A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Raja, J.
- Maximization of Throughput by Effective Queue Management Scheme for High Speed Network
Authors
1 Sathyabama University, IN
2 Department of IT, SSN College of Engineering, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 2, No 3 (2009), Pagination: 28-31Abstract
A new algorithm is proposed to control the congestion in the network based on the minimum drop ratio. Explicit Control Protocol (XCP) is adopted for high speed network, where the queue threshold is assigned to be 85% of the queue size. At the time of congestion, whenever the queue size reaches the threshold value, a new buffer is initialized which is half the queue size. This mechanism thus prevents the drop of packets and hence the drop ratio is minimized and throughput is maximized. Performance of bandwidth utilization, throughput and drop ratio is presented.Keywords
Network, XCP, Drop Ratio, Throughput, QueueReferences
- David X (2006) BIC TCP: motivation, architecture, algorithms, performanc. IEEE/ACM Trans. Networking. 14 (6), 1246-1259
- Fernando Paganini, Steven H. Low (2005) Congestion Control for high performance, stability and fairness in General Networks. IEEE/ACM Trans. Networking. 13 (1), 43-56.
- Huajun Liu (2005) Research of the queue management algorithms application to the network processor. J. Commu. Computer. 2 (5), 112-117.
- Kyle Halliday, Andrew Hurst and Jerom Nelson (2004) Analysis of next generation TCP. Lawrence Livermore Natl. Lab. 12-13.
- Li-song Shao, He-ying Zhang and Wen-hua Dou (2006) General Window based Congestion Control: Buffer occupancy, network efficiency, packet loss. Proc. 4th Ann. Commu. Networks Services Res. Conf.(CNSR’06). 2, 195-201.
- Mehdi Farokhian Firuzi and Mohammad Haeri (2005) Active queue management in TCP networks bared on self tuning control approach. Proc. 2005 IEEE Conf. Control Algorithms. 3, 904-909.
- Nishan R.Sastry and Simon S.Lam (2005) CYRF: A theory of window based unicast congestion control. IEEE/ACM Trans. Networking. 13, 330-342.
- Peng Wang and David L. Mills (2006) Simple analysis of XCP equilibrium performance. Proc. 40th IEEE Ann. Conf. 2, 585-590.
- Ramesh Johari and David Kim Hong Tang (2001) End-toend congestion control for internet: delays and stability. IEEE/ACM Trans. Networking. 9 (6), 818-832.
- Sally Floyd and Kevin Fall (1998) Promoting the use of endto- end congestion control in internet. IEEE/ACM Trans. Networking. 7 (4), 1-15.
- Sanjeeva Athuraliya and Steven H.Low (2001) REM: active queue management. J. IEEE Network. 15, 48-53.
- Satyanarayan Reddy K and Lokanatha C. Reddy (2008) A survey on congestion control mechanisms in high speed networks. IJCSNS Intl. J. Computer Sci. Network Security. 8 (1),, 208-212.
- Satyanarayan Reddy K and Lokanatha C. Reddy (2008) A survey on congestion control protocols for high speed network. IJCSNS Intl. J. Computer Sci. Network Security. 8 (7), 44-52.
- Sherali Zeadally and Liqiang Zhan (2004) Enabling gigabit network Access to end users. IEEE Proc. IEEE. 92 (2), 340-353.
- Steven H. Low (2003) A duality model of TCP and queue management algorithms. IEEE/ACM Trans. Networking. 11 (4), 520-546.
- Steven L. Low, Achlan L.H. Andrew (2005) Understanding XCP: equilibrium and fairness. Proc. IEEE Infocom. 2, 1-12.
- Yongguang and Lang (2005) An implementation and experimental study of the explicit control protocol (XCP). Proc. IEEE 24th Ann. Joint Conf. of the Computer & Commu. Soc. 2, 1037-1048.
