TY - GEN
T1 - Performance analysis and design of CQBT algorithm for a ring network with spatial reuse
AU - Rubin, Izhak
AU - Wu, Ho Ting
PY - 1994
Y1 - 1994
N2 - A full-duplex ring network combined with destination removal can achieve a network throughput level much higher than the channel transmission rate. However, such a network exhibits fairness problems, particularly under asymmetric-loading conditions. Messages generated by nodes which are located as downstream neighbors of a heavily loaded node, can experience very long time delays. In this paper, we propose and study a new simple protocol, the Check-Quota-Before-Transmission (CQBT) algorithm, to effectively reduce the unfairness features associated with such a network. Under this algorithm, considering for example a slotted ring operation, each heavily loaded node monitors the ring traffic to determine the access opportunities provided to its downstream neighboring nodes. The monitoring nodes then release empty slots for those downstream nodes which have been prevented from accessing the ring for unacceptable periods. Illustrative performance examples are presented to demonstrate the effectiveness of this algorithm. In addition, analytical performance results are shown to be very close to those obtained by simulations, for a wide range of offered load levels.
AB - A full-duplex ring network combined with destination removal can achieve a network throughput level much higher than the channel transmission rate. However, such a network exhibits fairness problems, particularly under asymmetric-loading conditions. Messages generated by nodes which are located as downstream neighbors of a heavily loaded node, can experience very long time delays. In this paper, we propose and study a new simple protocol, the Check-Quota-Before-Transmission (CQBT) algorithm, to effectively reduce the unfairness features associated with such a network. Under this algorithm, considering for example a slotted ring operation, each heavily loaded node monitors the ring traffic to determine the access opportunities provided to its downstream neighboring nodes. The monitoring nodes then release empty slots for those downstream nodes which have been prevented from accessing the ring for unacceptable periods. Illustrative performance examples are presented to demonstrate the effectiveness of this algorithm. In addition, analytical performance results are shown to be very close to those obtained by simulations, for a wide range of offered load levels.
UR - https://www.scopus.com/pages/publications/0028014249
M3 - 会议稿件
AN - SCOPUS:0028014249
SN - 0780318269
T3 - Conference Record - International Conference on Communications
SP - 711
EP - 715
BT - Conference Record - International Conference on Communications
PB - Publ by IEEE
T2 - Proceedings of the 1994 IEEE International Conference on Communications
Y2 - 1 May 1994 through 5 May 1994
ER -