The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we examine the effect of retransmission cutoff in slotted ALOHA systems employing the binary exponential backoff (BEB) algorithm, in terms of throughput and delay performance, system stability and packet dropping probability. For comparison, the performance of the BEB algorithm without retransmission cutoff is presented. We consider a finite population of users competing for channel...
This paper proposes a heartbeat radio access protocol for a mobile ad-hoc network based on a random access protocol using a high-throughput and stable single-channel Q-ary free-access collision resolution algorithm. We provide an analytical derivation of the performance of this free-access collision resolution algorithm in the presence of feedback channel errors that may be present in the mobile radio...
This paper proposes an efficient uplink scheduling algorithm that can perfectly support various VoIP CODECs with VAD/DTX/CNG in M-WiMAX considering the variants of silence duration between different voice users, solving the problems of uplink resources wastes and overwhelmingly large overhead that caused during silence period. In our proposed algorithm, efficient schemes is proposed to implement the...
This paper first described the IEEE 802.11 MAC layer access control mechanism, that is, the DCF access control mechanism, analysis the basic DCF back-off algorithm BEB. Next, we study a variety of improved BEB algorithms, and then we proposed ZDCF back-off algorithm which is an exponential-based half back-off algorithm. ZDCF is flexible, easy to implement and has excellent performance as BEB algorithms...
In this paper we investigate the potential benefits of a selective delayed channel access algorithm (SDCA) for the future IEEE 802.11n based high-throughput networks. The proposed solution aims to resolve the poor channel utilization and the low efficiency that EDCA's high priority stations adhere due to shorter waiting times and consequently to the network's degrading overall end performance. The...
In this paper we consider a centralized cross-layer splitting algorithm of a multi-packet reception slotted ALOHA system for contention resolution. In the algorithm, a base station estimates the number of backlogged mobile terminals by using a first-order auto-regressive (AR) model based on the number of packets successfully transmitted over previous contention resolution intervals (CRIs). Estimation...
PON (passive optical network) is the most promising technology applicable to TPS (triple play service). To improve processing the packet, MAC (multiple access control) is the most important technology in the PON. The core of MAC is DBA(dynamic bandwidth assignment), it classifies SR-DBA (status report DBA) and NSR-DBA (non status report DBA). However, it's bad in network efficiency because GPON DBA...
Based on the protocol of IEEE 802.11 for ad hoc networks, the distributed coordination function (DCF) of ad hoc networks was modified, and an adaptive minimum contention window binary exponential backoff algorithm (AWBEB algorithm) was presented. We use a 2D Markov chain model to educe the stationary distribution probabilities and the probability that a given node will transmit in an arbitrary time...
The study of random access protocols has recently regained attention due to new cross-layer schemes such as multipacket reception (MPR) systems and network diversity multiple access protocols (NDMA). Despite their relevance, these two systems have only been simultaneously studied employing finite user population models and considering perfect detection of the active users, which are assumptions only...
VoIP over WLAN (VoWLAN) has become increasingly popular. But some limitations of IEEE 802.11 point coordination function (PCF) make IEEE 802.11 WLAN not meet the requirements of real-time traffic such as VoIP. In this paper, we analyze the polling scheme and its limitation of the PCF of IEEE 802.11 WLAN. Based on that, we propose an improved deficit round robin (DRR) polling scheduling algorithm,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.