Tandem Communication Network Model with DBA having Non Homogeneous Poisson arrivals and Feedback for First Node
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9
Abstract
In this paper, we develop a two node tandem communication network model with dynamic bandwidth allocation and feedback for the first node. In most of the communication systems, the arrivals of packets follow Non-Homogeneous and arrival rate is time dependent. In this model, the transmission rate of each transmitter depends on the number of packets in the buffer connected it. The transmission rates at each transmitter are adjusted depending upon the content of the buffer connected to it. The packets transmitted through the first transmitter may be forwarded to the buffer connected to the second transmitter or returned back to the first buffer with certain probabilities. Using the difference-differential equations the performance measures including average number of packets in each buffer, the probability of emptiness of the network, the average waiting time in the buffer and in the network, the throughput of the transmitters, and the variance of the number of packets in the buffer are calculated. It is observed that the load dependent transmission can reduce the delays in the transmission and enhance the channel capacity.Â
Authors and Affiliations
CH V Raghavendran, G. Naga Satish, M. V. Rama Sundari, P. Suresh Varma
An Instance Selection Algorithm Based On Reverse k Nearest Neighbor
Classification is one of the most important data mining techniques. It belongs to supervised learning. The objective of classification is to assign class label to unlabelled data. As data is growing rapidly, handling it...
Fault Tolerant Event Detection in Distributed WSN via Pivotal Messaging
To mitigate the problem of loosing data, which can be very crucial to prevent environmental disasters, we proposed a fault tolerant event detection algorithm in a distributed environment. We considered the data loss bec...
Performance Analysis of Malicious nodes on Multi hop Cellular Networks
The existence of malicious nodes in multi hop cellular networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. In this p...
Multi-Agent System Overview: Architectural Designing using Practical Approach
A software agent should be autonomous, flexible, robust and social. The increasing importance of the Multi-Agent System (MAS) has led to the greater availability of tools designed to facilitate their creation and use. To...
A REVIEW ON A SECURITY MECHANISM IN CLOUD ENVIRONMENT
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. As information exchange plays an important rol...