Flow Control of Real-time Multimedia Applications in Best-effort Networks

Author(s):  
Aninda Bhattacharya ◽  
Alexander G. Parlos
Author(s):  
Sunghoon Kim ◽  
Monica Menendez ◽  
Hwasoo Yeo

Perimeter control is used to regulate transfer flows between urban regions. The greedy control (GC) method takes either the minimum or the maximum for the control inputs. Although it has the advantage of simplicity for real-time feasibility, a few existing studies have shown that it can sometimes have negative impacts because of unnecessary transfer flow restrictions. To reduce unnecessary restrictions, this study provides a method that gives flexibility to ease the strict conditions of the conventional GC. First, we propose a modification as a way of granting exceptions to the flow restriction under specific conditions. Second, we develop an algorithm to determine the threshold dynamically for accepting the exception, by comparing the possible outflow loss of the subject region and the possible outflow gain of its neighboring regions. The test results show that this flexible greedy control can handle the balance between the transfer demands and the greed of regions for securing the supply level, while increasing the performance in both vehicle hours traveled and trip completion.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1881
Author(s):  
Jesús Lázaro ◽  
Armando Astarloa ◽  
Mikel Rodríguez ◽  
Unai Bidarte ◽  
Jaime Jiménez

Since the 1990s, the digitalization process has transformed the communication infrastructure within the electrical grid: proprietary infrastructures and protocols have been replaced by the IEC 61850 approach, which realizes interoperability among vendors. Furthermore, the latest networking solutions merge operational technologies (OTs) and informational technology (IT) traffics in the same media, such as time-sensitive networking (TSN)—standard, interoperable, deterministic, and Ethernet-based. It merges OT and IT worlds by defining three basic traffic types: scheduled, best-effort, and reserved traffic. However, TSN demands security against potential new cyberattacks, primarily, to protect real-time critical messages. Consequently, security in the smart grid has turned into a hot topic under regulation, standardization, and business. This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to time-sensitive networking.


2020 ◽  
pp. 1-10
Author(s):  
M. Eulogi ◽  
S. Ostojin ◽  
P. Skipworth ◽  
J. D. Shucksmith ◽  
A. Schellart

2015 ◽  
Vol 22 (4) ◽  
pp. 14-28 ◽  
Author(s):  
Jingxi Xu ◽  
Benjamin W. Wah

2008 ◽  
Vol 2008 ◽  
pp. 1-15 ◽  
Author(s):  
Andrea Acquaviva ◽  
Andrea Alimonda ◽  
Salvatore Carta ◽  
Michele Pittau

1995 ◽  
Vol 13 (4) ◽  
pp. 749-763 ◽  
Author(s):  
A. Guha ◽  
A. Pavan ◽  
J. Liu ◽  
A. Rastogi ◽  
T. Steeves

2002 ◽  
Vol 25 (13) ◽  
pp. 1230-1242 ◽  
Author(s):  
Yeali S. Sun ◽  
Fu-Ming Tsou ◽  
Meng Chang Chen

Sign in / Sign up

Export Citation Format

Share Document