transmission delay
Recently Published Documents


TOTAL DOCUMENTS

399
(FIVE YEARS 100)

H-INDEX

22
(FIVE YEARS 5)

2021 ◽  
Vol 4 ◽  
pp. 44-47
Author(s):  
Andrew Alexeev ◽  
Rinata Sinitsyna

A couple of decades ago, data rates on the network were measured in kilobytes per second, and even then, online game developers had some problems with the packet loss and transmission delays. Now the transfer rate is hundreds of times higher, and the problem of delay compensation is even more relevant.For many dynamic online games, a transmission delay of as little as 20 ms can be quite noticeable, negatively affecting the gameplay and emotions of the game, which can repel players.The problem is exacerbated by the fact that along with the need to compensate for the time of delivery of packets, on the client side there are other non-network factors that are beyond the control of developers, which make the total delay 5-10 ms longer. Because of this, the desire to get rid of network delays as much and as well as possible becomes a necessity, and developers are forced to look for optimal ways to solve this problem.The problem statement is as follows: to review the causes of delays in online games and possible solu- tions, as well as the advantages and disadvantages of certain approaches. The problem is considered at the 4 levels of the TCP / IP network model, as well as at the application level. The approaches are given for the most commonly used protocols for each layer, but basic ideas can be easily transferred to other implementations.The main causes of delays under consideration: propagation delay, router queue delay, transmission delay, and processing delays.This article shows the impact of network delays on the online games and the ways to compensate for them, along with the theory of data transmission protocols in the network and the ways to solve the problems that arise in the development of algorithms.Recommendations for solving the compensation problem can be taken into account when designing and launching online shooters, strategies, etc. Thanks to the given receptions it is possible to minimize the general delay on the transfer of packets in a network, thanks to which the game on the client looks as if the player plays in the Single Player mode.


2021 ◽  
Vol 2138 (1) ◽  
pp. 012010
Author(s):  
Xiaobei Xu ◽  
Huaju Song ◽  
Kai Zhang ◽  
Liwen Chen ◽  
Yuwen Qian

Abstract To resolve the communication overhead problem of anonymous users, we propose a location privacy protection method based on the cache technology. In particular, we first place the cache center on edge server nodes to reduce interaction between servers and users. In this way, the risk of privacy leaks can be reduced. Furthermore, to improve the caching hit rate, a prediction system based on Markov chain is designed to protect the trajectory privacy of mobile users. Simulations show that the algorithm can protect the privacy of users and reduce the transmission delay.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jie Huang ◽  
Xiaowen Wang ◽  
Wei Wang ◽  
Zhenyu Duan

With the development of IoT (Internet of Things), the demand for security is increasing day by day. However, the traditional key distribution scheme is high in cost and complicated in calculation, so a lightweight key distribution scheme is urgently needed. In this paper, a novel key distribution scheme based on transmission delay is proposed. Based on the experimental observation, we find that the statistical characteristics of their transmission delays are about the same if any two terminals transmit the equal-length packets on the Internet and are different for different transmission paths. Accordingly, we propose a method to customize transmission delays. On the Internet, we have deployed 7 forwarding hosts. By randomly determining the forwarding path of packets, we can get customized transmission delay sets. Then, these sets are processed, respectively, by correcting outlier, normalizing, quantizing, encoding, and reconciling so as to be able to realize key distribution between two sides. Next, we design a key distribution protocol and a key distribution system, which consists of a Management Center, a Packet Forwarding Network, and Users. Finally, we reason the security of the key distribution protocol with formal analysis tools.


Machines ◽  
2021 ◽  
Vol 9 (12) ◽  
pp. 318
Author(s):  
Liuquan Wang ◽  
Qiang Liu ◽  
Chenxin Zang ◽  
Sanying Zhu ◽  
Chaoyang Gan ◽  
...  

With commercial application of 5G networks, many researchers have started paying attention to real-time control in 5G networks. This paper focuses on dual auto guided vehicles collaborative transport scenarios and designs a formation control system in current commercial 5G networks. Firstly, the structure of the 5G network researched in this paper is introduced. Then the round-trip time of 5G networks is measured and analyzed. The result shows that although the 5G round-trip time has randomness, it is mainly concentrated in 19 ± 3 ms, and the jitter mainly in 0 ± 3 ms. The Kalman filter is applied to estimate the transmission delay and experiment result shows the effectiveness of the estimation. Furthermore, the total delay including transmission delay and execution delay in control system is discussed. After establishing the AGV kinematic and formation model, complete control system based on compensation method is proposed. Finally, an experiment is carried out. Compared to the result without formation control, maximum distance error is reduced by 82.61% on average, while maximum angle error 45.91% on average. The result shows the effectiveness of the control system in formation maintaining in 5G network.


