663 research outputs found

    Scalability of broadcast performance in wireless network-on-chip

    Get PDF
    Networks-on-Chip (NoCs) are currently the paradigm of choice to interconnect the cores of a chip multiprocessor. However, conventional NoCs may not suffice to fulfill the on-chip communication requirements of processors with hundreds or thousands of cores. The main reason is that the performance of such networks drops as the number of cores grows, especially in the presence of multicast and broadcast traffic. This not only limits the scalability of current multiprocessor architectures, but also sets a performance wall that prevents the development of architectures that generate moderate-to-high levels of multicast. In this paper, a Wireless Network-on-Chip (WNoC) where all cores share a single broadband channel is presented. Such design is conceived to provide low latency and ordered delivery for multicast/broadcast traffic, in an attempt to complement a wireline NoC that will transport the rest of communication flows. To assess the feasibility of this approach, the network performance of WNoC is analyzed as a function of the system size and the channel capacity, and then compared to that of wireline NoCs with embedded multicast support. Based on this evaluation, preliminary results on the potential performance of the proposed hybrid scheme are provided, together with guidelines for the design of MAC protocols for WNoC.Peer ReviewedPostprint (published version

    Factory environment networking :

    Get PDF

    A Slotted Ring Test Bed for the Study of ATM Network Congestion Management

    Get PDF
    This thesis addresses issues raised by the proposed Broadband Integrated Services Digital Network which will provide a flexible combination of integrated services traffic through its cell-based Asynchronbus Transport Mode (ATM). The introduction of a cell-based, connection-oriented, transport mode brings with it new technical challenges for network management. The routing of cells, their service at switching centres, and problems of cell congestion not encountered in the existing network, are some of the key issues. The thesis describes the development of a hardware slotted ring testbed for the investigation of congestion management in an ATM network. The testbed is designed to incorporate a modified form of the ORWELL protocol to control media access. The media access protocol is analysed to give a model for maximum throughput and reset interval under various traffic distributions. The results from the models are compared with measurements carried out on the testbed, where cell arrival statistics are also varied. It is shown that the maximum throughput of the testbed is dependent on both traffic distribution and cell arrival statistics. The testbed is used for investigations in a heterogeneous traffic environment where two classes of traffic with different cell arrival statistics and quality of service requirements are defined. The effect of prioritisation, media access protocol, traffic intensity, and traffic source statistics were investigated by determining an Admissible Load Region (ALR) for a network station. Conclusions drawn from this work suggest that there are many problems associated with the reliable definition of an ALR because of the number of variable parameters which could shift the ALR boundary. A suggested direction for further work is to explore bandwidth reservation and the concept of equivalent capacity of a connection, and how this can be linked to source control parameters

    On-board B-ISDN fast packet switching architectures. Phase 2: Development. Proof-of-concept architecture definition report

    Get PDF
    For the next-generation packet switched communications satellite system with onboard processing and spot-beam operation, a reliable onboard fast packet switch is essential to route packets from different uplink beams to different downlink beams. The rapid emergence of point-to-point services such as video distribution, and the large demand for video conference, distributed data processing, and network management makes the multicast function essential to a fast packet switch (FPS). The satellite's inherent broadcast features gives the satellite network an advantage over the terrestrial network in providing multicast services. This report evaluates alternate multicast FPS architectures for onboard baseband switching applications and selects a candidate for subsequent breadboard development. Architecture evaluation and selection will be based on the study performed in phase 1, 'Onboard B-ISDN Fast Packet Switching Architectures', and other switch architectures which have become commercially available as large scale integration (LSI) devices

    Optimising lower layers of the protocol stack to improve communication performance in a wireless temperature sensor network

    Get PDF
    The function of wireless sensor networks is to monitor events or gather information and report the information to a sink node, a central location or a base station. It is a requirement that the information is transmitted through the network efficiently. Wireless communication is the main activity that consumes energy in wireless sensor networks through idle listening, overhearing, interference and collision. It becomes essential to limit energy usage while maintaining communication between the sensor nodes and the sink node as the nodes die after the battery has been exhausted. Thus, conserving energy in a wireless sensor network is of utmost importance. Numerous methods to decrease energy expenditure and extend the lifetime of the network have been proposed. Researchers have devised methods to efficiently utilise the limited energy available for wireless sensor networks by optimising the design parameters and protocols. Cross-layer optimisation is an approach that has been employed to improve wireless communication. The essence of cross-layer scheme is to optimise the exchange and control of data between two or more layers to improve efficiency. The number of transmissions is therefore a vital element in evaluating overall energy usage. In this dissertation, a Markov Chain model was employed to analyse the tuning of two layers of the protocol stack, namely the Physical Layer (PHY) and Media Access Control layer (MAC), to find possible energy gains. The study was conducted utilising the IEEE 802.11 channel, SensorMAC (SMAC) and Slotted-Aloha (S-Aloha) medium access protocols in a star topology Wireless Temperature Sensor Network (WTSN). The research explored the prospective energy gains that could be realised through optimizing the Forward Error Correction (FEC) rate. Different Reed Solomon codes were analysed to explore the effect of protocol tuning on energy efficiency, namely transmission power, modulation method, and channel access. The case where no FEC code was used and analysed as the control condition. A MATLAB simulation model was used to identify the statistics of collisions, overall packets transmitted, as well as the total number of slots used during the transmission phase. The bit error probability results computed analytically were utilised in the simulation model to measure the probability of successful transmitting data in the physical layer. The analytical values and the simulation results were compared to corroborate the correctness of the models. The results indicate that energy gains can be accomplished by the suggested layer tuning approach.Electrical and Mining EngineeringM. Tech. (Electrical Engineering

    Performance Improvements for FDDI and CSMA/CD Protocols

    Get PDF
    The High-Performance Computing Initiative from the White House Office of Science and Technology Policy has defined 20 major challenges in science and engineering which are dependent on the solutions to a number of high-performance computing problems. One of the major areas of focus of this initiative is the development of gigabit rate networks to be used in environments such as the space station or a National Research and Educational Network (NREN). The strategy here is to use existing network designs as building blocks for achieving higher rates, with the ultimate goal being a gigabit rate network. Two strategies which contribute to achieving this goal are examined in detail.1 FDDI2 is a token ring network based on fiber optics capable of a 100 Mbps rate. Both media access (MAC) and physical layer modifications are considered. A method is presented which allows one to determine maximum utilization based on the token-holding timer settings. Simulation results show that employing the second counter-rotating ring in combination with destination removal has a multiplicative effect greater than the effect which either of the factors have individually on performance. Two 100 Mbps rings can handle loads in the range of 400 to 500 Mbps for traffic with a uniform distribution and fixed packet size. Performance is dependent on the number of nodes, improving as the number increases. A wide range of environments are examined to illustrate robustness, and a method of implementation is discussed

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    Get PDF
    The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios
    • …
    corecore