首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Network Quality of Service (QoS) criteria of interest include conventional metrics such as throughput, delay, loss, and jitter, as well as new QoS criteria based on power utilization, reliability and security. Variable and adaptive routing have again become of interest in networking because of the increasing importance of mobile ad-hoc networks. In this paper we develop a probability model of adaptive routing algorithms which use the expected QoS to select paths in the network. Our objective is not to analyze QoS, but rather to design randomized routing policies which can improve QoS. We define QoS metrics as non-negative random variables associated with network paths which satisfy a sub-additivity condition along each path. We define the QoS of a path, under some routing policy, as the expected value of a non-decreasing measurable function of the QoS metric. We discuss sensitive and insensitive QoS metrics, the latter being dependent on the routing policy which is used. We describe routing policies simply as probabilistic choices among all possible paths from some source to some given destination. Incremental routing policies are defined as those which can be derived from independent decisions taken at certain points (or nodes) along paths. Sensible routing policies are then introduced: they take decisions based simply on the QoS of each available path. Sensible policies, which make decisions based on the QoS of the paths, are introduced. We prove that the routing probability of a sensible policy can always be uniquely obtained. A hierarchy of m-sensible probabilistic routing policies is then introduced. A 0-sensible policy is simply a random choice of routes with equal probability, while a 1-sensible policy selects a path with a probability which is inversely proportional to the (expected) QoS of the path. We prove that an m + 1-sensible policy provides better QoS on the average than an m-sensible policy, if the QoS metric is insensitive. We also show that under certain conditions, the same result also holds for sensitive QoS metrics.Accepted: May 2003, This work was supported by the U.S. Army and Navy under contracts N611339-00-K-0002, N61339-02-C0050, N61339-02-C0080, N61339-02-C0117, and by NSF grants EIA0086251, EIA0203446, ECS0216381.  相似文献   

2.
This paper articulates the logic of computational organizational modeling as a strategy for theory construction and testing in the field of organizational communication networks. The paper introduces, Blanche, and objectoriented simulation environment that supports quantitative modeling and analysis of the evolution of organizational networks. Blanche relies on the conceptual primitives of attributes that describe network nodes and links that connect these nodes. Difference equations are used to model the dynamic properties of the network as it changes over time. This paper describes the design of Blanche and how it supports both the process of theory construction, model building and analysis of results. The paper concludes with an empirical example, to test the predictions of a network-based social influence model for the adoption of a new communication technology in the workplace.  相似文献   

3.
任磊  任明仑 《运筹与管理》2021,30(4):122-127
服务社会网络环境下,云制造服务通过与其他参与同一任务的服务共享与竞争物理设备、信息、知识等资源形成协同效应,对双方实际执行效果具有重要影响,导致出现QoS偏离现象,现有服务选择模型难以适应这一情景。根据服务协同网络特点,本文提出基于QoS协同关联的制造服务组合方法。运用QoS协同关联和协同系数表达资源共享、冲突对QoS的影响程度,构建了新的服务选择优化模型。基于创新Skyline服务对概念,改善了Skyline算法在QoS协同关联条件下的搜索效率和结果,通过智能汽车制造仿真实验,验证了本文模型和算法的有效性。  相似文献   

4.
The complexity of military logistics and force deployment modeling requires the use of advanced computer models for analysis. The last 20 years have not only seen a concerted effort to improve the fidelity of these models, but development to improve their interconnectivity. The area of strategic mobility has received greater interest in the last decade as the U.S. Military has become more reliant on a force projection posture rather than prepositioning its forces outside the continental United States. Strategic mobility describes how forces within the continental U.S. are deployed in support missions outside the continental U.S. This posture combined with the ever shrinking military budget and force size has placed increased emphasis on the capability to efficiently deploy personnel, equipment, and support materiel. Mobility modeling is conducted at various levels of the mobility planning process. The result is a myriad of models addressing different aspects of the process. Current models addressing strategic mobility use aggregate network flow models, one-pass greedy approaches, and simple bounding techniques. This paper presents an overview of these models, their operating characteristics, and their advantages and disadvantages for mobility modeling applications.  相似文献   

