2008
DOI: 10.1007/s11235-008-9103-3
|View full text |Cite
|
Sign up to set email alerts
|

Markov chain model for performance analysis of transmitter power control in contention based wireless MAC protocol

Abstract: We have developed a three-state discrete-time Markov-chain model for the performance evaluation of contention-based medium access control (MAC) protocol. The proposed Markov-chain model is then used to analyze the carrier sense multiple access (CSMA) type MAC protocol for its delay and throughput characteristics with and without transmitter power control. Using simulations, the conditional capture probability (p cap ), which gives a measure of the effectiveness of transmitter power control due to the capture e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Description Throughput [228] Markov chains have been used to analyze the carrier sense multiple access (CSMA) type MAC protocol for its delay and throughput characteristics with and without transmitter power control [229] Analyzed the achievable region of the throughput in a slotted ALOHA-based two-way relay network by using Markov chains [230] Analyzed the number of polls (NPS) in Wimax networks based on the Markov chain analysis for minimizing the average polling delay while increasing network throughput Latency [231] Using Markov chains, the authors investigate the effect of finite buffer sizes on the throughput capacity and latency in terms of packet delay of line network with packet erasure links that have perfect feedback [232] A Markov chain method has been proposed in order to estimate the throughput and average latency in wireless erasure networks with nodes having finite buffers Resilience [233] Reliability Assessment of resilient packet ring (RPR) is carried out using Markov chains [234] Error resilience parameters are proposed for Mobile AdHoc Network (MANET) network scenarios as an appropriate error resilience configuration, which are then analyzed using Markov chains [235] Using Markov chains, the authors systematically analyze the features of resilience to failures and attacks of the current structured P2P systems in terms of average path length and hit ratio and understand the causes, which lead to better resilience features. [236] The author discusses business impact analysis in the context of resilient communication networks.…”
Section: Network Metricsmentioning
confidence: 99%
“…Description Throughput [228] Markov chains have been used to analyze the carrier sense multiple access (CSMA) type MAC protocol for its delay and throughput characteristics with and without transmitter power control [229] Analyzed the achievable region of the throughput in a slotted ALOHA-based two-way relay network by using Markov chains [230] Analyzed the number of polls (NPS) in Wimax networks based on the Markov chain analysis for minimizing the average polling delay while increasing network throughput Latency [231] Using Markov chains, the authors investigate the effect of finite buffer sizes on the throughput capacity and latency in terms of packet delay of line network with packet erasure links that have perfect feedback [232] A Markov chain method has been proposed in order to estimate the throughput and average latency in wireless erasure networks with nodes having finite buffers Resilience [233] Reliability Assessment of resilient packet ring (RPR) is carried out using Markov chains [234] Error resilience parameters are proposed for Mobile AdHoc Network (MANET) network scenarios as an appropriate error resilience configuration, which are then analyzed using Markov chains [235] Using Markov chains, the authors systematically analyze the features of resilience to failures and attacks of the current structured P2P systems in terms of average path length and hit ratio and understand the causes, which lead to better resilience features. [236] The author discusses business impact analysis in the context of resilient communication networks.…”
Section: Network Metricsmentioning
confidence: 99%
“…The performances of CSMA/CA networks in infrastructure mode has been well investigated (in [21,34,35,28] for example). But, there are only a few studies dealing with the performances of the CSMA/CA mechanism in ad hoc mode, in particular about its capacity, spatial reuse and interference.…”
Section: Introductionmentioning
confidence: 99%