- A New Model for Cong Estion Detection in High Speed Network with High Speed Protocols Creating
Authors
Source
National Journal of System and Information Technology, Vol 2, No 2 (2009), Pagination: 158-168Abstract
Continuously growing needs for Internet applications that transmit massive amount of data has led to the emergence of high speed networks. The primary factor hindering the flow of Traffic is Network Congestion. Data transfer must take place without any congestion. The Internet carries certain critical data and information which need to be delivered to the receiver at all cost. Thus Congestion Detection plays a key role in high speed networks. The Traditional TCP has been used over the years to detect and control Congestion. Various algorithms such as ECN, DECbit, RED Queue Mechanism are adopted by TCP to detect Congestion. In this paper, a rational mechanism utilizing XCP protocol is used. Adopting the techniques of a new congestion detection module with effective feedback mechanism and modified window adjustment is achieved. A Separate Congestion Detection Module is developed to detect and inform immediate Congestion Detection and Control. The feedback parameters are calculated based on arrival rate, service rate, traffic rate and queue size. Resulting in no drastic decrease in window size, better increase in sending rate because of which there is a continuous flow of data without congestion. Therefore as a result of this, there is a maximum increase in throughput, high utilization of the bandwidth and minimum delay. The result of the proposed work is presented as a graph based on throughput, delay and window size. Thus in this paper, XCP protocol is well illustrated and the various parameters for Congestion Detection are thoroughly analyzed and adequately presented.Keywords
TCP/IP, Congestion Detection, Window Management, Feedback Control, Queue Management, Explicit Control ProtocolReferences
- Sherali Zeadally and Liqiang Zhang (2004)Enabling giga bit network Access to end Users” IEEE proc., Vol. 92 No. 2,pp:340-353
- Peng Wang and David .L .Mills,(2006) “Simple analysis of XCP equilibrium performance”, Proc. 40th IEEE Ann.Conf, pp:585-590, IEEE’06
- Li-song, shao ,He-ying , Zhang, Wenhua,Dou,(2006) ”General Window Based Congestion Control Buffer Occupancy, Network Efficiency and Packet loss” proc of 4th Ann Comm.Networks, pp:195-201, IEEE’06
- Steven.L.Low,achlan.L.H.Andrew Bartek (2005) “Understanding XCP: Equilibrium and fairness”, Proc of IEEE Infocom, pp: 1-12.
- Fernando Paganini, Steven.H.Low(2005) “Congestion Control for High Performance Stability and Fairness in General Networks” IEEE/ ACM NETWORKING, vol.13 .No.1, pp:43-56
- Nishan R.Sastry and Simon.S.Lam(2005) “CYRF:A theory of window based unicast congestion control”, IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 13, pp:330-342 .
- Yongguang and Lang(2005) “An implementation and experimental study of the explicit control protocol (XCP)”, IEEE 24th Ann. Joint Conf of the computer & communication. Soc-2, pp: 1037-1048.
- Sanjeeva Athuraliya and Steven.H.Low, (2001)“REM:Active Queue Management” IEEE Network, pp: 48-53.
- Ramesh Johari and David Kim Hong Tang(2001) “End-to-End Congestion Control for Internet: Delays and stability”, IEEE/ACM TRANSACTIONS ON NETWORKING,vol.9 No. 6, pp: 818-831.
- Sally Floyd and Kevin Fall,(1998) “Promoting the use of end-to-end congestion control in internet” , IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 7,no. 4, pp:1-15
- David X, (2006)“BIC TCP: Motivation, Architecture, Algorithms, Performance”, IEEE/ACM TRANSACTIONSONS ON NETWORKING,VOL. 14, NO. 6.
- Kyle Halliday, Andrew Hurst and Jerom Nelson,(2004) ”Analysis of next Generation TCP”, pp:12-12.
- Yee-Ting Li,Douglas Leith and Robert Shorten,(2004)” Experimental Evaluation of TCP protocols for High-Speed Networks.
- Damon Wischik(2006) , ”Buffer Requirements for High Speed Routers”.
- Khaled M.Elleithy and Ali S.Al-Suwaiyan, (2001)”Network Traffic Characterization for High –Speed Networks Supporting Multimedia.”, pp:200-202, IEEE’01.
- Satyanarayan Reddy K and Lokanatha C Reddy (2008)“A Survey on Congestion Control Mechanism in High Speed Networks”, IJCSNS, International Journal of Computer Science Network Security, vol. 8, no.1, pp:208-212.
- Satyanarayan Reddy K and Lokanatha C Reddy (2008)“A Survey on Congestion Control Protocols for High Speed Networks”, IJCSNS, International Journal of Computer Science Network Security, vol. 8, no.7, pp:44-52.
