首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Optical burst switching (OBS) has been proposed as a new optical switching paradigm for the next generation Internet due to its flexibility and feasibility compared to OCS and OPS. Moreover, serving as a backbone that interconnects a number of access networks, OBS ring topologies have been a good choice for solving the current metro gap problem between core network and access network owning to its simplicity and scalability. In this paper, we provide an insight into the OBS ring network that consists of nodes using TT–TR (Tunable Transmitter–Tunable Receiver). The node architectures with TT–TR may make efficient use of network resources even though traffic pattern, such as IP traffic with self-similarity dynamically change, and can support good expandability. However, all nodes share the limited network resources. This may result in contention such as wavelength contention and transceiver contention leading to burst loss. In order to use the shared network resources fairly and efficiently as well as reducing the resource contention, we focus on the design of medium access control (MAC) protocols based on multiple tokens. Each token is allocated to one wavelength to denote the accessibility of that wavelength, i.e., once the token is captured, the corresponding wavelength can be used to transmit a burst. As tokens hold the key for using wavelengths to transmit bursts, token management including the token release time is crucial in the proposed MAC protocols. Thus, two kinds of multiple-token based MAC protocols with different token release times are proposed: token release after transmitting burst (TRTB) and token release after transmitting control header (TRTC). Each of them is classified into two schemes called TRTB/TRR and TRTB/RCA and correspondingly TRTC/TRR and TRTC/ RCA. RCA stands for receive collision avoidance. The target is to increase the performance while reducing the processing overhead at each node. The performance of the TRTB and TRTC protocols are evaluated and compared in terms of queuing delay, burst loss rate, and channel utilization by OPNET simulation. The effects of various design parameters are also investigated through simulation in order to evaluate their scalability. In all the proposed schemes, tokens are just used to denote the accessibility of each wavelength. Finally, as an alternative, we also propose a new scheme based on the TRTC protocol called TRTC/CAT (collision avoidance by tokens) to avoid contention by using tokens.
Young-Chon KimEmail:
  相似文献   

2.
It is well known that some time-token medium access protocols for local area networks (LANs) like the IEEE 802.4 token bus and the FDDI token ring can guarantee the medium access delay for time-constrained packets. However, a problem which has been largely overlooked is how these protocols can be made to provide a maximum throughput for nontime-constrained packets while guaranteeing the delay bound of time-constrained packets. The authors first show how the parameters of the IEEE 802.4 token bus and the FDDI token ring can be set to solve the above problem. Then, they design a new timer mechanism for the timed-token protocols which provides the highest guaranteed throughput of nontime-constrained packets among a set of medium access protocols called the token passing protocol, to which most of the existing non-contention LAN protocols belong. They present numerical examples to compare different protocols, all of which have shown the superiority of the proposed protocol to the others  相似文献   

3.
A contention‐based wireless ad hoc medium access control (MAC) protocol, such as carrier sense multiple access with collision avoidance (CSMA/CA), has excellent efficiency when the system is light loaded. The main drawback of such protocols is their inefficiency and unbounded delay when the system load is heavy. On the other hand, a contention‐free MAC protocol, such as token passing, has a better and fair throughput when the system is heavy loaded. The main drawback of such protocols is their inefficiency when only a small amount of users want to transmit. In this paper, we propose a new load awareness single‐hop wireless ad hoc MAC protocol (which is called the LA protocol) that exploits the benefits of both contention‐based and contention‐free protocols. A contention‐based MAC protocol is used when the system is light loaded and a contention‐free one is used otherwise. Our LA protocol, which operates in a distributed fashion and is fully compatible with the IEEE 802.11 wireless local area network (WLAN) standard, can switch smoothly between the contention‐based protocol and the contention‐free one. Simulation results show that our protocol indeed extracts the better part of two kinds of protocols. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

4.
This paper formalizes and extends a tree-based local area network, called the lookahead network, proposed by Lipovski, Goyal, and Malek. The leaf nodes in the network are workstations, and the nonleaf nodes consist of pure combinational logic used in carry lookahead circuits of binary adders. Any of the ring or bus access protocols (token passing, contention, etc.) can be used on this network. The first objective of this paper is to give a formal definition of the lookahead logic and show that it can be operated in either a bus or a ring mode. The advantage of using the lookahead logic is that it makes the network operation fail-soft, and since this logic is recursively defined, it simplifies network installation, expansion, and partitioning procedures. The second objective of this paper is to define a new round-robin access protocol on the lookahead network, which has much better throughputdelay characteristics than that of a token ring when the number of active nodes on the network is increased and/or the transmission speed is increased, and/or the average packet size is decreased. Moreover, this new protocol can implement a message-based priority scheme, which makes it useful in integrated voice and data networks.  相似文献   

5.