5.
A metering scheme is a method by which an audit agency is able to measure the interaction between servers and clients during a certain number of time frames. Naor and Pinkas (Vol. 1403 of LNCS, pp. 576–590) proposed metering schemes where any server is able to compute a proof (i.e., a value to be shown to the audit agency at the end of each time frame), if and only if it has been visited by a number of clients larger than or equal to some threshold h during the time frame. Masucci and Stinson (Vol. 1895 of LNCS, pp. 72–87) showed how to construct a metering scheme realizing any access structure, where the access structure is the family of all subsets of clients which enable a server to compute its proof. They also provided lower bounds on the communication complexity of metering schemes. In this paper we describe a linear algebraic approach to design metering schemes realizing any access structure. Namely, given any access structure, we present a method to construct a metering scheme realizing it from any linear secret sharing scheme with the same access structure. Besides, we prove some properties about the relationship between metering schemes and secret sharing schemes. These properties provide some new bounds on the information distributed to clients and servers in a metering scheme. According to these bounds, the optimality of the metering schemes obtained by our method relies upon the optimality of the linear secret sharing schemes for the given access structure.  相似文献   

6.
A file F is sited at one end (the root) of a path in some network. Each non-root node in the path is able to cache part or all of F, and each node may also have a client wanting to download F. Links between neighbors on the path have given transmission delays associated with them, but the delay from a node to its own client, if it has one, is zero. In the seamless, self-assembly paradigm all clients issue requests simultaneously at time 0, each starts to receive segments of F immediately, and continues to receive them until F is fully downloaded. The process must be implemented by means of a distributed self-assembly protocol which is unaware of network structure beyond links to immediate neighbors. We exhibit such a protocol, and show how to assign segments of F to the node caches in such a way that, no matter which nodes are chosen as clients, seamless self-assembly is realized and, simultaneously, the total cache size achieves a lower bound determined solely by the link delays. The paper concludes with a brief discussion of the many open problems arising in systems requiring seamless, or nearly seamless, self assembly of files.  相似文献   

7.
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowledge of quality of service parameters is needed and, therefore, a complete and robust performance assessment is necessary. This paper deals with a performance evaluation and measurement of a number of heterogeneous end-to-end paths taking into account a wide range of statistics. To study the behavior of QoS parameters, an active measurement approach has been introduced for the analysis of properties we called (i) concise statistics (mean, standard deviation, inter quantile range, minimum, maximum, and median) and (ii) detailed statistics (Probability Density Function, Auto-correlation Function, Entropy, Complementary Cumulative Distribution Function, and Bivariate Probability Density Function). We show how, thanks to this view on QoS statistics, a more complete understanding of QoS parameters behavior is possible. In addition, we show how the measured statistics can be fruitfully used in the context of network control and management. More precisely, we present two proof of concepts regarding frameworks for QoS-based anomaly detection and for QoS-based identification of network elements.  相似文献   

8.
The fluid structure interaction mechanism in vascular dynamics can be described by either 3D or 1D models, depending on the level of detail of the flow and pressure patterns needed for analysis. A successful strategy that has been proposed in the past years is the so-called geometrical multiscale approach, which consists of coupling both 3D and 1D models so as to use the former only in those regions where details of the fluid flow are needed and describe the remaining part of the vascular network by the simplified 1D model.In this paper we review recently proposed strategies to couple the 3D and 1D models, and within the 3D model, to couple the fluid and structure sub-problems. The 3D/1D coupling strategy relies on the imposition of the continuity of flow rate and total normal stress at the interface. On the other hand, the fluid–structure coupling strategy employs Robin transmission conditions. We present some numerical results and show the effectiveness of the new approaches.  相似文献   

9.
In recent social network studies, exponential random graph (ERG) models have been used comprehensively to model global social network structure as a function of their local features. In this study, we describe the ERG models and demonstrate its use in modelling the changing communication network structure at Enron Corporation during the period of its disintegration. We illustrate the modelling on communication networks, and provide a new way of classifying networks and their performance based on the occurrence of their local features. Among several micro-level structures of ERG models, we find significant variation in the appearance of A2P (Alternating k-two-paths) network structure in the communication network during crisis period and non-crisis period. We also notice that the attribute of hierarchical positions of actors (i.e., high rank versus low rank staff) have impact on the evolution process of networks during crisis. These findings could be used in analyzing communication networks of dynamic project groups and their adaptation process during crisis which could lead to an improved understanding how communications network evolve and adapt during crisis.  相似文献   

10.
This paper describes a new and user‐friendly method for constructing models of non‐well‐founded set theory. Given a sufficiently well‐behaved system θ of non‐well‐founded set‐theoretic equations, we describe how to construct a model Mθ for $\mathsf {ZFC}^-$ in which θ has a non‐degenerate solution. We shall prove that this Mθ is the smallest model for $\mathsf {ZFC}^-$ which contains $\mathbf {V}$ and has a non‐degenerate solution of θ.  相似文献   

