Performance Evaluation of a Preemptive Pro- Tocol for Voice-data Integration in Ring-based Theorem 5.1 the Suucient Condition for Schedula- Bility of All Streams following the above Protocol Is

نویسنده

  • Joseph L. Hammond
چکیده

Proof: In this protocol X becomes a multi-access variable. If the sequentiality of X could be maintained we would get the same utilization bound as derived earlier. Note, that since there are only M slots, X may be simultaneously accessed by at most M stations. In the worst case when the value of X is 1 and M stations pick one slack slot each, they in the process deprive (M ? 1) stations down stream from their legitimate integral requirements. However, this can be taken care of by keeping (M ? 1) extra slots for every cycle. Hence, the condition for suuciency is, P N i=1 TC i =P i + M ? 1 M(L ? 1). This leads to the stated utilization bound. In Figure 4, we plot the schedulable utilization with respect to the cycle length L. The plot shows that the schedulable utilization asymptotically approaches the ideal (i.e., M). Furthermore, very high levels of schedulable utilization can be achieved for moderate values of L.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Schedulability of Deadline - Ordered ServiceDisciplinesNorival

| In a deadline-ordered service discipline, packets are assigned transmission deadlines and are transmitted in increasing order of deadlines. Diierent deadline-ordered service disciplines are distinguished by how they deene deadlines. One of the more diicult analytical problems one faces when designing a new deadline-ordered service discipline is to prove that one can bound the end of transmiss...

متن کامل

Performance Improvement of Expanded Integrated Local Area Networks (RESEARCH NOTE)

In Local Area Networks (LAN) connected together by bridges, flow control and smooth traffic in the network is very important. However, congestion at bridges can cause intensive loss of received frames. In addition, the received frames are thrown away and have to be retransmitted by the source station, which causes more congestion and massive reduction in the overall network throughput. The netw...

متن کامل

MATRIX VALUATION PSEUDO RING (MVPR) AND AN EXTENSION THEOREM OF MATRIX VALUATION

Let R be a ring and V be a matrix valuation on R. It is shown that, there exists a correspondence between matrix valuations on R and some special subsets ?(MVPR) of the set of all square matrices over R, analogous to the correspondence between invariant valuation rings and abelian valuation functions on a division ring. Furthermore, based on Malcolmson’s localization, an alternative proof for t...

متن کامل

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

Using Context-based Statistical Models to Promote the Quality of Voice Conversion Systems

This article aims to examine methods of optimizing GMM-based voice conversion systems performance in which GMM method is introduced as the basic method for improvement of voice conversion systems performance. In the current methods, due to using a single conversion function to convert all speech units and subsequent spectral smoothing arising from statistical averaging, we will observe quality ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993