Unmanned aerial vehicles have been widely used in many areas of life. They communicate with each other or infrastructure to provide ubiquitous coverage or assist cellular and sensor networks. They construct flying ad hoc networks. One of the most significant problems in such networks is communication among them over a shared medium. Using random channel access techniques is a useful solution. Another important problem is that the variations in the density of these networks impact the quality of service and introduce many challenges. This paper presents a novel density-aware technique for flying ad hoc networks. We propose Density-aware Slotted ALOHA Protocol that utilizes slotted ALOHA with a dynamic random access probability determined using network density in a distributed fashion. Compared to the literature, this paper concentrates on proposing a three-dimensional, easily traceable model and stabilize the channel utilization performance of slotted ALOHA with an optimized channel access probability to its maximum theoretical level, 1/e, where e is the Euler’s number. Monte-Carlo simulation results validate the proposed approach leveraging aggregate interference density estimator under the simple path-loss model. We compare our protocol with two existing protocols, which are Slotted ALOHA and Stabilized Slotted ALOHA. Comparison results show that the proposed protocol has 36.78% channel utilization performance; on the other hand, the other protocols have 24.74% and 30.32% channel utilization performances, respectively. Considering the stable results and accuracy, this model is practicable in highly dynamic networks even if the network is sparse or dense under higher mobility and reasonable non-uniform deployments.

  相似文献   

6.
In high-speed communication networks, the ratio between the end-to-end propagation delay to packet transmission time is large, causing increased scheduling overhead in demand assignment protocols and increased collision probabilities in random access schemes. These lead to rapid degradation of the channel utilization in both channel access control approaches. In this paper, we present a "random token" oriented protocol where channel access is scheduled by random, implicit token passing leading to lower channel access control penalty. By optimally balancing the collision and scheduling penalties, the protocol allows the network to reach better performance than that obtained from random access schemes in networks with and without collision detection, without imposing additional system operational assumptions. Specifically, the random token protocol does not require knowledge of the number of stations, their identities, or synchronization in periods of silence. Therefore, the protocol is also suitable for high-speed networks with frequent reconfiguration and for mobile radio networks.  相似文献   

7.
In this paper, we propose and analyze a bandwidth guaranteed medium access control protocol for broadcast-and-select WDM local networks with a star topology. The proposed protocol is based on a combination of contention and dedicated reservation mechanisms for time slotted WDM networks. Every node accesses the data channel by transmitting request packets in minislots on a separate control channel. There are two types of minislots; dedicated minislots and contention minislots. Nodes requiring bandwidth guarantees, called guaranteed nodes, use dedicated minislots that are assigned by the centralized control node. The remaining nodes, called random-access nodes, share contention minislots using a distributed random access mechanism. The dedicated minislots can guarantee a minimum bandwidth for the guaranteed nodes. The contention minislots enable on-demand services at the optical layer and achieve good fairness for the remaining bandwidth. Here, the data channels are dynamically assigned to the minislots successfully returned on a first-come-first-served (FCFS) basis. This protocol can combine the best of centralized and distributed access protocols such as simplicity, efficiency, and flexibility. We analyze the maximum throughput and verify the results by simulation.  相似文献   

8.
The emergence of wireless and personal communication networks has brought random access protocols for packet radio networks back to the research forefronts. Most such protocols are based on the ever popular ALOHA protocol. Unfortunately, this protocol is inherently unstable and requires sophisticated schemes to stabilize it. Another class of random access schemes, called limited sensing or stack algorithms, has been proposed that is stable and allows for the dynamic incorporation of new stations into the network. In this paper, we will review the simple to implement n-ary stack algorithm, and we will study its performance under various system parameters in the presence of capture, and also in the presence of feedback errors. Finally, we will investigate its maximum system throughput under various traffic generation processes. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

