediting 2 3 Results 10 3.1 Maximum Delay for Bursty Sources :::::::::::::::: 10 3.1.1 Sliding Window Shaper :::::::::::::::::: 10 3.1.2 Leaky Bucket Shaper ::::::::::::::::::: 17 3.2 Maximum Delay for Nonbursty Sources :::::::::::::: 22 3
Bounded Delay for Weighted Round Robin
, 1995
"... Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation :::::::::: 2 1.2 System Configuration and Assumptions ::::::::::::: 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler :::::: 6 2.1.1 Analysis :::::::::::::::::::::::::: 6 2.1.2 Validation by Simulation :::::::::::: ..."
Abstract
- Add to MetaCart
::::::::::::::::: 25 2.4 Leaky Bucket Shaper and Distributed WRR Scheduling :::::: 29 2.4.1 Analysis :::::::::::::::::::::::::: 29 2.4.2 Validation by Simulation ::::::::::::::::: 33 1 Introduction Average delay is a common measurement in determining whether or not telecommunication network customers are getting
Verification of Bounded Delay Asynchronous Circuits with Timed Traces
- LNCS 1548 AMAST’98
, 1998
"... In this paper, we extend the verification method based on the failure semantics of process algebra and the resulting trace theory by Dill et al. for bounded delay asynchronous circuits. We define a timed conformance relation between trace structures which allows to express both safety and respon ..."
Abstract
-
Cited by 7 (5 self)
- Add to MetaCart
In this paper, we extend the verification method based on the failure semantics of process algebra and the resulting trace theory by Dill et al. for bounded delay asynchronous circuits. We define a timed conformance relation between trace structures which allows to express both safety
Results 1 - 10
of
5,203