• Title/Summary/Keyword: contention-based protocol

Search Result 121, Processing Time 0.026 seconds

Performance Evaluation of WiMedia UWB MAC Protocol Algorithm Supporting Mixed Video and Shipboard Control Data Traffic

  • Jeon, Dong-Keun;Lee, Yeonwoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.53-63
    • /
    • 2016
  • This paper applies WiMedia UWB network into a wireless ship area network (WSAN) so as to support high-quality multimedia services on board and reliable instrument control information as well, since the need for mixed high-quality video traffic and shipboard control data traffic is essential for a high-cost valued digital ship. Thus, in this paper, prioritized contention access (PCA) and distributed reservation protocol (DRP) based on WiMedia UWB (ECMA-368) MAC protocols are combined and proposed to such mixed traffic environment, by varying the portions of superframe according to traffic type. It is shown that the proposed WiMedia UWB MAC protocol can provide reliable mixed video and shipboard control data traffic as well.

A delay analysis of multi-access protocol under wireless network (무선환경하에서 Slotted ALOHA 방식의 다중채널 경쟁에 대한 지연시간분석)

  • Hur Sun;Kim Jeong-Kee;Nam Jin-Gyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.1
    • /
    • pp.129-133
    • /
    • 2005
  • Slotted ALOHA(S-ALOHA) is widely used in local wireless network. We analyze the performance of contention-based model in wireless LAN using S-ALOHA protocol. We analyze the performance of binary exponential backoff (BEB) algorithm under the slotted ALOHA protocol: whenever a node's message which tries to reserve a channel is involved in a collision for the ith time, it chooses one of the next $2^i$ frames with equal probability and attempts the reservation again. We derive the expected access delay and throughput which is defined as the expected number of messages that reserve a channel in a frame. A simulation study is performed to verify our method.

$M^2$ MAC: MAC protocol for Real Time Robot Control System based on Underwater Acoustic Communication ($M^2$ MAC(Message Merging): 수중음파통신 기반의 실시간 로봇 제어 시스템을 위한 MAC 프로토콜)

  • Kim, Yung-Pyo;Park, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.88-96
    • /
    • 2011
  • Underwater acoustic communication is applicable in various areas, such as ocean data collection, undersea exploration and development, tactical surveillance, etc. Thus, robot control system construction used for underwater-robot like AUV or ROV is essential in these areas. In this paper, we propose the Message Merging MAC($M^2$-MAC) protocol, which is suitable for real time robot control system, considering energy efficiency in important parts of underwater acoustic sensor network constitution. In this proposed MAC protocol, gateway node receives the data from robot nodes according to the time slots that were allotted previously. And messages delivered from base-station are generated to one MAC frame by buffering process. Finally, generated MAC frames are broadcasted to all robot nodes in the cluster. Our suggested MAC protocol can also be hybrid MAC protocol, which is successful blend of contention based and contention-free based protocol through relevant procedure with Maintenance&Sleep (M&S) period, when new nodes join and leave as an orphan. We propose mathematical analysis model concerned about End-to-End delay and energy consumption, which is important factor in constructing real-time robot control system. We also verify the excellence of performance according to comparison of existing MAC protocols with our scheme.

Design and Validation of MAC Protocol for B-WLL System (B-WLL 시스템 MAC 프로토콜의 설계 및 검증)

  • Back, Seung-Kwon;Kim, Eung-Bae;Han, Ki-Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.468-478
    • /
    • 2002
  • In this paper, we designed a B-WLL MAC(Media Access Control) protocol and validated its operation for implementation of high-speed subscriber networks. Our MAC protocol was designed by SDL using the DAVIC specifications based upon the variable contention/reserved time slot allocation algorithm. For validation of our MAC protocol, Syntax and semantic error check were performed by the Simulation Builder of ObjectGeode and the MAC(Message Sequence Chart) respectively. The validation results showed that our B-WLL MAC protocol is working correctly and may successfully support B-WLL services.

