首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We describe the WDM request/allocation protocol (WRAP), a media-access control protocol for wavelength-routed passive optical networks (WR-PONs) in which each node has a single fixed optical receiver and a single tunable optical transmitter. The protocol does not require a carrier sensing capability, a separate control channel, or any centralized control or scheduling. Access to transmission channels is regulated by allocations made at destination nodes in response to requests made by source nodes. Computer simulation is used to investigate three different allocation algorithms, one of which-the preferential/random algorithm-is shown to provide significantly better performance than the alternatives. Simulations are presented comparing the performance of WRAP to two previously proposed applicable protocols-the interleaved time division multiple access (I-TDMA) protocol, and the FatMAC protocol. WRAP is shown to provide fair and flexible access to the transmission capacity, enabling high network utilization to be achieved under a wide range of traffic conditions, while providing a guaranteed minimum bandwidth between each source-destination pair. We conclude that of the three protocols considered here, WRAP is the best-suited to general-purpose data communications applications such as local, campus, and metropolitan area networks  相似文献   

2.
In this paper, we propose and analyze a packet time division multiple access protocol for the media access control (mac) sublayer of a radio interface suitable to be implemented in the third generation of mobile networks. This protocol is considered to be adequate for future personal communications networks that should interwork with the broadband-isdn. The protocol is designed to work in a microcell environment employing low power terminals, and to support a wide spectrum of services with both asynchronous and isochronous traffic profiles and different bandwidth requirements.  相似文献   

3.
The authors describe a protocol that can adapt to the changing demands of a mix of synchronous transfer mode (STM) and asynchronous transfer mode (ATM) applications and efficiently allocate bandwidth to a variety of bursty traffic sources. In the case of a hybrid fiber-coaxial (HFC) network, the protocol resides in customer premises equipment (CPE) and a common head-end/central-office (HE/CO) controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable-length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. In the upstream channels, a contention access signaling time slot is also provided in the STM region for call control and setup requests. Within the ATM region, fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for either the duration of a call or a burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and setup requests. The MAC-layer protocol, its relation to circuit- and ATM-amenable applications, and its performance with respect to throughput, latency, and bandwidth efficiency for several service scenarios are examined  相似文献   

4.
基于ATM的无源光网络媒质接入控制协议的设计   总被引:3,自引:1,他引:2  
针对基于ATM的无源光网络(ATM-PON)设计了一种媒质接入控制(MAC)协议。该协议的设计遵照ITU-T有关ATM-PON的建议G.983.1(1998年10月)中所定义的帧结构。该协议能够支持CBR/VBR、ABR和UBR等多种业务,并能够保证用户公平地接入和充分地利用网络的资源。其中CBR/VBR业务的优先级最高,同时也确保ABR业务至少能以最小信元通信。系统的剩余带宽资源被分配给UBR业  相似文献   

5.
Cooperative communications can obtain spatial diversity, high channel capacity, and reliable transmission without multiple antennas, and thus, it has become a hot topic in recent years. Different from existing research, this paper pays attention on cooperative media access control (MAC) mechanism, which considers both physical gain and MAC overhead caused by cooperation. To this end, a dynamic cooperative MAC mechanism for wireless networks, called DCMAC, is proposed. DCMAC can obtain the useful channel state information through broadcasting characteristic of wireless channel, choose the suitable helpers to relay data with our proposed helpers selection algorithm, and reserve wireless channel efficiently and dynamically. Numerical results show the effectiveness of DCMAC to improve the system performance.  相似文献   

6.
A reservation-based protocol based on a Pipelining Cyclic Scheduling Algorithm (PCSA) is proposed for packet-switched single-hop photonic networks. This protocol contains a mechanism to avoid contention at the receivers. Packets arrive in order and the transmission delay and its variations are optimized. The effects of propagation delay and processing time are almost compensated for by a pipelining technique. Analytical models and analysis are developed. The transmission delay is calculated as a function of the offered load, the number of nodes, propagation delay and processing time. Finally, the results of the analysis and simulations are compared.  相似文献   

