By Topic

Handoff Assigned Multiple Access (HAMA): A New Multiple Access Protocol for Computer Communication Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Warner, Clifford ; Code 8112, Naval Ocean Systems Center, San Diego, California 92152, (619) 225-7451 ; Merk, Roger ; Brown, Gary J. ; Keune, C.M.

The Handoff Assigned Multiple Access (HAMA) protocol has been designed to meet the performane requirements of the Tactical Intra-task Force Network, a hypothetical mobile Navy broadcast radio network. This packet switched network will facilitate the transmission and reception of target track data and various command and control messages between Navy platforms (ships) in a dynamic, tactical environment. The unique characteristics and requirement of the TACNET resulted in the development of the HAMA multiple access protocol. The protocol is based on Time Division Multiple Access, in which the communication channel is divided into time frames, which are further subdivided into time slots. Each network node (ship) is assigned a particular slot, with exactly one slot for each node. With HAMA each node is allowed to handoff its slot to other network nodes. Thus, a node which has no use for its slot can dynamically hand it off to another node which does need it. Analysis of the protocol, both analytical and by simulation, indicates it performs remarkably well, much better than Time Division Multiple Access (TDMA) even at very high throughputs. Of particular importance to military networks, the analysis results indicate the protocol is very robust, and performs well under a variety of tactical conditions.

Published in:

Military Communications Conference, 1983. MILCOM 1983. IEEE  (Volume:1 )

Date of Conference:

Oct. 31 1983-Nov. 2 1983