dc.contributor.author |
Protonotarios, EN |
en |
dc.contributor.author |
Sykas, ED |
en |
dc.date.accessioned |
2014-03-01T02:40:50Z |
|
dc.date.available |
2014-03-01T02:40:50Z |
|
dc.date.issued |
1986 |
en |
dc.identifier.issn |
01912216 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30243 |
|
dc.subject |
Adaptive Protocol |
en |
dc.subject |
Analytical Model |
en |
dc.subject |
Multiple Access Protocols |
en |
dc.subject |
Queueing Analysis |
en |
dc.subject |
exponential backoff |
en |
dc.subject.other |
COMPUTER NETWORKS - Protocols |
en |
dc.subject.other |
DATA TRANSMISSION - Packet Switching |
en |
dc.subject.other |
MULTIPLEXING, TIME DIVISION |
en |
dc.subject.other |
PROBABILITY - Queueing Theory |
en |
dc.subject.other |
CSMA PROTOCOLS |
en |
dc.subject.other |
MULTIPLE ACCESS PROTOCOLS (MAP) |
en |
dc.subject.other |
QUEUEING ANALYSIS |
en |
dc.subject.other |
RESERVATION TDMA |
en |
dc.subject.other |
RESTRICTED BACKLOG PROTOCOLS |
en |
dc.subject.other |
DIGITAL COMMUNICATION SYSTEMS |
en |
dc.title |
QUEUEING ANALYSIS OF CSMA PROTOCOLS. |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/CDC.1986.267598 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/CDC.1986.267598 |
en |
heal.publicationDate |
1986 |
en |
heal.abstract |
The authors consider an approach that provides for stability and is of an adaptive nature. The basic idea is to alternate CSMA (with and without collision detection) and reservation TDMA periods. The operation of the CSMA (/CD) protocol is interrupted once in a while so that a reservation TDMA epoch will start. Several criteria which may be used in order to define switching rules from CSMA (/CD) periods to reservation TDMA periods are proposed. Analytical models for the description of the restricted backlog protocols in which the size of busy user population is the switching criterion are developed. Their performance is compared with that of the pure CSMA (/CD), reservation TDMA, and other similar adaptive protocols, and it is shown that the restricted backlog protocols exhibit the best throughput-delay characteristics for both low and high channel utilization. |
en |
heal.publisher |
IEEE, New York, NY, USA |
en |
heal.journalName |
Proceedings of the IEEE Conference on Decision and Control |
en |
dc.identifier.doi |
10.1109/CDC.1986.267598 |
en |
dc.identifier.spage |
1322 |
en |
dc.identifier.epage |
1329 |
en |