11.
We consider a generalized version of the rooted connected facility location problem which occurs in planning of telecommunication networks with both survivability and hop-length constraints. Given a set of client nodes, a set of potential facility nodes including one predetermined root facility, a set of optional Steiner nodes, and the set of the potential connections among these nodes, that task is to decide which facilities to open, how to assign the clients to the open facilities, and how to interconnect the open facilities in such a way, that the resulting network contains at least λ edge-disjoint paths, each containing at most H edges, between the root and each open facility and that the total cost for opening facilities and installing connections is minimal. We study two IP models for this problem and present a branch-and-cut algorithm based on Benders decomposition for finding its solution. Finally, we report computational results.  相似文献   

12.
The rapid progress of communications technology has created new opportunities for modeling and optimizing the design of local telecommunication systems. The complexity, diversity, and continuous evolution of these networks pose several modeling challenges. In this paper, we present an overview of the local telephone network environment, and discuss possible modeling approaches. In particular, we (i) discuss the engineering characteristics of the network, and introduce terminology that is commonly used in the communications industry and literature; (ii) describe a general local access network planning model and framework, and motivate different possible modeling assumptions; (iii) summarize various existing planning models in the context of this framework; and (iv) describe some new modeling approaches. The discussion in this paper is directed both to researchers interested in modeling local telecommunications systems and to planners interested in using such models. Our goal is to present relevant aspects of the engineering environment for local access telecommunication networks, and to discuss the relationship between engineering issues and the formulation of economic decision models. We indicate how changes in the underlying switching and transmission technology affect the modeling of the local telephone network. We also review various planning issues and discuss possible optimization approaches for treating them.This research was initiated through a grant from GTE Laboratories, IncorporatedSupported in part by an AT&T research award.Supported in part by Grant No. ECS-8316224 from the Systems Theory and Operations Research Program of the National Science Foundation.  相似文献   

13.
We address the problem of designing efficient algorithms for media-on-demand in systems that use stream merging. In the stream merging model the receiving bandwidth of clients is larger than the playback bandwidth, and clients can buffer parts of the transmission to be played back later. Our goal is to minimize the required server bandwidth for a given guaranteed start-up delay and uninterrupted playback. We construct an efficient O(n) optimal off-line algorithm for a time horizon that is composed of n time slots, where the length of one slot is the guaranteed start-up delay. Our algorithm works for either clients with receiving bandwidth twice as much as the playback bandwidth or for receiving bandwidth equal to the server bandwidth, independent of the clients buffer size. We describe an on-line delay guaranteed algorithm that operates without knowledge of the time horizon size, and show that it performs asymptotically close to the optimal off-line algorithm. The on-line algorithm is simpler to implement than previously proposed on-line stream merging algorithms, and empirically performs well when the intensity of client arrivals is high.  相似文献   

14.
Choices of plays made by theatergoers can be considered as a 2-mode or affiliation network. In this article we illustrate how p? models (an exponential family of distributions for random graphs) can be used to uncover patterns of choices. Based on audience research in three theater institutions in Ghent (Belgium), we analyze the loyalty for an institution, the diversity in audience composition as well as more complex local structural patterns. The results seem to indicate that theater audiences are generally loyal to an institution. However, when controlling for more complex structural patterns, such as the co-attendance of identical plays, the tendency toward mobility across institutions becomes more pronounced. By integrating both attribute-specific patterns and more complex structural patterns in the same model social network analysis offers the possibility to investigate differences in co-attendance, loyalty and audience diversity.  相似文献   

15.
The performance evaluation of wireless networks is severely complicated by the specific features of radio communication, such as highly variable channel conditions, interference issues, and possible hand-offs among base stations. The latter elements have no natural counterparts in wireline scenarios, and create a need for novel performance models that account for the impact of these characteristics on the service rates of users. Motivated by the above issues, we review several models for characterizing the capacity and evaluating the flow-level performance of wireless networks carrying elastic data transfers. We first examine the flow-level performance and stability of a wide family of so-called α-fair channel-aware scheduling strategies. We establish that these disciplines provide maximum stability, and describe how the special case of the Proportional Fair policy gives rise to a Processor-Sharing model with a state-dependent service rate. Next we turn attention to a network of several base stations with inter-cell interference. We derive both necessary and sufficient stability conditions and construct lower and upper bounds for the flow-level performance measures. Lastly we investigate the impact of user mobility that occurs on a slow timescale and causes possible hand-offs of active sessions. We show that the mobility tends to increase the capacity region, both in the case of globally optimal scheduling and local α-fair scheduling. It is additionally demonstrated that the capacity and user throughput improve with lower values of the fairness index α.  相似文献   

