Dynamic Bandwidth Allocation for OFDMA-PONs Using Hidden Markov Model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Subcarrier Allocation for OFDMA-PONs with Monitoring Mechanism

A new protocol design for 10G OFDMA-PONs is reported, demonstrating dynamic subcarrier allocation based on monitoring of each ONU's queuing status. 0.7 ms packet delay and 540 Mbps throughput were achieved for SLA0 ONUs. OCIS codes: (060.4510) Optical communication; (060.4250) Networks

متن کامل

WDM Dynamic Bandwidth Allocation Schemes for Ethernet PONs

WDM based dynamic bandwidth allocation schemes are proposed as potential future-proof upgrade solutions for access PON systems. The schemes represent cost-efficient ways to exploit the virtually unlimited bandwidth afforded by passive optical architectures whilst remaining fully compatible with the IEEE Ethernet standard for the first mile (EFM 802.3ah).

متن کامل

Burst-by-burst dynamic bandwidth allocation for XG-PONs

The authors propose and evaluate the performance of a dynamic bandwidth allocation algorithm, namely burstby-bUrst dynamic bandwidth allocation (BUDA), which enables the fair and efficient utilisation of the available upstream resources in 10-Gigabit-capable passive optical networks (XG-PONs). The proposed algorithm emulates a bit-by-bit burst multiplexing process based on the fair queuing sche...

متن کامل

Dynamic bandwidth allocation for quality-of-service over Ethernet PONs

Ethernet-based passive optical network (EPON) technology is being considered as a promising solution for next-generation broadband access network due to the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. A major feature for this new architecture is the use of a shared transmission media between all users; hence, medium access control arbitration mechanisms are ess...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2017

ISSN: 2169-3536

DOI: 10.1109/access.2017.2657549