Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networks

Li Mei Peng, Young Chul Kim, Kyoung Min Yoo, Kyeong Eun Han, Young Chon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Token-based MAC(Medium Access Control) Protocols are proposed for WDM Burst-Switched Ring Network which consists of nodes using TT-TR(Tunable Transmitter-Tunable Receiver). The node architectures with TT-TR may make an efficient use of network resources, even though traffic pattern such as IP traffic with high self-similarity are dynamically changed, and can also support good expandability. However, MAC protocols suitable for TT-TR node architecture must be designed with consideration for various factors in order to use the limited resources of network efficiently. A variety of Token-based MAC protocols are suggested to increase the performance while reducing the processing overhead at each node. The performance of the MAC protocols are evaluated and compared in terms of average packet delay, channel utilization and burst loss rate through OPNET simulation. Finally, we provide insight into the design of MAC protocols by investigating the effect of various parameters.

Original languageEnglish
Title of host publicationDistributed Computing and Internet Technology - Second International Conference, ICDCIT 2005, Proceedings
Pages21-26
Number of pages6
DOIs
StatePublished - 2005
Event2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005 - Bhubaneswar, India
Duration: 22 Dec 200524 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3816 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005
Country/TerritoryIndia
CityBhubaneswar
Period22/12/0524/12/05

Fingerprint

Dive into the research topics of 'Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networks'. Together they form a unique fingerprint.

Cite this