9.
This paper proposes a new medium access protocol (MAC) protocol for futurewireless multimedia personal communication systems, denoted hybrid andadaptive multiple access control (HAMAC) protocol. The HAMAC protocolintegrates fixed assignment TDMA protocol, reservation-based protocols, andcontention-based protocols into a single wireless network so as tosimultaneously and efficiently support various classes of traffic such asconstant-bit-rate (CBR), variable-bit-rate (VBR), and available-bit-rate (ABR)traffic. In particular, the HAMAC protocol uses a novel preservationslot technique to overcome the packet contention overhead in packetreservation multiple access (PRMA) like protocols, while keeping mostisochronous service features of TDMA protocols to serve voice and CBR trafficstreams. A preservation slot is a very short slot which is used torepresent a CBR connection when the traffic in the CBR connection is in asilent period in which there is no meaningful data to transmit. Due to thevery short length of the preservation slot, it only takes minimalportion of the bandwidth pre-allocated to the CBR connection, so that theremaining bandwidth can be freed for other connections to use. When the CBRsource becomes active again, the preservation slot is replaced bynormal data slots without any reservation operation, extra delay, orsignificant bandwidth loss. Consequently, the guaranteed service andsimplified signaling features of TDMA protocols, together with the adaptivebandwidth allocation features of PRMA-like protocols, are both realized in theHAMAC protocol. We have analyzed the performance of the HAMAC protocol usingextensive simulations. The results show that the HAMAC protocol can achievevery low loss rates for various multimedia traffic with stringent quality ofservice (QoS) requirements and outperforms state-of-the-art PRMA-likeprotocols. As a result, the HAMAC protocol appears to be a good candidate forfuture generation multimedia personal communication systems.  相似文献   

10.
We propose a new routing protocol called buffered fixed routing (BFR) for real-time applications on grid networks. While previous routing protocols for grid networks have been designed to improve network throughput, the BFR scheme is proposed to guarantee the end-to-end packet delay and sequencing without loss by using finite buffers at each node. Thus the proposed scheme can satisfy quality-of-service (QoS) requirements of real-time applications. The BFR scheme uses the token on the row ring to provide QoS guarantees. The performance of the BFR scheme is analyzed by using the Geom/Geom/1 queueing system under uniform traffic. In the simulation, the BFR scheme shows the zero-loss, high-throughput performance with the minimum delay variation compared to other routing protocols such as store and forward routing, deflection routing and vertical routing. In addition, it has shown the smallest average delay at intermediate and heavy loads  相似文献   

11.
This paper presents an analytical approach to model the bi‐directional multi‐channel IEEE 802.11 MAC protocols (Bi‐MCMAC) for ad hoc networks. Extensive simulation work has been done for the performance evaluation of IEEE 802.11 MAC protocols. Since simulation has several limitations, this work is primarily based on the analytical approach. The objective of this paper is to show analytically the performance advantages of Bi‐MCMAC protocol over the classical IEEE 802.11 MAC protocol. The distributed coordination function (DCF) mode of medium access control (MAC) is considered in the modeling. Two different channel scheduling strategies, namely, random channel selection and fastest channel first selection strategy are also presented in the presence of multiple channels with different transmission rates. M/G/1 queue is used to model the protocols, and stochastic reward nets (SRNs) are employed as a modeling technique as it readily captures the synchronization between events in the DCF mode of access. The average system throughput, mean delay, and server utilization of each MAC protocol are evaluated using the SRN formalism. We also validate our analytical model by comparison with simulation results. The results obtained through the analytical modeling approach illustrate the performance advantages of Bi‐MCMAC protocols with the fastest channel first scheduling strategy over the classical IEEE 802.11 protocol for TCP traffic in wireless ad hoc networks. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