2021 ◽  
Author(s):  
Sepehr Asvadi ◽  
Farid Ashtiani

<p>In this paper, we concentrate on the peak age of information (PAoI) in a discrete-time slotted ALOHA network comprised of <i>M</i> buffer-less nodes, capable of keeping just one packet at each time. In this network, whenever some nodes transmit their packets simultaneously, a collision happens, thus there is interaction among queues and transmission delay of a packet might prolong more than one slot. The packets are generated at each node stochastically and independently. The nodes follow preemptive queueing policy. In this network, we propose a new trellis-based analytical model to represent the interaction among queues and derive exact average PAoI in closed form. Furthermore, we find average PAoI-constrained regions and minimize average PAoI for a symmetric network, numerically. As a byproduct of our analysis, the achievable throughput region of two slotted ALOHA networks with unlimited buffer and buffer-less nodes are compared. We observe that the latter is superior not only in AoI, but also in achievable throughput region. Simulation results confirm our analysis.</p>


2021 ◽  
Author(s):  
Sepehr Asvadi ◽  
Farid Ashtiani

<p>In this paper, we concentrate on the peak age of information (PAoI) in a discrete-time slotted ALOHA network comprised of <i>M</i> buffer-less nodes, capable of keeping just one packet at each time. In this network, whenever some nodes transmit their packets simultaneously, a collision happens, thus there is interaction among queues and transmission delay of a packet might prolong more than one slot. The packets are generated at each node stochastically and independently. The nodes follow preemptive queueing policy. In this network, we propose a new trellis-based analytical model to represent the interaction among queues and derive exact average PAoI in closed form. Furthermore, we find average PAoI-constrained regions and minimize average PAoI for a symmetric network, numerically. As a byproduct of our analysis, the achievable throughput region of two slotted ALOHA networks with unlimited buffer and buffer-less nodes are compared. We observe that the latter is superior not only in AoI, but also in achievable throughput region. Simulation results confirm our analysis.</p>


2021 ◽  
pp. 1-14
Author(s):  
Wei Shu ◽  
Dajiang He ◽  
Jun Shu

In order to overcome the problems of low channel utilization, low transmission success rate and high data transmission delay in current gateway node reconfiguration methods of IOT, this paper proposes a novel gateway node reconfiguration method of IOT based on hierarchical coding particle swarm optimization. Based on the IOT network model, this paper analyzes the delay characteristics of the IOT, and constructs the object function of the gateway node reconfiguration of IOT. By monotone decreasing inertia weight strategy, the coding particle swarm optimization is optimized, and the reconfiguration objective function of the gateway node of IOT by using the optimized particle swarm optimization algorithm is solved. Experimental results show that the channel utilization ratio of the proposed method is higher than 90%, the success rate of information transmission is more than 80%, and the data transmission delay is less than 0.5 s, which indicates that the proposed method has high channel utilization, high transmission success rate and low data transmission delay.


2021 ◽  
Vol 2093 (1) ◽  
pp. 012028
Author(s):  
Jiawen Yao ◽  
Shan Li ◽  
Xiaotong Gu ◽  
Yanhao Yin ◽  
Geng Chen ◽  
...  

Abstract Aiming at the complex dynamic changes of inter-satellite link signals, this paper proposes a low-complexity method to calculate dynamic parameters of inter-satellite link signals so as to simulate inter-satellite link signals with complex dynamic characteristics. Based on the precise ephemeris, the algorithm is used to calculate the transmission delay and Doppler frequency of the signals in an inertial frame of reference by using iteration and interpolation. The calculation result is compared with the result obtained by using the simulation software of the global navigation system. It is found that the error of the transmission delay is at the nanosecond level and the error of Doppler frequency is at the Hertzian level. Therefore, the dynamic signal simulation accuracy can meet the requirements of load testing and verification of inter-satellite links. The algorithm is simple to implement.


2021 ◽  
Author(s):  
Yendo Hu ◽  
Xue Bai ◽  
Yiliang Wu ◽  
Minghong Chen ◽  
Shunxun Qian ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document