ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 2
Abstract
This paper presents an overview of the optical burst switching (OBS) and discusses the major components. In OBS, the length of the burst arriving at a particular node is unknown, and hence, node design is very complex. In OBS first control, packet is transmitted and reserve the path as in circuit switching, thereafter, the data bursts is transmitted. In this paper, a poisson arrival of packets is considered and estimation is made on the size of the burst length. The results presented in the paper clearly reveal that, the very large burst length is un-common. Therefore, most of the times, very short or average length burst is expected. Therefore it is concluded in this paper, buffering of burst at the contending nodes is a good option which increases the throughput and reduces the average delay. Finally, the buffering in conjunction with deflection of bursts will provide very effective solution.
Authors and Affiliations
Pallavi S. , M. Lakshmi
Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network
This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, usin...
Solving Scheduling problems using Selective Breeding Algorithm and Hybrid Algorithm
The n-job, m-machine scheduling problem is one of the general scheduling problems in a system. Scheduling problems vary widely according to specific production tasks but most are NP-hard problems. Scheduling problems are...
MODELING ORDINARY DIFFERENTIAL EQUATIONS IN MATLAB SIMULINK ®
Ordinary differential equations (ODEs) play a vital role in engineering problems. They are used to model continuous dynamical systems as initial and boundary value problems. There are several analytical and numerical met...
A Technique to improve Security of Data in Multilevel Trust
The Privacy Preserving Data Mining technique that is used widely to conserve security of data is a random perturbation method. The original data is modified and many copies are created according to the trust levels in ea...
SERVICE-ORIENTED CLOUD ARCHITECTURE SCHEMA TO BRIDGE GAP BETWEEN STUDENT, STAFF AND ACADEMIA
Cloud Computing is a new resource platform that offers abundant amount of services for organizations to meet furthermore satisfies the needs without huge and prior investment. When it comes to the development of a cloud,...