12.
Efficient multiple-token-based MAC protocols have been proposed for optical burst-switched (OBS) unidirectional ring networks using a TT-TR-based node architecture in our previous research. However, the unidirectional OBS ring network is difficult to scale to larger networks. As wavelengths accessibilities are dominated by tokens, network performance is restricted by the frequency of capturing a token. If the network is too large, it takes a long time for tokens to rotate. Thus, a destination queue may wait for a long time to be served, which results in large queuing delays and inefficiency of network resource utilization. In order to improve network efficiency and scalability for OBS ring networks using multiple tokens, this work is extended to a bidirectional ring system that uses the tunable transmitter and tunable receiver (TT-TR)-based node architecture with two pairs of transceivers, so that each queue can be served by tokens from both directions. Furthermore, two kinds of node architectures differing in sharing the two pairs of transceivers, either shared or not, are proposed. Then, two MAC protocols considering different queue scheduling algorithms are proposed for the ring network using the proposed node architectures, in order to use the network resources more efficiently. They are improved from general round-robin (GRR) and termed as half-ring round-robin (HfRR) and co-work round-robin (CoRR), respectively. The network performance of the two proposed node architectures and the two proposed MAC protocols for the networks using them as well as the network scalability are evaluated with the OPNET simulator.  相似文献   

13.
This paper presents a new protocol for token ring local computer networks and its performance for single and dual ring networks using simulation modelling. The proposed protocol is a modification of the IEEE 802·5 token ring standard. In this protocol, a station can start transmission if it receives a free token or a data packet passing its interface logic. Idle stations are skipped whenever there is at least one station that has a ready packet to transmit. This is achieved by using two of the reserved bits in the frame status (FS) field. The bits used are called transmission reservation bits (TR-bits). The TR-bits are reset by the sending station and set by the first station that has data to transmit during the round trip of the associated packet along the ring. It is found that the proposed modified token ring (MTR) protocol provides better throughput and delay performance for both the single and dual ring networks. The reduction in mean delay of the MTR as compared to the standard token ring (STR) reaches about 45 per cent under heavy traffic conditions. Moreover, it is found that the performance of the MTR decreases as the packet size increases but remains higher than the corresponding performance of the STR for both the single and dual ring networks. The MTR provides a maximum throughput improvement of about 6 per cent over the STR for both dual and single ring cases. Finally, the proposed protocol (MTR) is easy to implement, with no extra hardware and has low cost/performance characteristics.  相似文献   

14.
A novel random forwarding protocol for distributed wireless sensor networks (WSNs) is reported in this paper. The proposed protocol features the utilization of azimuth angle of the nodes involved and opportunistic selection of the relaying node via contention among neighbors. First, the protocol with precise angle information is discussed and its multi‐hop performance is evaluated by means of both simulation and analysis in terms of average number of hops to the sink node. Simulation results show that it performs well especially in network connectivity. As a complement, node mobility is also introduced to evaluate multi‐hop performance in real environments. Then, a simple MAC scheme to ensure that the node with the highest angular advantage will be selected as a relay is proposed, and subsequently energy and latency performances based on it are evaluated. It is shown that our protocol can effectively deliver data with half number of active neighbors required in geographical random forwarding (GeRaF). Finally, a practical method is presented to estimate azimuth angle, combined with which, our forwarding protocol is shown to achieve the performance very close to the case with precise angle information. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

15.

A P2P (peer-to-peer) network is a distributed system dependent on the IP-based networks, where independent nodes join and leave the network at their drive. The files (resource) are shared in distributed manner and each participating node ought to share its resources. Some files in P2P networks are accessed frequently by many users and such files are called popular files. Replication of popular files at different nodes in structured P2P networks provides significant reduction in resource lookup cost. Most of the schemes for resource access in the structured P2P networks are governed by DHT (Distributed Hash Table) or DHT-based protocols like Chord. Chord protocol is well accepted protocol among structured P2P networks due to its simple notion and robust characteristics. But Chord or other resource access protocols in structured P2P networks do not consider the cardinality of replicated files to enhance the lookup performance of replicated files. In this paper, we have exploited the cardinality of the replicated files and proposed a resource cardinality-based scheme to enhance the resource lookup performance in the structured P2P networks. We have also proposed the notion of trustworthiness factor to judge the reliability of a donor node. The analytical modelling and simulation analysis indicate that the proposed scheme performs better than the existing Chord and PCache protocols.

