1984
DOI: 10.1109/jsac.1984.1146040
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Simulation Technique for Performance Studies of CSMA/CD Local Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Year Published

1986
1986
2005
2005

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Examples of distributed MAC protocols are ALOHA [3], Carrier Sense Multiple Access/Collision Detection (CSMA/ CD) [5], [6], [7], [8], [9], and Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) [10], [11], [12], whereas an example of centralized MAC protocol is HIPERLAN [1], [2]. For the present work, a p-CSMA type access strategy for medium access is considered.…”
Section: Access Gamementioning
confidence: 99%
See 1 more Smart Citation
“…Examples of distributed MAC protocols are ALOHA [3], Carrier Sense Multiple Access/Collision Detection (CSMA/ CD) [5], [6], [7], [8], [9], and Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) [10], [11], [12], whereas an example of centralized MAC protocol is HIPERLAN [1], [2]. For the present work, a p-CSMA type access strategy for medium access is considered.…”
Section: Access Gamementioning
confidence: 99%
“…We now discuss this characteristic in some detail. It can be said that the formulation of the "Access Game" in this paper has a fairness-bias, i.e., achieving fairness in a distributed medium access scenario is the primary concern and this concern has been incorporated in the form of the fairness conditions in (8). Therefore, it is no surprise that the proposed solution does indeed result in fairness.…”
mentioning
confidence: 98%
“…Ethernet behavior has been extensively studied both analytically [1,5,8,9,11,16,17,3,21,32,34,33,31,30] and through simulation models [1,14,19,23,22,24,36]. Most analytical models developed, make assumptions about one or more parameters: packet size, cable length, population size etc.…”
Section: Related Workmentioning
confidence: 99%
“…To complement analysis, several simulation models of Ethernet have been presented [1,14,19,23,22,24,36]. Many of the simulation models represent the Ethernet as a point-to-point link with special characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…An overview of hybrid techniques is given *in [13]. Several specific studies [36,37] will be summarized in the following sections.e " Four cases where hybrid techniques have been applied to queueing system *simulation will be reviewed here relative to their applicability to PCNSAS.…”
mentioning
confidence: 99%