• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Kuang Luobei, Xu Ming, Yu Wei, and Chen Yingwen. Design and Performance Analysis of A MAC Protocol for Wireless Public Bus Networks[J]. Journal of Computer Research and Development, 2012, 49(8): 1618-1631.
Citation: Kuang Luobei, Xu Ming, Yu Wei, and Chen Yingwen. Design and Performance Analysis of A MAC Protocol for Wireless Public Bus Networks[J]. Journal of Computer Research and Development, 2012, 49(8): 1618-1631.

Design and Performance Analysis of A MAC Protocol for Wireless Public Bus Networks

More Information
  • Published Date: August 14, 2012
  • Providing high quality Internet service in public buses allows bus passengers to entertain themselves and even to work remotely during their travel time, thus significantly improving their quality of life. In this paper, a MAC protocol for public bus networks, called BusMAC, is proposed to provide high quality Internet service for bus passengers. The proposed protocol decreases collisions caused by multiple access from multiple passengers based on the improved bus network architecture. The MAC protocol based on super-frame structure decreases greatly the communication bottleneck in the bus network, combined with dynamical contention and piggyback mechanisms. The performance analysis of BusMAC is carried out based on request contention model and data scheduling model. Each model is expressed as a two-layer structure which catches up two access phases in the proposed MAC protocol. Extensive simulations are conducted to evaluate the BusMAC protocol. With simulations, the performance analytical models are verified to be accurate. Also, the results show that BusMAC can achieve much better performance than the traditional ones, and is more adaptive to bus communication. Specially, the deployment feasibility in the realistic system for the protocol can be accounted for through the experiments conducted under realistic mobility trace scenarios.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (650) PDF downloads (417) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return