16.
The analysis of multivariate time series is a common problem in areas like finance and economics. The classical tools for this purpose are vector autoregressive models. These however are limited to the modeling of linear and symmetric dependence. We propose a novel copula‐based model that allows for the non‐linear and non‐symmetric modeling of serial as well as between‐series dependencies. The model exploits the flexibility of vine copulas, which are built up by bivariate copulas only. We describe statistical inference techniques for the new model and discuss how it can be used for testing Granger causality. Finally, we use the model to investigate inflation effects on industrial production, stock returns and interest rates. In addition, the out‐of‐sample predictive ability is compared with relevant benchmark models. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

17.
It is widely accepted that next-generation networks will provide guaranteed services, in contrast to the “best effort” approach today. We study and analyze queueing policies for network switches that support the QoS (Quality of Service) feature. One realization of the QoS feature is that packets are not necessarily all equal, with some having higher priorities than the others. We model this situation by assigning an intrinsic value to each packet. In this paper we are concerned with three different queueing policies: the nonpreemptive model, the FIFO preemptive model, and the bounded delay model. We concentrate on the situation where the incoming traffic overloads the queue, resulting in packet loss. The objective is to maximize the total value of packets transmitted by the queueing policy. The difficulty lies in the unpredictable nature of the future packet arrivals. We analyze the performance of the online queueing policies via competitive analysis, providing upper and lower bounds for the competitive ratios. We develop practical yet sophisticated online algorithms (queueing policies) for the three queueing models. The algorithms in many cases have provably optimal worst-case bounds. For the nonpreemptive model, we devise an optimal online algorithm for the common 2-value model. We provide a tight logarithmic bound for the general nonpreemptive model. For the FIFO preemptive model, we improve the general lower bound to 1.414, while showing a tight bound of 1.434 for the special case of queue size 2. We prove that the bounded delay model with uniform delay 2 is equivalent to a modified FIFO preemptive model with queue size 2. We then give improved upper and lower bounds on the 2-uniform bounded delay model. We also show an improved lower bound of 1.618 for the 2-variable bounded delay model, matching the previously known upper bound.  相似文献   

18.
Software QoS properties, such as response time, availability, bandwidth requirement, memory usage, among many others, play a major role in the processes of selecting and composing software components. This paper extends a component calculus to deal, in an effective way, with them. The calculus models components as generalised Mealy machines, i.e., state-based entities interacting along their life time through well defined interfaces of observers and actions. QoS is introduced through an algebraic structure specifying the relevant QoS domain and how its values are composed under different disciplines. A major effect of introducing QoS-awareness is that a number of equivalences holding in the plain calculus become refinement laws. The paper also introduces a prototyper for the calculus developed as a ‘proof-of-concept’ implementation.  相似文献   

19.
We introduce the Conditional Mean Value Analysis (CMVA) algorithm, an exact solution method for product-form load-dependent closed queueing networks that provides a numerically stable solution of models where the load-dependent Mean Value Analysis (MVA) is numerically unstable. Similarly to the MVA algorithm for constant-rate queues, CMVA performs operations in terms of mean quantities only, i.e., queue-lengths, throughput, response times. Numerical stability derives from a new version of the MVA arrival theorem for load-dependent models which is expressed in terms of mean queue-lengths instead of marginal probabilities. The formula is obtained by the analysis of the conditional state spaces which describe network equilibrium as seen by jobs during their residence times at queues. We also provide a generalization of CMVA to multiclass models that preserves the numerical stability property.  相似文献   

20.
This paper introduces a novel vertical handoff decision scheme. The objective is to provide users with enhanced quality of service (QoS) and maximize the network revenue. This scheme balances both-side interests via a suitably defined network merit function and a user–operator negotiation model. The merit function evaluates network performance based on user preferences and decides the most appropriate network for users. The negotiation model is defined as a semi-Markov decision process (SMDP). An optimal policy that maximizes the network revenue without violating QoS constraints is found by resolving the SMDP problem using Q-learning. Furthermore, a time-adaptive QoS monitoring mechanism is combined with the merit function in order to decrease the power consumption on terminal interface activation. The simulation results demonstrate that the proposed vertical handoff decision scheme enhances the performance in terms of power consumption, handoff call-dropping probability (HCDP) and network revenue.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号