  相似文献   

16.
刘凯  李汉涛  张军 《电子学报》2006,34(10):1872-1876
基于快速、有效竞争预约接入、无冲突轮询传输的思想和带冲突预防的冲突分解策略,本文提出了适于移动Ad Hoc网络的公平按需多址接入(FODA)协议.该协议在分群结构的基础上,利用公平冲突预防算法预约信道资源获得轮询服务,从而完全消除了载波侦听方式下多跳无线网络业务传输中的隐藏终端和暴露终端问题.另外,公平冲突预防算法解决了节点竞争接入时的冲突问题和不公平现象.最后,仿真结果表明,与带冲突避免的载波侦听多址接入(CSMA/CA)和轮询协议相比,FODA协议可以提供较高的信道吞吐量、较低的平均消息丢弃率和平均消息时延.  相似文献   

17.
Contention based MAC protocols are widely used in ad hoc networks because they are suitable, where no central control node exists. However, contention based MAC protocols waste much time because of frequent collisions and long contention times. Moreover, it is hard for them to fairly distribute medium access opportunities. As a result, the problem of unfair medium access may arise under normal network conditions. Recently, another contention based MAC protocol, named the Carrier Sense Multiple Access/ID Countdown (CSMA/IC) was proposed. CSMA/IC resolves medium access contention by comparing the IDs of contending nodes with a simple signaling process. Therefore, medium access collisions never happen as long as each node possesses a unique ID, and the time cost for contention may be smaller than any other contention based MAC protocols if the number of IDs is managed so as to be as small as possible. Furthermore, CSMA/IC may support fair medium access by manipulating the ID of each node properly. In this paper, we propose a novel dynamic ID management protocol which enables a node to acquire a unique ID without any message exchanges and fairly distributed the number of medium access opportunities to all contending nodes. The proposed protocol also makes the contention process of CSMA/IC efficient by dynamically managing the length of the ID field according to the network traffic. The simulation results show that the proposed ID management protocol significantly improves the aforementioned aspects of CSMA/IC MAC protocol compared to previous ID management schemes.  相似文献   

18.
Binary exponential backoff algorithm is the de-facto medium access control protocol for wireless local area networks, and it has been employed as the standard contention resolution algorithm in multi-hop wireless ad-hoc networks. However, this algorithm does not function well in multi-hop wireless environments due to its several performance issues and technical limitations. In this paper, we propose a simple, efficient, priority provision, and well performed contention resolution algorithm called enhanced binary exponential backoff (E-BEB) algorithm for impartial channel access in multi-hop wireless ad-hoc networks. We also provide a simple and accurate analytical model to study the system saturation throughput of the proposed scheme. Simulations are conducted to evaluate the performance of E-BEB algorithm. The results show that the E-BEB algorithm can alleviate the fairness problem and support multimedia transmission in multi-hop wireless environments.  相似文献   

19.
The performance of backoff scheme plays an important role in designing efficient Medium Access Protocols for ad hoc networks. In this paper, we propose an adaptive backoff scheme and evaluate the performance of the proposed scheme for ad hoc networks. The backoff mechanism devised by us grants a node access to the channel based on its probability of collision for a transmitted frame in comparison to the nodes in the two‐hop contention area. We use both an analytical model and simulation experiments to evaluate the performance of our adaptive backoff mechanism in an ad hoc network. The results show that our protocol exhibits a significant improvement in power saving, end‐to‐end goodput, packet delivery ratio, and hop‐put, compared with the existing IEEE 802.11 DCF. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

20.
CSMA/CD with Deterministic Contention Resolution   总被引:1,自引:0,他引:1  
This paper presents a novel media access protocol CSMA/CD with deterministic contention resolution (DCR) for a local area network. It usually operates as CSMA/CD, but once a collision occurs it resolves the collision using a kind of implicit token passing. An analysis was conducted on DCR performance characteristics based on simulation studies and in comparison to conventional CSMA/CD and implicit token passing. It was found that they were very satisfactory in terms of throughput, message delay, and delay standard deviation, these performance characteristics make DCR attractive as a media access protocol for combined voice and data traffic. It has also been shown that this protocol assures robustness against various kinds of transmission errors and station failures. A prototype of a local area network using this protocol has been developed. It consists of a pair of optical fiber buses to which each station is attached via a pair of directional couplers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号