4 research outputs found

    Feasibility of optically interconnected parallel processors using wavelength division multiplexing

    Full text link

    An Efficient Medium Access Control Strategy for High Speed WDM Multiaccess Networks

    Get PDF
    A medium access control (MAC) strategy that accounts for the limited tunability of present-day lasers and filters and yet supports a large total number of wavelengths in the network is proposed. Full interconnectivity, contention-free access and a high value of concurrency are achieved by dividing the network into disjunct subnetworks on a wavelength basis and by reconfiguring these subnetworks on a time basis. Each subnetwork allows for simplified access to be implemented with fast tunable transceivers each assessing only a moderate number of wavelengths. A performance analysis shows that this concept is most efficient when applied to a high-level broadband interconnection metropolitan area network (MAN

    Wavelength and time division multiplexing with lightpath trespassing for all-optical star local area networks

    Get PDF
    Many medium access control protocols have been proposed for optical wavelength division multiplexing local area networks with a star topology. These protocols range from those based on the concept of fixed-assignment of communication subchannels, such as TDMA (Time Division Multiple Access); reservation of communication subchannels, such as DAS (Dynamic Allocation Scheme); or random-access to communication subchannels, such as DT-WDMA (Dynamic Time-Wavelength Division Multiple Access). In addition various hybrid protocols have been considered, for example, protocols incorporating both fixed-assignment and reservation rules, such as HTDM (Hybrid TDM). This thesis is on a novel hybrid protocol of fixed-assignment and random-access called "WTDMA with lightpath trespassing". This protocol combines the most desirable aspects of fixed-assignment and random-access protocols, while limiting their drawbacks. The performance of different versions of the protocol are analysed both mathematically and by stochastic simulation. The obtained results justify the introduction of the WTDMA with trespassing protocol, and indicate the situations where its use is advantageous
    corecore