Dynamic Bandwidth Allocation for OFDMA-PONs Using Hidden Markov Model
نویسندگان
چکیده
منابع مشابه
Dynamic Subcarrier Allocation for OFDMA-PONs with Monitoring Mechanism
A new protocol design for 10G OFDMA-PONs is reported, demonstrating dynamic subcarrier allocation based on monitoring of each ONU's queuing status. 0.7 ms packet delay and 540 Mbps throughput were achieved for SLA0 ONUs. OCIS codes: (060.4510) Optical communication; (060.4250) Networks
متن کاملWDM Dynamic Bandwidth Allocation Schemes for Ethernet PONs
WDM based dynamic bandwidth allocation schemes are proposed as potential future-proof upgrade solutions for access PON systems. The schemes represent cost-efficient ways to exploit the virtually unlimited bandwidth afforded by passive optical architectures whilst remaining fully compatible with the IEEE Ethernet standard for the first mile (EFM 802.3ah).
متن کاملBurst-by-burst dynamic bandwidth allocation for XG-PONs
The authors propose and evaluate the performance of a dynamic bandwidth allocation algorithm, namely burstby-bUrst dynamic bandwidth allocation (BUDA), which enables the fair and efficient utilisation of the available upstream resources in 10-Gigabit-capable passive optical networks (XG-PONs). The proposed algorithm emulates a bit-by-bit burst multiplexing process based on the fair queuing sche...
متن کاملDynamic bandwidth allocation for quality-of-service over Ethernet PONs
Ethernet-based passive optical network (EPON) technology is being considered as a promising solution for next-generation broadband access network due to the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. A major feature for this new architecture is the use of a shared transmission media between all users; hence, medium access control arbitration mechanisms are ess...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2657549