Performance Comparison of Reservation MAC Protocols
نویسنده
چکیده
Recent and future communications networks have to provide QoS guarantees for a rapidly growing number of various telecommunication services. This can be ensured by application of an efficient MAC layer. Various communication technologies, such as cellular networks and PLC (PowerLine Communications) access networks, apply reservation MAC protocols, providing a good network utilization, which is important for networks with limited data rate, and realization of different QoS guarantees. In this investigation, we compare the performance of so-called one-step reservation protocols, represented by slotted ALOHA and active polling, with a hybrid two-step reservation protocol. All three protocols are investigated in their extended variants, including piggybacking, signaling over data channels and dynamic backoff mechanism. The protocols are implemented within a simulation model representing an OFDMA/TDMA (Orthogonal Frequency Division Multiple Access/Time Division Multiple Access) scheme, which is outlined as a suitable solution for the PLC networks. Nevertheless, the achieved results can be generalized and interpreted for any other multiple access scheme, as well as for other communication technologies (e.g. wireless). To investigate the protocol performance under possibly realistic traffic conditions, we consider different source models to represent the characteristics of internet based data traffic, which is mainly expected in the access networks, such as PLC. The subscribers of an access network behave differently, depending on their communications requirements, which causes varying traffic characteristic. To observe networks with the different subscriber behavior, we define a traffic mix, which is represented by the source models with different traffic characteristics and varying data rates. The two-step protocol achieves always a near to full network utilization and the shortest signaling delay, compared with both one-step protocols. The advantage of the two-step protocol can be also observed under different traffic conditions. However, the performance of the two-step protocol depends strongly on its realization variant, particularly on number of so-called pre-request micro-slots used during the first protocol phase. The fairness between the subscribers belonging to the same traffic class is ensured in all three investigated MAC protocols. However, a performance variation can be observed between different traffic classes.
منابع مشابه
Performance Analysis of Reservation MAC Protocols for Ad-hoc Networks
Multimedia and real-time applications require bandwidth guarantees, which may be achieved by resource reservation. However, resource reservation in ad-hoc networks is a very challenging task due to the instability of radio channels, node mobility and lack of coordination between mobile nodes. Proposed reservation MAC protocols like CATA, FPRP, R-CSMA and SRMA/PA have limitations and are suitabl...
متن کاملReservation MAC protocols for Ad-Hoc Networks: Analysis of the Approaches
Multimedia and real-time applications require bandwidth guarantees, which may be achieved by resource reservation. Several researches were done to propose efficient reservation MAC protocols for ad-hoc networks. In these schemes, channel is segmented into super-frames composed of fixed number of slots. They allocate slots to each traffic source, and make sure that neighbor nodes record the rese...
متن کاملad-Hoc Networks: analysis of the approaches
Multimedia and real-time applications require bandwidth guarantees, which may be achieved by resource reservation. Several researches were done to propose efficient reservation MAC protocols for ad-hoc networks. In these schemes, channel is segmented into super-frames composed of fixed number of slots. They allocate slots to each traffic source, and make sure that neighbor nodes record the rese...
متن کاملDesign and analysis of low-power access protocols for wireless and mobile ATM networks
This paper describes the design and analysis of a low-power medium access control (MAC) protocol for wireless/mobile ATM networks. The protocol – denoted EC-MAC (energy conserving medium access control) – is designed to support different traffic types with quality-of-service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all the mobiles curre...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کامل