Worst-case Delay Analysis of Time-Triggered 802.15.4 for Wireless Industrial Environments

  • Kim, Hyun-Hee;Lee, Kyung-Chang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.3
    • /
    • pp.205-212
    • /
    • 2017
  • This paper focuses on worst-case delay analysis of the time-triggered IEEE 802.15.4 protocol to satisfy the industrial quality-of-service (QoS) performance. The IEEE 802.15.4 protocol is considered to be unsuitable for industrial networks because its medium access control method is contention-based CSMA/CA, which exhibits unstable performance with an unbounded delay distribution under heavy traffic. To avoid these limitations, this paper presents a time-triggered version of the nonbeacon-enabled network of IEEE 802.15.4 that relies on a time division multiplexing access (TDMA) method implemented in the application layer without any modification of specification. The timing analysis of this time-triggered IEEE 802.15.4 was executed, and the worst-case transmission delay was calculated. Based on this analysis, the time-triggered IEEE 802.15.4 is a promising alternative for wireless industrial networking.

Mastership Passing Algorithm for Train Communication Network Protocol (철도 제어통신 네트워크 프로토콜에서 마스터권한 진달 기법)

  • Seo, Min-Ho;Park, Jae-Hyun;Choi, Young-Joon
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.1 s.38
    • /
    • pp.88-95
    • /
    • 2007
  • TCN(Train Communication Network) adopts the master/slave protocol to implement real-time communication. In this network, a fault on the master node, cased by either hardware or software failure, makes the entire communication impossible over TCN. To reduce fault detection and recovery time, this paper propose the contention based mastership transfer algorithm. Slave nodes detect the fault of master node and search next master node using the proposed algorithm. This paper also shows the implementation results of a SoC-based Fault-Tolerant MVB Controller(FT-MVBC) which includes the fault-detect-logic as well as the MVB network logic to verify this algorithm.

MDA-SMAC: An Energy-Efficient Improved SMAC Protocol for Wireless Sensor Networks

  • Xu, Donghong;Wang, Ke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4754-4773
    • /
    • 2018
  • In sensor medium access control (SMAC) protocol, sensor nodes can only access the channel in the scheduling and listening period. However, this fixed working method may generate data latency and high conflict. To solve those problems, scheduling duty in the original SMAC protocol is divided into multiple small scheduling duties (micro duty MD). By applying different micro-dispersed contention channel, sensor nodes can reduce the collision probability of the data and thereby save energy. Based on the given micro-duty, this paper presents an adaptive duty cycle (DC) and back-off algorithm, aiming at detecting the fixed duty cycle in SMAC protocol. According to the given buffer queue length, sensor nodes dynamically change the duty cycle. In the context of low duty cycle and low flow, fair binary exponential back-off (F-BEB) algorithm is applied to reduce data latency. In the context of high duty cycle and high flow, capture avoidance binary exponential back-off (CA-BEB) algorithm is used to further reduce the conflict probability for saving energy consumption. Based on the above two contexts, we propose an improved SMAC protocol, micro duty adaptive SMAC protocol (MDA-SMAC). Comparing the performance between MDA-SMAC protocol and SMAC protocol on the NS-2 simulation platform, the results show that, MDA-SMAC protocol performs better in terms of energy consumption, latency and effective throughput than SMAC protocol, especially in the condition of more crowded network traffic and more sensor nodes.

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

A Vehicle-to-Vehicle Communication Protocol Scheme for Forwarding Emergency Information in Intelligent Cars Transportation Systems (지능형 차량 전송시스템에서 긴급정보 전송을 위한 Vehicle-to-Vehicle 통신 프로토콜)

  • Kim, Kyung-Jun;Cha, Byung-Rae;Kim, Chul-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.2
    • /
    • pp.70-80
    • /
    • 2007
  • Inter-vehicular communication suffers from a variety of the problem on the road, resulting in large delay in propagating emergency warning. An energy depletion as well as a transmission delay may induced by traffic accident. A transmission delay are caused by direct contention from nodes that can hear each other or indirect contention from nodes that can not hear each other, but simultaneously transmit to the same destination. A variety of works have been researched to solve the transmission delay and energy consumption problem in intelligent cars transportation systems. We consider a vehicle-to-vehicle communication protocol for disseminating an emergency information that include end-to-end and energy efficient transmission. In this paper, we propose A vehicle-to-vehicle communication protocol scheme for dissemination emergency information in intelligent cars communication based on IEEE 802.15.3 wireless personal area networks. Results from a simulation study reveal that our scheme can achieves low latency in delivering emergency warnings, and efficiency in consuming energy in stressful road scenarios.

  • PDF