Fig 4 - uploaded by Chun-Hung Richard Lin
Content may be subject to copyright.
An example of forwarding request message.

An example of forwarding request message.

Source publication
Article
Full-text available
In wireless networks, bandwidth is likely to remain a scarce resource. We foresee scenarios wherein mobile hosts will require simultaneous data transfer across multiple links to obtain higher overall bandwidth. A call request of a connection in a wireless network is blocked if there exits no bandwidth route. This blocking does not mean that the tot...

Contexts in source publication

Context 1
... that a QoS connection is required to be established between a source node s and a target node t. = --. l ij denotes the link between node i and j. The residual bandwidth and cost of l ij are represented by b ij and c ij respectively. Fig. 4 shows an example in which node E forwards a request message with a band- width requirement of 10 units to node A. After receiving the request, node A has to de- termine which nodes in its set of neighbors should be selected as forwarding candidates and how many units of bandwidth need to be allocated to each selected link. In this ex- ...
Context 2
... message with a band- width requirement of 10 units to node A. After receiving the request, node A has to de- termine which nodes in its set of neighbors should be selected as forwarding candidates and how many units of bandwidth need to be allocated to each selected link. In this ex- ample, there are three nodes in the set of neighbors of node A. Fig. 4 (a). A example of forwarding a request message using splitting algorithm ...
Context 3
... bandwidth requirement split to l AC is 4 and the bandwidth re- quirement split to l AB is 10 − 4 = 6 units. Therefore, the first split request with a band- width requirement 4 is forwarded to node C, and the second split request with bandwidth requirement of 6 is forwarded to node B. The results of request splitting and forwarding are shown in Fig. 4 (c). Fig. 4 (c). An example of forwarding a request message using splitting algorithm ...
Context 4
... requirement split to l AC is 4 and the bandwidth re- quirement split to l AB is 10 − 4 = 6 units. Therefore, the first split request with a band- width requirement 4 is forwarded to node C, and the second split request with bandwidth requirement of 6 is forwarded to node B. The results of request splitting and forwarding are shown in Fig. 4 (c). Fig. 4 (c). An example of forwarding a request message using splitting algorithm ...
Context 5
... 4, 1, respectively. Therefore, the first split request with a bandwidth requirement of 5 is forwarded to node B. The second split request with a bandwidth requirement of 4 is forwarded to node D. Finally, the third split request with a bandwidth requirement of 1 is forwarded to node C. The results of request splitting and forwarding are shown in Fig. 4 (d). ...

Similar publications

Article
Full-text available
The qualities of service presented in the network on chip are considered as a network performance criteria. However, the implementation of a quality of service, such as multicasting, shows difficulties, especially at the algorithmic level. Numerous studies have tried to implement networks that support the multicast service by adopting various algor...
Conference Paper
Full-text available
Motivated by the wide adoption of H.264 and the demand of universal multimedia data access over wireless network , this paper studies H.264 homogeneous video transcoding with spatial resolution conversion. Firstly , we propose a fast video transcoder ,working entirely in the DCT-domain,to convert high quality H.264 bitstream into low bit rate strea...
Conference Paper
Full-text available
Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributio...
Preprint
Full-text available
Cooperative diversity is one of the candidate solutions for enabling ultra-reliable low latency wireless networking for industrial applications. Even if only a moderate density of terminals is present, it allows in typical scenarios the realization of a high diversity degree. It is furthermore only based on a reorganization of the transmission stre...
Conference Paper
Full-text available
In recent years, the rapid development of wireless communication allows us to enjoy more multimedia services via wireless network. However, due to lack of QoS support and characteristics of wireless channel, there are still many challenges in wireless video streaming. In this paper, we implement a cross-layer architecture to enhance the QoS transmi...

Citations

Conference Paper
A Mobile Ad Hoc Networks (MANETs) is a collection of mobile nodes that can communicate with each other using multihop wireless links without utilizing any fixed based station infrastructure and centralized management. It is very necessary for MANETs to have an efficient routing and quality of service (QoS) mechanism to support diverse applications. Multipath routing allows the establishment of multiple paths between a single source and single destination node. This paper discusses the Multipath routing problem of MANETs with multiple QoS constraints, which may deal with the delay, bandwidth and reliability metrics, and describes a network model for researching the routing problem. It presents a Node-Disjoint Multipath routing protocol with multiple QoS constraints (NDMRP). The NDMRP successfully solves the QoS routing problems when nodes change dynamically in the networks. It only requires the local state information of the link (or node), but does not require any global network sate to be maintained. It can effectively decrease the overhead for the network lifetime, and improve the success ratio of seeking links. Simulation results show that the NDMRP provides an available means to implement routing, and adapt to all kinds of the topology networks, and have better expansibility.