7.
对基于紫外光非视距(NLOS)定向发送全面接收通信方式(MAC)协议进行了研究。首先根据紫外光NLOS通信的特点,推导出NLOS通信覆盖范围方位角的表达式;其次根据紫外NLOS通信时路径损耗特点和方位角表达式,对目前紫外NLOS定向发送全向接收的节点结构设计规则进行改进;然后提出一种基于角度感知的紫外光NLOS通信定向...  相似文献   

8.
Sencun  Shouhuai  Sanjeev  Sushil   《Ad hoc Networks》2006,4(5):567-585
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms to ensure that only authorized nodes can inject traffic into the network. We propose LHAP, a hop-by-hop authentication protocol for ad hoc networks. LHAP resides in between the network layer and the data link layer, thus providing a layer of protection that can prevent or thwart many attacks from happening, including outsider attacks and insider impersonation attacks. Our detailed performance evaluation shows that LHAP incurs small performance overhead and it also allows a tradeoff between security and performance.  相似文献   

9.
Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.  相似文献   

10.
Wireless sensor networks (WSNs), has been under development for a while by the academia and industry. Due to limited computational power, a typical sensor node may experience operational challenges. Moreover, mobility has become an important feature since emergency and healthcare related applications are evolving in WSNs. Consideration of mobile nodes in WSNs introduce new challenges for the designers. In this paper, an enhanced version of T-MAC protocol (a well-known medium access control protocol in WSNs) known as MT-MAC is proposed. Using the capturing fluctuation in RSSI and LQI values of the received SYNC packets, MT-MAC solves high packet drop ratio in T-MAC. By detecting the mobility, a mobile node softly handover to a new virtual cluster without losing connection with other nodes. The performance of the proposed solution is then compared with T-MAC, S-MAC as well as other well-known mobility-aware MAC (MS-MAC) protocol. The simulation results show that the proposed protocol significantly increases the throughput and packet delivery ratio of T-MAC in exchange for a small increase in power consumption. Compared to MS-MAC protocol, the proposed approach can reduce power consumption by 20–65%, and achieve slightly higher packet delivery ratio.  相似文献   

11.
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.  相似文献   

12.
Media access control for Ethernet passive optical networks: an overview   总被引:6,自引:0,他引:6  
Medium access control is one of the crucial issues in the design of Ethernet passive optical networks. To ensure efficient transmission, an EPON system must employ a MAC mechanism to arbitrate access to the shared medium in order to avoid data collisions in the upstream direction and at the same time efficiently share the upstream transmission bandwidth among all ONUs. The purpose of this article is to provide a good understanding of the MAC issue, discuss the major problems involved (e.g., multiple access, bandwidth allocation, transmission scheduling, and quality of service support), and present an overview of the state-of-the-art solutions proposed thus far to the problems. It is also our purpose to motivate further studies on the problems described in this article  相似文献   

13.
移动P2P网络安全拓扑构造协议   总被引:1,自引:0,他引:1  
李致远  王汝传 《通信学报》2010,31(10):146-157
针对移动对等(MP2P)网络的安全问题,提出一种MP2P网络安全拓扑构造协议(AMPSTP).AMPSTP协议首先利用Fortune算法完成对地理区域的划分,然后给出临时锚节点的选取和更新策略、MP2P覆盖网拓扑模型的构造和维护机制、MP2P覆盖网的路由发现算法以及基于博弈的MP2P覆盖网的节点选择机制.最后对AMPSTP协议的性能进行理论分析和仿真实验.结果表明,与MADPastry协议相比AMPSTP协议不仅可以保障网络安全和提高网络性能,而且还大大降低了控制开销.  相似文献   

14.
The fiber distributed data interface (FDDI) provides a 100 Mb/s communication system to interconnect computer and peripheral equipment using fiber optics as the transmission medium in a ring configuration. The performance of the FDDI media-access control (MAC) protocol, a timed-token protocol, is analyzed. The FDDI MAC priority mechanism supports two classes of traffic: synchronous and asynchronous. The focus is on the relationship between the FDDI MAC parameter settings, the ring configuration, and the performance of the asynchronous priority levels. A procedure to calculate estimates for the throughput of each asynchronous priority level over a range of frame-arrival rates is developed. Performance results are presented to demonstrate characteristics of the FDDI priority mechanism. A procedure is described that can be used to tune the FDDI parameters so that given performance objectives for the various priority levels are achieved  相似文献   

