{"title":"Full duplex state transition analysis for MAC sublayer state machine of CCSDS Proximity-1","authors":"Laibo Zheng, Zijing Cheng","doi":"10.1109/ICCCHINAW.2016.7586714","DOIUrl":null,"url":null,"abstract":"In this paper, we first introduce the CCSDS Proximity-1 protocol and its MAC sublayer state machine. Then we analyze the state transition of state machine under full duplex mode by decomposing the complex state transition diagram into different simple procedures, which make the complex state transition diagram simple and easy to understand. Considering there are some careless omissions in the Proximity-1 protocol document, to understand every step is essential for protocol implementation. Though we only give the analysis of the full duplex mode, the proposed method can also be applied to half duplex mode.","PeriodicalId":125877,"journal":{"name":"2016 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCHINAW.2016.7586714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we first introduce the CCSDS Proximity-1 protocol and its MAC sublayer state machine. Then we analyze the state transition of state machine under full duplex mode by decomposing the complex state transition diagram into different simple procedures, which make the complex state transition diagram simple and easy to understand. Considering there are some careless omissions in the Proximity-1 protocol document, to understand every step is essential for protocol implementation. Though we only give the analysis of the full duplex mode, the proposed method can also be applied to half duplex mode.