- Steven H.Low (2005) “A duality Model of TCP Queue Management Algorithms”, IEEE/ACM Transactions on Networking, vol.11, no.4, pp:520-546,
- Huajun Liu(2005) “Research of the Queue Management Algorithms Journal of Communication and Computers, vol 2, No 5, pp:16-19
- Jiakun Liu (2003)“Threshold Crossing Analysis of High Speed Network Traffic”, pp:915-918, IEEE,’03
- C.Jin.D.X.Wei & S.H.Low(2004), “FAST TCP, R. Agrawal and R. Srikanth, Fast algorithms for mining association rules, in: Proc. VLDB, Santiago, Chile, September 1994.
- D.J.Leith & R.N.Shorten,(2004) “H-TCP Protocol for Highspeed Long Distance Networks”, in 2nd Workshop on Protocols for fast Long Distance Networks, USA.
- L.Xu, K.Harfoush, I.Rhee(2004), “Binary Increase Congestion Control (BIC) for Fast Long Distance Networks”, In IEEE Infocom,
- C.Jin.D.Wei & S.H.Low,(2006) “Fast TCP Motivation,Architecture,Algorithms, Performance”,IEEE/ACM Transactions on Networking, Vol.14. no. 6,pp:1246-1259.
- Yee.Ting, Li, douglas Leith & Robert.N,92007) “Experimental Evaluation of TCP Protocols for High Speed Networks”, IEEE/ACMTransaction Networking, pp:1109- 1122.
- Justification of the Asymptotic Analysis of Linear Shallow Shells
Authors
1 Department of Mathematics, Indian Institute of Space Science and Technology, Valiamala P.O, Trivandrum-695 547, IN
Source
The Journal of the Indian Mathematical Society, Vol 81, No 3-4 (2014), Pagination: 335-356Abstract
Two dimensional model of linearly elastic shallow shells is derived in [1] under suitable scalings on the unknowns and the data. In this paper we justify the scalings used in [1] to derive the two dimensional shallow shell model.Keywords
Elasticity, Shallow Shells.References
- S. Busse, P. G. Ciarlet and B. Miara, Justification d'un modele lineaire bi-dimensional de coques "faiblment courbees" en coordonnees curvilignes, M2 N A, 31 (1997), 409-434.
- P. G. Ciarlet, Plates and junctions in elastic multistructures, An asymptotic analysis, Masson, Paris, 1990.
- P. G. Ciarlet and P. Destuynder, A justification of the two dimensional plate model, J. Mechanique, 18 (1978), 315-344.
- P. G. Ciarlet and P. Destuynder, A justification of a non-linear model in plate theory model, Camp. Methods in App!. Mech. Engrg, 17/18, (1979), 227-258.
- P. G. Ciarlet and S. Kesavan, Two-dimensional approximation of three-dimensional eigenvalue problem in plate theory, Camp. Methods in App!. Mech. Engrg., 26 (1981), 145-172.
- P. G. Ciarlet and V. Lads, Asymptotic analysis of linearly elastic shells. I. Justification of membrane shell equation, Arch. Rational Mech. Ana!., 136 (1996), 119-16l.
- P. G. Ciarlet and V. Lads, Asymptotic analysis of linearly elastic shells, III Justification of Koiter's shell equations, Arch.Rationa!.Mech.Ana!',136 (1996), 191-200.
- P. G. Ciarlet, V. Lads and B. Miara, Asymptotic analysis of linearly elastic shells. II.Justification of flexural shell equations, Arch. Rational Mech. Ana!., 136 (1996), 162190.
- P. G. Ciarlet and B. Miara, Justification of the two-dimensional equations of a linearly elastic shell, Comm. Pure and App!. Math; 45 (1992), 327-360.
- S. Kesavan and N. Sabu, Two dimensional approximation of eigenvalue problem in shallow shells, Math. Mech. Solids, 4, 441-460.
- S. Kesavan and N. Sabu, Two-dimensional approximation of eigenvalue problem for flexural shells, Chinese Annals Maths., 21 B (2000), 1-16.
- H. Le Dret, Problems Variationnels dans les Multi-Bomains, Modelisation des jonctions et Applications, 1991, Masson, Paris.
- J. L. Lions, Perturbations Singulieres dans les Problems aux limites et en Controle Optimal. Lecture Notes in Math., Va!. 323, Springer-verlag, Berlin, 1973.
- B. Miara, Justification of the asymptotic analysis of elastic plates, I. linear case, Asymptotic analysis, 9 (1994), 47-60.
- B. Miara, Justification of the asymptotic analysis of elastic plates, I. Non linear case, Asymptotic analysis, 9 (1994), 119-134.
- N. Sabu, Vibrations of piezoelectric flexural shells: Two dimensional approximation, J. Elasticity, 68 (2000), 145-165.
