• Title/Summary/Keyword: Access node

Search Result 672, Processing Time 0.023 seconds

CPN Management Model and Network Access Flow/Congestion Control in ATM Network (CPN의 관리 모델과 망 엑세스 흐름/혼잡 제어)

  • 김양섭;권혁인;김영찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2096-2105
    • /
    • 1998
  • As there can be coincident bursts which may result in congetsion in a node of ATM network, reactive flow control schemes are required to guarantee user's Quality of Service. But, the high speed characteristics of ATM networks make it difficult to control source transmission rate in reacting to congestions in intermediate nodes. Therefore, flow control in Customer Premise Network may be more efficient than end-to-end flow control. In this paper, we propose a management model for flow ontrol in CPN and new Network Access Flow/Congestsion control scheme to utilize efficiently Virtual Path Connection.

  • PDF

UMMAC: A Multi-Channel MAC Protocol for Underwater Acoustic Networks

  • Su, Yishan;Jin, Zhigang
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.75-83
    • /
    • 2016
  • In this paper, we propose a multi-channel medium access control (MAC) protocol, named underwater multi-channel MAC protocol (UMMAC), for underwater acoustic networks (UANs). UMMAC is a split phase and reservation based multi-channel MAC protocol which enables hosts to utilize multiple channels via a channel allocation and power control algorithm (CAPC). In UMMAC, channel information of neighboring nodes is gathered via exchange of control packets. With such information, UMMAC allows for as many parallel transmissions as possible while avoiding using extra time slot for channel negotiation. By running CAPC algorithm, which aims at maximizing the network's capacity, users can allocate their transmission power and channels in a distributed way. The advantages of the proposed protocol are threefold: 1) Only one transceiver is needed for each node; 2) based on CAPC, hosts are coordinated to negotiate the channels and control power in a distributed way; 3) comparing with existing RTS/CTS MAC protocols, UMMAC do not introduce new overhead for channel negotiation. Simulation results show that UMMAC outperforms Slotted floor acquisition multiple access (FAMA) and multi-channel MAC (MMAC) in terms of network goodput (50% and 17% respectively in a certain scenario). Furthermore, UMMAC can lower the end-to-end delay and achieves a lower energy consumption compared to Slotted FAMA and MMAC.

Performance Analysis on Code-Division Multiple Access in Underwater Acoustic Sensor Network (수중 음향 센서 망에서의 코드 분할 다중 접속 기법에 대한 성능 해석)

  • Seo, Bo-Min;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9A
    • /
    • pp.874-881
    • /
    • 2010
  • Acoustic signal, which is a main carrier of underwater communication, attenuates along the traveled path heavily depending on the frequency as well as inter-node distance. In addition, since it has a long propagation delay, the conventional medium access control (MAC) schemes requiring complex signaling procedures and accordingly heavy overhead messages would not be appropriate in underwater communications. In this paper, we propose a code division multiple access (CDMA) scheme as a solution for MAC of underwater communication and evaluate the performance. A hierarchical data-gathering tree topology is considered and a staggered wake-up pattern is employed for the purpose of energy saving. As a performance measure, the data rate at each level of hierarchical topology is derived.

An Adaptive Prefetching Technique for Software Distributed Shared Memory Systems (소프트웨어 분산공유메모리시스템을 위한 적응적 선인출 기법)

  • Lee, Sang-Kwon;Yun, Hee-Chul;Lee, Joon-Won;Maeng, Seung-Ryoul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.461-468
    • /
    • 2001
  • Though shared virtual memory (SVM) system promise low cost solutions for high performance computing they suffer from long memory latencies. These latencies are usually caused by repetitive invalidations on shared data. Since shared data are accessed through synchronization and the patterns by which threads synchronizes are repetitive, a prefetching scheme bases on such repetitiveness would reduce memory latencies. Based on this observation, we propose a prefetching technique which predicts future access behavior by analyzing access history per synchronization variable. Our technique was evaluated on an 8-node SVM system using the SPLASH-2 benchmark. The results show the our technique could achieve 34%~45% reduction in memory access latencies.

