Performance of Transport Connection with Selective Failure Mode When Competing for Throughput of Data Transmission Path

Author(s):  
Pavel Mikheev ◽  
Pavel Pristupa ◽  
Sergey Suschenko
2020 ◽  
Vol 19 (4) ◽  
pp. 330
Author(s):  
Lei Yan ◽  
Zhengshang Yan ◽  
Zhifang He ◽  
Xiuli Zhang ◽  
Xincong Shi ◽  
...  

2017 ◽  
Vol 13 (04) ◽  
pp. 45 ◽  
Author(s):  
Liping LV

<p class="0abstract"><span lang="EN-US">Wireless sensor network is a new field of computer science and technology research. It has a very broad application prospects. In order to improve the network survival time, it is very important to design efficient energy-constrained routing protocols. In this paper, we studied the characteristics of wireless sensor networks, and analyzed the design criteria of sensor network routing algorithms. In view of the shortcomings of traditional algorithms, we proposed an energy-aware multi-path algorithm. When selecting a data transmission path, the energy-aware multi-path algorithm can avoid nodes with low energy levels. At the same time, it takes the remaining energy of the node and the number of hops as one of the measures of the path selection. The multi-path routing algorithm realized the low energy consumption of the data transmission path, thus effectively prolonging the network lifetime. Compared with the traditional algorithm, the results show that our method has high reliability and energy efficiency.</span></p>


2014 ◽  
Vol 651-653 ◽  
pp. 1741-1747
Author(s):  
Xiao Lin Zhao ◽  
Gang Hao ◽  
Chang Zhen Hu ◽  
Zhi Qiang Li

With the increasing scale of software system, the interaction between software elements becomes more and more complex, which lead to the increased dirty data in running software system. This may reduce the system performance and cause system collapse. In this paper, we proposed a discovery method of the dirty data transmission path based on complex network. Firstly, the binary file is decompiled and the function call graph is drawn by using the source code. Then the software structure is described as a weighted directed graph based on the knowledge of complex network. In addition, the dirty data node is marked by using the power-law distribution characteristics of the scale-free network construction of complex network chart. Finally, we found the dirty data transmission path during software running process. The experimental results show the transmission path of dirty data is accurate, which confirmed the feasibility of the method.


2020 ◽  
Vol 19 (4) ◽  
pp. 330
Author(s):  
Lei Yan ◽  
Zhengshang Yan ◽  
Zhifang He ◽  
Xiuli Zhang ◽  
Xincong Shi ◽  
...  

Open Physics ◽  
2017 ◽  
Vol 15 (1) ◽  
pp. 501-508 ◽  
Author(s):  
Wei Gao ◽  
Li Liang ◽  
Tianwei Xu ◽  
Jianhou Gan

AbstractIn normal computer networks, the data transmission between two sites go through the shortest path between two corresponding vertices. However, in the setting of software definition network (SDN), it should monitor the network traffic flow in each site and channel timely, and the data transmission path between two sites in SDN should consider the congestion in current networks. Hence, the difference of available data transmission theory between normal computer network and software definition network is that we should consider the prohibit graph structures in SDN, and these forbidden subgraphs represent the sites and channels in which data can’t be passed by the serious congestion. Inspired by theoretical analysis of an available data transmission in SDN, we consider some computational problems from the perspective of the graph theory. Several results determined in the paper imply the sufficient conditions of data transmission in SDN in the various graph settings.


1994 ◽  
Vol 77 (3) ◽  
pp. 789-793
Author(s):  
Engelbert Ziegler ◽  
Horst Lenk

Abstract Possible sources of data corruption at the data capture stage include errors from the analogue input signal to be sampled, incorrect timing of the realtime sampling, loss of data on the data transmission path, and malfunctions of hardware and software components. Hardware and software measures to avoid such errors and provisions to adhere to good laboratory practice rules are discussed.


Sign in / Sign up

Export Citation Format

Share Document