2009
DOI: 10.1007/s00446-009-0086-4
|View full text |Cite
|
Sign up to set email alerts
|

Maximum throughput of multiple access channels in adversarial environments

Abstract: We consider deterministic distributed broadcasting on multiple access channels in the framework of adversarial queuing. Packets are injected dynamically by an adversary that is constrained by the injection rate and the number of packets that may be injected simultaneously; the latter we call burstiness. A protocol is stable when the number of packets in queues at the stations stays bounded. The maximum injection rate that a protocol can handle in a stable manner is called the throughput of the protocol. We con… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 41 publications
(57 citation statements)
references
References 31 publications
1
56
0
Order By: Relevance
“…We evaluate the ratio of the performance of a distributed online algorithm ALG against an optimal algorithm OPT. For one hop networks it is known [10] that no protocol is both stable (i.e., bounded number of packets in the system at any time) and fair (i.e., every packet is eventually delivered). For multihop networks the same result holds as a natural extension of the single hop model.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…We evaluate the ratio of the performance of a distributed online algorithm ALG against an optimal algorithm OPT. For one hop networks it is known [10] that no protocol is both stable (i.e., bounded number of packets in the system at any time) and fair (i.e., every packet is eventually delivered). For multihop networks the same result holds as a natural extension of the single hop model.…”
Section: Preliminariesmentioning
confidence: 99%
“…Define a Move-big-to-front (MBTF) list [10] of source nodes, initially in any order. According to this list, source nodes circulate a token.…”
Section: A Dynamic Multiple-message Broadcast Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Each internal state stipulates whether the pending packet is to be transmitted towards the sink in the current round. Our other assumption is that the protocol is acknowledgment-based [9]. This means that the state of every node depends only on: (1) the number of nodes in the network; (2) the identity of the node; (3) the number of rounds elapsed since the currently processed packet became the first in the FIFO buffer at the node.…”
Section: A Lower Bound For Distributed Algorithmsmentioning
confidence: 99%