The algorithm and model of Trash: A scheme enforcing equal share

被引:0
|
作者
Zhao, YX [1 ]
Chen, CJ [1 ]
机构
[1] No JiaoTong Univ, Dept Commun, Beijing 100044, Peoples R China
来源
2001 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS | 2001年
关键词
TCP friendly flow protection; fair queue; RED; buffer management and packet dropping;
D O I
10.1109/ICCNMC.2001.962628
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a stateless buffer management scheme, Trash algorithm is aimed to protect TCP friendly flows from non-responsible UDP through the fair allocation of network resources. The algorithm and it's theoretical model are discussed in this paper. In the model, all interested working parameters of the Trash can be easily derived from given system settings. Simulation shows, that this model is an useful practical model in its precision and simplicity. Two related problems, trash control behavior and the relations between average queue lengths vs. loss rate of RED, are also studied and solved in this paper.
引用
收藏
页码:425 / 432
页数:4
相关论文
共 50 条
  • [1] A CONSERVATIVE ENFORCING POSITIVITY-PRESERVING ALGORITHM FOR DIFFUSION SCHEME ON GENERAL MESHES
    Cao, Fujun
    Yao, Yanzhong
    Yu, Yunlong
    Yuan, Guangwei
    INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING, 2016, 13 (05) : 739 - 752
  • [2] A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
    康国栋
    方卯发
    Communications in Theoretical Physics, 2011, 55 (02) : 239 - 243
  • [3] A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
    Kang Guo-Dong
    Fang Mao-Fa
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2011, 55 (02) : 239 - 243
  • [4] An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling Adapted to Cloud Environments
    Chaukwale, Rajesh
    Kamath S, Sowmya
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 81 - 92
  • [5] Cryptanalysis on a Scheme to Share Information via Employing a Discrete Algorithm to Quantum States
    Amellal, H.
    Meslouhi, A.
    El Baz, M.
    Hassouni, Y.
    El Allati, A.
    JOURNAL OF THE KOREAN PHYSICAL SOCIETY, 2017, 70 (05) : 449 - 453
  • [6] Cryptanalysis on a scheme to share information via employing a discrete algorithm to quantum states
    H. Amellal
    A. Meslouhi
    M. El Baz
    Y. Hassouni
    A. El Allati
    Journal of the Korean Physical Society, 2017, 70 : 449 - 453
  • [7] The equal tendency algorithm: a new heuristic for the reliability model
    Elias Munapo
    International Journal of System Assurance Engineering and Management, 2019, 10 : 918 - 924
  • [8] The equal tendency algorithm: a new heuristic for the reliability model
    Munapo, Elias
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (05) : 918 - 924
  • [9] Equal Bits: Enforcing Equally Distributed Binary Network Weights
    Li, Yunqiang
    Pintea, Silvia L.
    van Gemert, Jan C.
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 1491 - 1499