1996
DOI: 10.1109/26.489093
|View full text |Cite
|
Sign up to set email alerts
|

Packet output processes of CSMA and CSMA/CD protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2001
2001
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…With the size variation of different types of slots being ignored, the virtual-slot system behaves stochastically similar to a slotted ALOHA [14] protocol. Therefore, the well-known S-G analysis [14], [15] for computing the maximum throughput can be extended to analyzing the virtual-slot system.…”
Section: Virtual-slot Based S-g Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…With the size variation of different types of slots being ignored, the virtual-slot system behaves stochastically similar to a slotted ALOHA [14] protocol. Therefore, the well-known S-G analysis [14], [15] for computing the maximum throughput can be extended to analyzing the virtual-slot system.…”
Section: Virtual-slot Based S-g Analysismentioning
confidence: 99%
“…At the steady state, a virtual-slot protocol in fact behaves similarly to a slotted ALOHA protocol, given the probabilities associated with the three types of virtual slots. It is well-known that the S-G analysis [14], [15] can be applied to obtain the maximum MAC capacity of slotted ALOHA. As a counterpart, we develop the virtual-slot based S-G (VS S-G) analysis as a generic approach to compute the optimal operation point and the corresponding maximum MAC capacity for all the CSMA/CA protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Although there are considerable work [3,4,5] on determining D*(s) for various CSMA protocols, these results do not consider the effect of common channel acknowledgment traffic. We note that Tobagi & Kleinrock [6] have investigated the throughput of both non-persistent and l-persistent CSMAPA protocols.…”
Section: Introductionmentioning
confidence: 92%
“…We obtain an explicit expression for D'(s) by solving a set of renewal equations each of which is derived by suitable choices of system regeneration points. We have successfully used this approach to obtain D'(s) for various CSMA and CSMA-CD protocols [5]. We shall also give an exact throughput expression for l-persistent CS-MAPA.…”
Section: Introductionmentioning
confidence: 98%
“…The Random Access mechanism, such as CSMA [12], permits to node send their frames when the shared bus is idle. In this time, two or more nodes may compete to achieve the shared bus, but ultimately one of them will win the competition.…”
Section: The Masquerade Failurementioning
confidence: 99%