  • PDF

MAC Protocol for Single-Hop Underwater Sensor Network (싱글 홉 수중 센서 네트워크를 위한 매체접속제어 프로토콜 설계)

  • Baek, Seung-Kwon;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.6
    • /
    • pp.499-505
    • /
    • 2009
  • Main design issues for MAC (Medium Access Control) protocol in underwater sensor networks are long propagation delay caused by the low speed of sound, difficult synchronization, and energy-limited node's life. We aimed to mitigate the problems of strict synchronization and channel inefficiency of TDMA and also the throughput degradation induced by unavoidable collisions in contention based MAC protocols. This proposed protocol improved not only the energy efficiency by adopting a sleep-mode, but also the throughput by reducing collisions and increasing channel efficiency.

ISDN 교환기

  • Lee, Heon
    • ETRI Journal
    • /
    • v.9 no.4
    • /
    • pp.26-35
    • /
    • 1987
  • Switching system can be regarded as the key node of Integrated Services Digital Networks(ISDN) because it plays the Important role in realization of ISDN. As ISDN is evolved from the telephony Integrated Digital Network(IDN), the switching system for ISDN will be evolved from the function and structure of telephony digital switching system. At near future, ISDN switching system is expected to implement the integrated access and transparent switching functions for both voice and data. As final goals of switching system, advanced switching methods for information having various traffic characteristics such as voice, data, text and image should be considered. This paper considered. This paper will show some of the fundamental design challenges and architectural trends in ISDN switching system.

  • PDF

An OSI IMPLEMENTATION ON DAEDUK SCIENCE COMPLEX NETWORK (대덕 지역정보망에의 OSI 상위계층 프로토콜 접속 연구)

  • 최선완;박승철;채의근;한기수;최양희;이영희
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1988.10a
    • /
    • pp.144-147
    • /
    • 1988
  • 대덕망에 Osi 프로토콜을 구현하기 위한 일련의 작업들은 ETRI의 Osi Group 에 의해서 1985년경부터 시작이 되었다. 현재 Osi의 FTAM(File transfer Access and Managenemt) 프로토콜과 ACSE (Association Control Service Element) presentation 계층 session 계층이 상위계층 프로토콜로 구현되었으며, 상위 계층에서 필요한 통신 서비스를 제공하귀 위해서 transport 계층 및 대덕 man의 통신 서비스를 이용하기 위한 intertiace 들이 구혀되었다. 이러한 interface는 순차적으로 jualring optical cable을 control 하여 대덕 man에 위치한 node들 사이에 Osi 상위계층 프로토콜의 서비스를 제공하게 된다.

  • PDF

Analyses of a Signal Traffic for Authentication in Mobile Sensor Network (이동 센서 네트워크망에서의 인증 메카니즘 신호의 트래픽 분석)

  • Kim Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1524-1528
    • /
    • 2005
  • In this paper, we analyses of a traffic for authentication signaling in third generation mobile sensor network. In universal mobile telecommunication system, authentication functions are utilized to identify and authentication a mobile station and validate the service request network services. The authenticating parties are the authentication the serving general packet radio service support node access the authentication center to obtain the authentication with the mobile station. In this paper, we propose that the automatic cost-effective solution size of the authentication vector array.

Estimation of the OD Traffic Intensities in Dynamic Routing Network: Routing-Independent Tomography

  • Kim, Seung-Gu
    • Communications for Statistical Applications and Methods
    • /
    • v.10 no.3
    • /
    • pp.795-804
    • /
    • 2003
  • In this article, a tomography for the estimation of the origin-destination(OD) traffic intensities in dynamic routing network is considered. Vardi(1996)'s approach based on fixed route is not directly applicable to dynamic routing protocols, which arises from the fact that we cannot access the route at every observation time. While it uses link-wise traffics as the observations, the proposed method considers the triple of ingress/outgress/relayed traffics data at each node so that we can transform the problem into a routing-independent tomography. An EM algorithm for implementation and some simulated experiments are provided.

IP Implementation on ATM (ATM에서 IP 수용방안)

  • 강선무;전병천;이유경
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.162-167
    • /
    • 1999
  • ATM technology is well developed. Small-scale access node and edge switches are introduced in the network. Large scale ATM core switches are prepared for backbone application. Currently, Internet traffic is increasing so rapidly and we need to consider effective way of accommodating the volume of traffic. In the other hand, QoS and traffic engineering concept is required in the Internet services. Here, in this paper, two technologies are explained and suggested for integration of networks for future ATM based IP network.

  • PDF