- N. Sabu., Vibrations of piezoelectric shallow shells: Two dimensional approximation, Proc. Indian Acad. Sci;(Math Sci), 113 (2003), 333-352.
- Justification of the Asymptotic Analysis of Linear Slender Rods
Authors
1 SCL, Chandigarh, IN
2 Department of Mathematics, IIST, Trivandrum-695 547, IN
Source
The Journal of the Indian Mathematical Society, Vol 83, No 1-2 (2016), Pagination: 181-197Abstract
One dimensional model of linearly elastic slender rods is derived by Trabucho and Viano using asymptotic expansion method under suitable scalings on the unknowns and the data and later Le Dret had proved the convergence of the scaled solution to the one dimensional model under the same scalings on the unknowns and data. In this paper we justify the scalings used by them to derive the one dimensional model.Keywords
Elasticity, Rods, Asymptotics.References
- S. Busse, P. G. Ciarlet and B. Miara; Justication d'un modele lineaire bi-dimensional de coques faiblment courbees"en coordonnees curvilignes, M2NA; 31(3) 1997, 409-434.
- P. G. Ciarlet and P. Destuynder, A justication of the two dimensional plate model, J. Mechanique, 18 (1978), 315-344.
- P. G. Ciarlet and P. Destuynder, A justication of a non-linear model in plate theory model, Comp. Methods in Appl. Mech. Engrg, 17/18 (1979), 227-258.
- P. G. Ciarlet and J. L. Lions, Hand book of Numerical Analysis, Volume 4, Finite element method (part 2), Numerical method of solids (part 2)
- P. G. Ciarlet and V. Lods, Asymptotic analysis of linearly elastic shells. I. Justication of membrane shell equation, Arch. Rational Mech. Anal., 136 (1996), 119-161.
- P. G. Ciarlet and V. Lods, Asymptotic analysis of linearly elastic shells, III Justication of Koiter's shell equations, Arch. Rational. Mech. Anal., 136, 1996, 191-200.
- P. G. Ciarlet, V. Lods and B. Miara, Asymptotic analysis of linearly elastic shells. II.Justication of exural shell equations, Arch. Rational. Mech. Anal., 136 (1996), 162-190.
- J. L. Lions, Perturbations Singulieres dans les Problems aux limites et en Controle Optimal, Lecture Notes in Math., Vol. 323 Springer-Verlag, Berlin, 1973.
- B. Miara, Justication of the asymptotic analysis of elastic plates, I. linear case, Asymptotic analysis, 9 (1994), 47-60.
- B. Miara, Justication of the asymptotic analysis of elastic plates, I. Non linear case, Asymptotic analysis, 9 (1994), 119-134.
- H. Le Dret, Convergence of displacements and stresses in linearly elastic slender rods as the thickness goes to zero, Asymptotic analysis, 10 (1995), 367-402.
- L. Trabucho and J. M. Viano, Une justication des equations de la thermo-elaste des poutres a section variable par des methodes asymptotiques, RAIRO Anal, Numerique, 18 (1984), 347-376.
- A Random PWM Scheme Based on Coalescing the Pseudorandom Triangular Carrier and the Randomized Pulse Position for Voltage Source Inverters
Authors
1 E.G.S. Pillay Engineering College, Nagapattinam, IN
2 Anna University of Technology, Tiruchirappalli, IN
3 Pondicherry Engineering College, Pondicherry, IN
Source
Programmable Device Circuits and Systems, Vol 4, No 11 (2012), Pagination: 570-574Abstract
A novel hybrid pseudo randomized triangular carrier and randomized pulse position scheme for voltage source inverter is proposed in this paper in order to disperse the acoustic switching noise spectra of an induction motor drive. The proposed random pulse width modulation (RPWM) pulses are produced through the logical comparison of a pseudorandom binary sequence (PRBS) bits with two random triangular carriers. Here, the PWM pulses of the proposed scheme possess the hybrid characteristic of the random pulse position PWM and the random carrier frequency PWM. The proposed technique is evaluated using MATLAB/Simulink and the results prove an excellent harmonic spectra spreading capability of the proposed hybrid scheme as compared with conventional schemes.Keywords
Hybrid RPWM, Pseudorandom Carrier Modulation Method, Pseudo Random Binary Sequence (PRBS), RPWM, Voltage Source Inverter.- Comparative Study of Square and Hexagonal Plate MEMS Variable Capacitors
Authors
1 Sathyabama University, Jeppiaar Nagar, Chennai, IN
2 Department of Information Technology, SSN College of Engineering, Kalavakkam, Chennai, IN
Source
Programmable Device Circuits and Systems, Vol 1, No 6 (2009), Pagination: 121-128Abstract
Tunable filters are playing a vital role in RF MEMS circuits and its important element to vary the frequency is varicaps. Varicaps which are designed using conventional methods commonly encountered into problems namely low Q-factor and pull-in effect. In this paper, two different modified parallel plate RF MEMS variable capacitors have been designed, simulated and their performance is analysed with 6 GHz self resonance frequency, 250 Q- factor and 2:1 tuning range, to overcome the above mentioned problems. Also, we have presented S-Parameter analysis and Q-factor analysis for these improved versions of MEMS capacitors. These tunable capacitors have been designed using Poly MUMPS to produce freestanding structures with excellent structural quality and with lateral feature sizes as small as micron.
