scholarly journals The effect of network topology on credit network throughput

2021 ◽  
Vol 151 ◽  
pp. 102235
Author(s):  
Vibhaalakshmi Sivaraman ◽  
Weizhao Tang ◽  
Shaileshh Bojja Venkatakrishnan ◽  
Giulia Fanti ◽  
Mohammad Alizadeh
2017 ◽  
Vol 51 (4) ◽  
pp. 847-864 ◽  
Author(s):  
Ohsung Kwon ◽  
Sung-guan Yun ◽  
Seung Hun Han ◽  
Yang Hon Chung ◽  
Duk Hee Lee

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xin Wang ◽  
Zhijun Shang ◽  
Changqing Xia ◽  
Shijie Cui ◽  
Shuai Shao

With the high-speed development of network technology, time-sensitive networks (TSNs) are experiencing a phase of significant traffic growth. At the same time, they have to ensure that highly critical time-sensitive information can be transmitted in a timely and accurate manner. In the future, TSNs will have to further improve network throughput to meet the increasing traffic demand based on the guaranteed transmission delay. Therefore, an efficient route scheduling scheme is necessary to achieve network load balance and improve network throughput. A time-sensitive software-defined network (TSSDN) can address the highly distributed industrial Internet network infrastructure, which cannot be accomplished by traditional industrial communication technologies, and it can achieve distributed intelligent dynamic route scheduling of the network through global network monitoring. The prerequisite for intelligent dynamic scheduling is that the queue length of future switches can be accurately predicted so that dynamic route planning for flow can be performed based on the prediction results. To address the queue length prediction problem, we propose a TSN switch queue length prediction model based on the TSSDN architecture. The prediction process has three steps: network topology dimension reduction, feature selection, and training prediction. The principal component analysis (PCA) algorithm is used to reduce the dimensionality of the network topology to eliminate unnecessary redundancy and overlap of relevant information. Feature selection requires comprehensive consideration of the influencing factors that affect the switch queue length, such as time and network topology. The training prediction is performed with the help of our enhanced long short-term memory (LSTM) network. The input-output structure of the network is changed based on the extracted features to improve the prediction accuracy, thus predicting the network congestion caused by bursty traffic. Finally, the results of the simulation demonstrate that our proposed TSN switch queue length prediction model based on the improved LSTM network algorithm doubles the prediction accuracy compared to the original model because it considers more influencing factors as features in the neural network for training and learning.


Author(s):  
Lisheng Huang ◽  
Mingyong Yin ◽  
Changchun Li ◽  
Xin Wang

Author(s):  
K. Maystrenko ◽  
A. Budilov ◽  
D. Afanasev

Goal. Identify trends and prospects for the development of radar in terms of the use of convolutional neural networks for target detection. Materials and methods. Analysis of relevant printed materials related to the subject areas of radar and convolutional neural networks. Results. The transition to convolutional neural networks in the field of radar is considered. A review of papers on the use of convolutional neural networks in pattern recognition problems, in particular, in the radar problem, is carried out. Hardware costs for the implementation of convolutional neural networks are analyzed. Conclusion. The conclusion is made about the need to create a methodology for selecting a network topology depending on the parameters of the radar task.


2019 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>We have thoroughly studied the paper of Perazzo et al., which presents a routing attack named DIO suppression attack with its impact analysis. However, the considered simulation grid of size 20mx20m does not correspond to the results presented in their paper. We believe that the incorrect simulation detail needs to be rectified further for the scientific correctness of the results. In this comment, it is shown that the suppression attack on such small sized network topology does not have any major impact on routing performance, and specific reason is discussed for such behavior.</div>


Sign in / Sign up

Export Citation Format

Share Document