Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 464-470.doi: 10.11896/jsjkx.201200026

• Network & Communication • Previous Articles     Next Articles

Research on Two-level Scheduled In-band Full-duplex Media Access Control Mechanism

GUAN Zheng1, LYU Wei1, JIA Yao1, YANG Zhi-jun1,2   

  1. 1 School of Information Science and Engineering,Yunnan University,Kunming 650500,China
    2 Institute of Education Sciences,Educational Department of Yunnan Province,Kunming 650223,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:GUAN Zheng,born in 1982,Ph.D,associate professor,master supervisor,is a member of CCF.Her main research interests include image processing and polling and communication systems.
    YANG Zhi-jun,born in 1968,professor.His main research interests include computer communication and network,wireless networks,polling system and ICT in education.
  • Supported by:
    National Natural Science Foundation of China(61761045).

Abstract: In-band full-duplex (IBFD) wireless communication allows the nodes to send and receive simultaneously in the same frequency band,which is an effective way to improve the spectrum utilization rate.This paper proposes a two-level scheduled in-band full-duplex (TSIB-FD) for wireless networks,which divides the access process into three stages:information collection,full-duplex data transmission and acknowledgement.A first-level scheduling scheme is generated by AP in the information collection stage by node business requirements and inter-interference relations.During thefirst-level full-duplex link data transmission,AP can build the second-level scheduling dynamically according to current transmission.ACK is processed after complete bidirectional data transmission.The simulation results show that TSIB-FD has improved the system throughput with a lower delay.Compared with Janus,the throughput can be improved by 38.5%,and compared with HBPOLL,it can be improved by 100%.

Key words: In-band full-duplex, MAC, Scheduled service, Two-level schedule, WLAN

CLC Number: 

  • TP914
[1]QIN Y,ZHANG H,REN J.Frame design of heterogeneous cognitive wireless sensor network based on energy efficiency optimization[J].Communications Technology,2019,52(10):2401-2409.
[2]HYEONGTAE A,YOUNG J S.Full-duplex MAC protocol using buffer status reportsduring unused uplink periods in WLAN[OL]. https://doi.org/10.1016/j.adhoc.2019.101950.
[3]YANG Y,XU M W,CHEN H.Analysis and modeling of the impact of 5G/ POST-5G deployment on Internet Backbone[J].Journal of Communications,2019,40(8):36-44.
[4]HU J Z,DI B Y,LIAO Y,et al.Hybrid MAC Protocol Design and Optimization for Full Duplex Wi-Fi Networks[J].IEEE Transactions on Wireless Communications,2018,17(6):3615-3630.
[5]THILINA K M,TABASSUM H,HOSSAIN E,et al.Medium access control design for full duplex wireless systems:Challenges and approaches[J].IEEE Communications Magazine,2015,53(5):112-120.
[6]CHOI W Y.Hybrid MAC protocol for IEEE 802.11 wireless LANs with hidden node problem[J].Journal of Electrical Engineering,2018,69(4):323-325.
[7]ANIQUE A,SINEM C E.Directional MAC protocol for IEEE 802.11ad based wireless local area networks[J].Ad Hoc Networks,2018,69(C):49-64.
[8]GAN Z,JIA Y,HE M.A Bidirectional Polling MAC Mechanism for IoT[J].Electronics,2019,8(6):715.
[9]KORPI D.Full-duplex mobile device:Pushing the limits[J].IEEE Communication Magazine,2016,54(9):80-87.
[10]KIM D,LEE H,HONG D.A survey of in-band full-duplextransmission:From the perspective of PHY and MAC layers[J].IEEE Communications Surveys and Tutorials,2015,17(4):2017-2046.
[11]KIM J Y,MASHAYEKHIO,QU H,et al.Janus:A novel mac protocol for full duplex radio[OL].https://www.researchgate.net/publication/312662637_Janus_A_novel_MAC_protocol_for_full_duplex_radio.
[12]LIU S,HAN B,PENG W.A Polling-Based Traffic-Aware MAC Protocol for Centralized Full-Duplex Wireless Networks[J].IEEE Access,2018(6):28225- 28238.
[13]WU H W,ZOU Y T,SUN C,et al.A hybrid duplex MAC protocol for WLAN[J].Journal of Automation,2017,39(4):840-846.
[14]WAN Z P,PAN Z H,NI W C,et al.A Vehicle Mobile Internet of Things Coverage Enhancement Algorithm Based on Communication Duration Probability Analysis[J].IEEE Access,2019(7):98356-98365.
[15]PENG X,LI R F,LI Z T,et al.Vehicle Networking data distribution scheme based on intersection delay boundary[J].Journal of Communications,2017,38(4):25-34.
[16]LI D X,WU H,SHAN C L.Internet of things in industries:A survey[J].IEEE Transactions on Industrial Informatics,2014(10):2233-2243.
[17]KIRAN M P,SUBRAHMANYAM V,RAJALAKSHMI P.Novel power management scheme and effects of constrained on-node storage on performance of mac layer for industrial IoT networks[J].IEEE Transactions on Industrial Informatics,2018(14):2146-2158.
[1] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[2] TANG Qing-hua, WANG Mei, TANG Chao-chen, LIU Xin, LIANG Wen. PDR Indoor Positioning Method Based on M2M Encounter Region [J]. Computer Science, 2022, 49(9): 283-287.
[3] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[4] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
[5] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[6] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[7] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[8] XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406.
[9] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[10] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[11] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[12] SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216.
[13] CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300.
[14] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[15] LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!