Keywords
RF MEMS, Micro Electro Mechanical Systems, Tunable capacitor, Poly MUMPS.- SAMON-C:Sensor Access and Monitoring in Cloud Environment
Authors
1 Department of CSE, Anna University of Technology, Tiruchirappalli, TamilNadu, IN
2 Department of ECE, Anna University of Technology, Tiruchirappalli, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 3, No 2 (2011), Pagination: 136-144Abstract
This paper aims to examine how the sensor information can be deployed as a service, through a new resource called ―cloud‖. The recent research issue in integrating Wireless sensor Networks with Cloud is to find a method to establish a faster communication link between the two. The wireless sensor networks are used to sense and collect the information required. The sensor information is deployed into the cloud through the sensor profile for web services. The Sensor Profile for Web Services specifies a lightweight subset of the overall Web services protocol suite that is appropriate for network-connected sensors. Cloud generally offers resources on demand. Since wireless sensor networks are limited in their processing power, battery life and communication speed, cloud computing usually offers the opposite, which makes it attractive for long term observations, analysis and use in different kinds of environments. In this paper a model is presented, which combines the concept of wireless sensor networks with the cloud computing paradigm, and show how both can benefit from this combination. Sensor data access is thus moved from loosely managed system to a well managed cloud. The integration of sensor information into the cloud through the sensor as a service paradigm proves the faster communication establishment. The scalability of this approach seems to be unlimited, since wireless sensor networks operate independently, and are connected to the cloud computing environment through a scalable number of wireless sensor network communication gateways. The cloud computing environment leads to the concept of green engineering, because it offers a massive storage of information at a distance place, which makes it very attractive. The main goal is to design a flexible architecture in which sensor network‘s information can be accessed by applications efficiently.Keywords
Cloud, Information, Resources, Sensors, Sensor Profiles, Scalability, Web Services.- An Integrated Approach to Improve Web Cache Performance
Authors
1 Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, IN
2 Department of IT, S.S.N Engineering College, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 4 (2009), Pagination: 138-143Abstract
The rapid increase of World Wide Web users and the development of services with high bandwidth requirements have caused the substantial increase of response times for users on the Internet. Web latency would be significantly reduced, if browser, proxy or Web server software could make predictions about the pages that a user is most likely to request next, while the user is viewing the current page, and pre fetch their content.. In this paper, we describe Web caching scheme that capitalizes on prefetching. Prefetching refers to the me chanism of deducing forthcoming page accesses of a client, based on access log information. Web log mining methods are exploited to provide effective prediction of Web user accesses. The proposed scheme achieves a coordination between the two techniques (i.e., caching and prefetching).The prefetched documents are accommodated in a dedicated part of the cache, to avoid the drawback of incorrect replacement of requested documents. The requirements of the Web are taken into account, compared to the existing schemes for buffer management in database and operating systems. Experimental results indicate the superiority of the proposed method compared to the previous ones, in terms of improvement in cache performance.Keywords
Prediction, Web Log Mining, Web Caching, Refetching, Association Rules.- A Comprehensive Study on Big Data Security and Integrity Over Cloud Storage
Authors
1 Department of Computer Science and Engineering, Sathyabama University, Rajiv Gandhi Salai, Jeppiaar Nagar, Chennai - 600119, Tamil Nadu, IN
2 School of Information Technology, Madurai Kamaraj University, Palkalai Nagar, Madurai - 625021, Tamil Nadu, IN