Tandem Communication Network Model with DBA having Non Homogeneous Poisson arrivals and Feedback for First Node
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9
Abstract
In this paper, we develop a two node tandem communication network model with dynamic bandwidth allocation and feedback for the first node. In most of the communication systems, the arrivals of packets follow Non-Homogeneous and arrival rate is time dependent. In this model, the transmission rate of each transmitter depends on the number of packets in the buffer connected it. The transmission rates at each transmitter are adjusted depending upon the content of the buffer connected to it. The packets transmitted through the first transmitter may be forwarded to the buffer connected to the second transmitter or returned back to the first buffer with certain probabilities. Using the difference-differential equations the performance measures including average number of packets in each buffer, the probability of emptiness of the network, the average waiting time in the buffer and in the network, the throughput of the transmitters, and the variance of the number of packets in the buffer are calculated. It is observed that the load dependent transmission can reduce the delays in the transmission and enhance the channel capacity.Â
Authors and Affiliations
CH V Raghavendran, G. Naga Satish, M. V. Rama Sundari, P. Suresh Varma
ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION
In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...
Stability Aware Routing in Mobile Ad-Hoc Networks using multiple Route
Previous work on routing in MANETs has resulted innumerous routing protocols that aim at satisfying constraints such asminimum hop or low energy. Existing routing protocols often fail todiscover stable routes between sou...
Noncommutative analogue of Diffie-Hellman protocol in matrix ring over the residue ring
Abstract. Classical Diffie-Hellman protocol of the key establishment was the basis of the development of several key exchange protocols. But this protocol is not secure and it is not protected against the “man in the m...
Image Segmentation Using Signed Pressure Force Based Active Contour Model
A novel signed pressure force (SPF) based active contour model (ACM) is proposed in this work. It is implemented with help of Gaussian filtering regularized level set method, which first selectively penalizes the level s...
ENHANCED CBIR MECHANISM USING STEERABLE PYRAMID AND MEDIAN VECTOR ALGORITHM
Recently, digital content has become a significant and inevitable asset of or any enterprise and the need for visual content management is on the rise as well. Content-based image retrieval has attracted voluminous resea...