1979
DOI: 10.1109/tcom.1979.1094474
|View full text |Cite
|
Sign up to set email alerts
|

An Assigned-Slot Listen-Before-Transmission Protocol for a Multiaccess Data Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

1980
1980
2010
2010

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…For high throughput, M/L = 1 is found to be optimum. In fact, with MIL = 1, the scheme becomes a conflict-free one which approaches MSAP and gives nearly identical results [49]. For very low throughput, MIL = M (i.e., L = 1) is found to be optimum; this corresponds to pure CSMA.…”
Section: ) a Round-robin (Rr) Reservation Scheme [47]mentioning
confidence: 89%
“…For high throughput, M/L = 1 is found to be optimum. In fact, with MIL = 1, the scheme becomes a conflict-free one which approaches MSAP and gives nearly identical results [49]. For very low throughput, MIL = M (i.e., L = 1) is found to be optimum; this corresponds to pure CSMA.…”
Section: ) a Round-robin (Rr) Reservation Scheme [47]mentioning
confidence: 89%
“…In this paper, an updated version of the Assigned-Slot access method (Hansen and Schwartz 1977;1979) has been analyzed using simulation. Although it used the same general idea of the original Assigned-Slot scheme, the updated version includes current local network technologies such as the collision detection capability and includes realistic assumptions such as the presence of queues within the network nodes.…”
Section: Discussionmentioning
confidence: 99%
“…The related protocol which is the basis for this paper was proposed by Hansen and Schwartz (1977;1979). This protocol is called the Assigned-Slot Listen-Before-Transmission Protocol.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Medium access control (MAC) layer protocols can be classified into two approaches: distributed control schemes [5]- [6] and centralized control schemes [7]- [9]. In general, centralized control with a polling mechanism can realize prioritized control more easily than distributed control schemes.…”
Section: Introductionmentioning
confidence: 99%