15.
A hybrid protocol is proposed for high bandwidth rings in which the roundtrip propagation delay is much larger than the packet transmission time. Features of random-access protocols and conflict-free protocols such as token passing are combined to achieve superior performance. The scheme permits simultaneous use of the channel by many packets, is fair to all stations, and is completely distributed. Performance results show that the system remains stable for throughputs up to a maximum of 1 and that the delay characteristics are better than those of related access protocols. The protocol additionally provides for reservation of bandwidth on demand and bounded delays for real-time applications  相似文献   

16.
The topology of an ad hoc network has a significant impact on its performance in that a dense topology may induce high interference and low capacity, while a sparse topology is vulnerable to link failure and network partitioning. Topology control aims to maintain a topology that optimizes network performance while minimizing energy consumption. Existing topology control algorithms utilize either a purely centralized or a purely distributed approach. A centralized approach, although able to achieve strong connectivity (k-connectivity for k /spl ges/ 2), suffers from scalability problems. In contrast, a distributed approach, although scalable, lacks strong connectivity guarantees. We propose a hybrid topology control framework, cluster-based topology control (CLTC) that achieves both scalability and strong connectivity. By varying the algorithms utilized in each of the three phases of the framework, a variety of optimization objectives and topological properties can be achieved. In this paper, we present the CLTC framework; describe topology control algorithms based on CLTC and prove that k-connectivity is achieved using those algorithms; analyze the message complexity of an implementation of CLTC, namely, CLTC-A, and present simulation studies that evaluate the effectiveness of CLTC-A for a range of networks.  相似文献   

17.
This paper deals with two critical issues in wireless sensor networks: reducing the end-to-end packet delivery delay and increasing the network lifetime through the use of cooperative communications. Here, we propose a delay- and energy-aware cooperative medium access control (DEC-MAC) protocol, which trades off between the packet delivery delay and a node’s energy consumption while selecting a cooperative relay node. DEC-MAC attempts to balance the energy consumption of the sensor nodes by taking into account a node’s residual energy as part of the relay selection metric, thus increasing the network’s lifetime. The relay selection algorithm exploits the process of elimination and the complementary cumulative distribution function for determining the most optimal relay within the shortest time period. Our numerical analysis demonstrates that the DEC-MAC protocol is able to determine the optimal relay in no more than three mini slots. Our simulation results show that the DEC-MAC protocol improves the end-to-end packet delivery latency and the network lifetime significantly compared to the state-of-the-art protocols, LC-MAC and CoopMAC.  相似文献   

18.
提出了一种基于多点到点无源光网络结构的实时以太网的媒质接入控制协议,设计了相应的时隙分配及时间同步机制.在FPGA平台上实现了相应的中心节点与接入节点,搭建了一个百兆速率的实时光纤试验网络.该试验网络可同时连接16个CAN用户,实时响应时间小于200微秒.  相似文献   

19.
20.
Proliferation of mobile communication devices necessitates a reliable and efficient medium access control (MAC) protocol. In this paper, A MAC protocol, called extended sliding frame reservation Aloha (ESFRA), based on sliding frame R-Aloha (SFRA) is proposed for network access technique. ESFRA is particularly designed to solve the mobile hidden station (MHS) problem in a mobile ad hoc network (MANET) by including relative locations of transmitting stations in the packet frame information header. The MHS problem is unique in mobile networks and occurs if a mobile station enters in a collision free zone of any ongoing communication and disturbs this communication with its transmission. In addition to the MHS problem, ESFRA simultaneously solves hidden station, exposed station, and neighborhood capture problems typically observed in wireless networks. A Markov model of ESFRA is developed and provided here to estimate throughput, delay and collision probabilities of the proposed protocol. The Markov modeling is extended to the analysis of SFRA and IEEE 802.11 to compare these competing MAC protocols with ESFRA. The analysis shows that ESFRA decreases frame transmission delay, increases throughput, and reduces collision probabilities compared to IEEE 802.11 and SFRA. ESFRA improves the network throughput 28 percent compared to that of IEEE 802.11, and 33 percent compared to that of SFRA. The improved performance is obtained at the expense of the synchronization compared to IEEE 802.11, but there is virtually no extra cost compared to SFRA.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号