A Window Protocol for Transmission of Time-Constrained Messages

نویسندگان

  • Wei Zhao
  • John A. Stankovic
  • Krithi Ramamritham
چکیده

In this paper, we propose and study a new window protocol suitable for transmitting time-constrained messages in a multiaccess network. Our protocol differs from traditional window protocols in that it explicitly takes time constraints into account. In our protocol, the window is formed based on the latest time to send a message (LS). A major advantage of our window protocol is that a newly arriving message is immediately considered for transmission if its LS is less than that of all pending messages in the system. As a result, our new protocol closely approximates the optimal minimum-laxity-first policy. A performance evaluation through simulation shows that the new window protocol performs well in a wide range of environments, even under overloaded conditions. ate without taking past history of the channel into account. This category includes ALOHA [l] and various CSMA and CSMS/CD protocols [ 101. 2) Inference seeking protocols: These protocols make inference on the collision history, and usually solve collisions by partitioning some parameter space of the messages. Various tree, window, stack, and urn protocols [2], [41, [5], [71, [81, [ l l ] , [131, [31]-1331 belong to this category. 3) Deterministic or Collision -free protocols: These protocols work in such a way that collisions do not occur at all. The time division multiple-access protocols (TDMA), the bit-map protocol [ 121, the broadcast recognition with alternative pri

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره

The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...

متن کامل

Statistical study of performance metrics of Adaptive Fault Tolerant Replication Routing Protocol for MANET

Ad hoc networks are multi-hop wireless networks having dynamic topology due to node mobility. Routing protocols for such networks should be able to respond rapidly to topological changes. Designing and analyzing routing protocols for handling time-constrained messages in such dynamic environment is very crucial. A number of routing protocols have been proposed that deal with time-constrained me...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

The Best-E ort Virtual-Time CSMA/CD Protocols with Run-Time Clairvoyancy Support

Two clairvoyant virtual-time CSMA/CD protocols for dealing with time-constrained messages are described. A clairvoyant protocol has a priori knowledge about messages expected to be produced in the future, so that it can take into account such future messages when it makes a decision for transmission. In the absence of clairvoyancy, some urgent future messages may not be successfully transmitted...

متن کامل

The Best-E ort Virtual-Time CSMA/CD Protocols for Real-Time Systems

Two clairvoyant virtual-time CSMA/CD protocols for dealing with time-constrained messages are described. A clairvoyant protocol takes into account not only the messages currently available for transmission but also the messages expected to be produced in the future. In the absence of clairvoyancy, the urgent but currently unavailable messages may not be successfully transmitted when they are ac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Computers

دوره 39  شماره 

صفحات  -

تاریخ انتشار 1990