Feasibility of Evolutionary Design for Multi-access MAC Protocols

被引:0
|
作者
Hajiaghajani, Faezeh [1 ]
Biswas, Subir [1 ]
机构
[1] Michigan State Univ, Elect & Comp Engn, E Lansing, MI 48824 USA
关键词
Evolvable state machines; Medium Access Control (MAC); Slotted-ALOHA; Carrier Sense Multiple Access (CSMA); Genetic Algorithms;
D O I
10.1109/GLOCOM.2015.7417248
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper explores the feasibility of evolving Medium Access Control (MAC) protocols using evolving finite state machines. Network protocols formulated as genotypes are evaluated through an evaluation framework and made to compete under the pressure of a desired performance fitness. Specifically, the evolution of two well-known protocols, Slotted-ALOHA and Carrier Sense Multiple Access (CSMA) is explored. Using a C based protocol fitness evaluator and a Java based evolution fabric, we show that a generalized state machine is able to evolve complex MAC behavior when time or channel sensing modalities are provided to the network nodes. We show that protocol synthesis takes place under a wide range of network parameters, loading conditions as well as limited/ full evolutionary degrees of behavioral freedom. Performed adaptability experiments prove feasibility of the framework to adapt with runtime changes of single or multiple system parameters. The ultimate goal of this research is to develop an alternative design paradigm for protocols in heterogeneous network and traffic scenarios.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] MULTI-ACCESS PROTOCOLS IN PACKET COMMUNICATION-SYSTEMS
    TOBAGI, FA
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (04) : 468 - 488
  • [2] Distribution of the interdeparture time in random multi-access protocols
    Gutierrez, L
    Sallent, S
    [J]. ADVANCES IN COMPUTER AND INFORMATION SCIENCES '98, 1998, 53 : 437 - 444
  • [3] A new method to analyze the performance of multi-access protocols
    Gutierrez, LL
    Sallent, S
    [J]. 1998 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 1997, : 426 - 434
  • [4] Realizing Multi-Access Edge Computing Feasibility: Security Perspective
    Ranaweera, Pasika
    Jurcut, Anca Delia
    Liyanage, Madhusanka
    [J]. 2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [5] Research of multi-access and anti-collision protocols in RFID systems
    Tang, Zhijun
    He, Yigang
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 376 - +
  • [6] Joint MAC and rate control for stability and delay in wireless multi-access channels
    Rong, Beiyu
    Ephremides, Anthony
    [J]. PERFORMANCE EVALUATION, 2011, 68 (08) : 658 - 669
  • [7] Design and Implementation of Parallel Multi-Access Memory Interface
    Song, Yukun
    Sun, Ling
    Zhang, Duoli
    Du, Gaoming
    Yang, Yanhui
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [8] Multi-access networks
    Brazeau, A
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2000, (04): : 240 - 243
  • [9] MULTI-ACCESS COMPUTERS
    ROCHE, DJ
    [J]. POST OFFICE ELECTRICAL ENGINEERS JOURNAL, 1969, 61 : 215 - &
  • [10] MULTI-ACCESS COMPUTING
    不详
    [J]. DATA PROCESSING, 1969, 11 (01): : 59 - &