A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cognitive multiple access via cooperation: Protocol design and performance analysis
2007
IEEE Transactions on Information Theory
Therefore, no extra channel resources are allocated for cooperation and the system encounters no bandwidth losses. Two protocols are developed to implement the proposed multiple-access strategy. ...
The maximum stable throughput region and the delay performance of the proposed protocols are characterized. ...
DELAY ANALYSIS In this section, we characterize the delay performance of the proposed cognitive cooperative multiple-access protocols, CCMA-S and CCMA-Me.
A. ...
doi:10.1109/tit.2007.904784
fatcat:xut2y665xjfadikabwsp7gqcte
Random Multiple Access Scheme Protocol
2019
Zenodo
Abstract: This paper considers random access protocol, which is part of multiple access scheme protocol. ...
It focuses on carrying out a background research of the Aloha and CSMA family in terms of performance, throughput and offered load. ...
ACKNOWLEDGMENT We want to use this medium to appreciate the Nigeria Society for Mathematical Biology, for organizing the annual IWMMAS conference, which provides a platform to disseminate and discuss research ...
doi:10.5281/zenodo.4453816
fatcat:5qy5dacownhntnkie5fde4kaga
Asymptotic performance analysis of hybrid ARQ protocols in slotted direct-sequence code division multiple-access networks
1989
IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies
This paper examines the steady-state and dynamic performance of Type 1 Hybrid ARQ protocols in slotted direct-sequence code-division multiple-access networks. ...
network performance. ...
I Introduction Code division multiple-access (CDMA) continues to receive interest as a viable network multiple accessing technique for both civilian and military applications. ...
doi:10.1109/infcom.1989.101502
dblp:conf/infocom/HanrattyS89
fatcat:i5vojah4f5bl7bokqlletjnqv4
Covert channels in multiple access protocols
2011
Computer communication review
In this paper, the use of structural behavior of communication protocols in designing new covert channels is investigated. ...
In this way, a new covert transmitter is designed based on a modified CSMA protocol that enables the transmitter to embed a covert message in its overt traffic. ...
PERFORMANCE ANALYSIS RESULTS The performance analysis is performed on four scenarios (Table 1 ) using a CSMA testbed with Slot time = 20μs, SIFS = 10μs, DIFS = 50μs, Payload = 1.5KB, and Channel overt ...
doi:10.1145/2043164.2018490
fatcat:2cos6v7ppbh2jeiu4vzqxvhnsu
Covert channels in multiple access protocols
2011
Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11
In this paper, the use of structural behavior of communication protocols in designing new covert channels is investigated. ...
In this way, a new covert transmitter is designed based on a modified CSMA protocol that enables the transmitter to embed a covert message in its overt traffic. ...
PERFORMANCE ANALYSIS RESULTS The performance analysis is performed on four scenarios (Table 1 ) using a CSMA testbed with Slot time = 20μs, SIFS = 10μs, DIFS = 50μs, Payload = 1.5KB, and Channel overt ...
doi:10.1145/2018436.2018490
dblp:conf/sigcomm/AhmadzadehA11
fatcat:3cs5efaj7babnpxpg3wquawvwi
Performance Analysis and Design of Non-orthogonal Multiple Access for Wireless Communications
[article]
2019
arXiv
pre-print
In this thesis, we study performance analysis and resource allocation designs for non-orthogonal multiple access (NOMA) in wireless communication systems. ...
In contrast to conventional orthogonal multiple access (OMA) schemes, NOMA allows multiple users to share the same degree of freedom via superposition coding and the successive interference cancelation ...
multiple access schemes. ...
arXiv:1910.00946v1
fatcat:p25bht4j2vaynfdj3xxi7hl3du
Multiple access protocol for power-controlled wireless access nets
2004
IEEE Transactions on Mobile Computing
In this paper, we develop and investigate a new joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets). ...
A hierarchical network architecture is synthesized, consisting of Access Nets (ANets) and Backbone Nets (BNets). ...
In [26] , a power controlled multiple access protocol is introduced for supporting packetized data traffic in wireless networks. ...
doi:10.1109/tmc.2004.44
fatcat:qj7iajtzbzepdnpkuvfoy5opdq
Multiple-access protocols and time-constrained communication
1984
ACM Computing Surveys
Different proposed protocols are then described and discussed, and aspects of their performance are examined. ...
A taxonomy for multiple-access protocols is then developed in order to characterize common approaches and to provide a framework within which these protocols can be compared and contrasted. ...
ACKNOWLEDGMENTS The authors are grateful to Bruce Hillyer, Jonathan Gross, and other colleagues for many helpful comments and suggestions on earlier versions of this paper. ...
doi:10.1145/861.870
fatcat:natjoaqrejhy7dkuopyfwiuswi
Collaborative Multiple-Access Protocols for Wireless Networks
2006
2006 IEEE International Conference on Communications
This will better utilize the channel resources and will introduce on-demand spatial diversity into the network. Two different protocols are proposed to implement this new multiple-access scheme. ...
Numerical results indicate a significant increase in the maximum stable throughput by using the new multiple-access protocol over pure TDMA. ...
This motivated us to study the implementation of new multiple-access protocols for relay-based wireless networks. ...
doi:10.1109/icc.2006.255347
dblp:conf/icc/SadekLE06
fatcat:k5f52uqcqbcqvhwvgdkqw3vp7y
Performance Analysis of Multiple Access Protocol for Maritime VHF Data Exchange System (VDES)
해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구
2014
The Journal of the Korean Institute of Information and Communication Engineering
해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구
CS-TDMA, a multiple access method of AIS class B, is recommended as that of the VDE. ...
To this end, the performance of CS-TDMA, which includes the number of received packets, reception success rate, channel utilization, and collision rate, is investigated via a simulation. ...
또 한, AIS의 채널을 효율적으로 사용하기 위해 class A에 서 점유된 시간 슬럿을 제외한 나머지 시간 슬럿들에서 반송파를 감지하여 유휴 시간 슬럿을 점유하는 class B 의 다중 접속 방식인 CS-TDMA (Carrier Sense-Time Division Multiple Access)를 다중 접속 방식으로 사용 하도록 권고하고 있다[10]. ...
doi:10.6109/jkiice.2014.18.12.2839
fatcat:uamh3b6zynhjtjjx472atv7w6u
Slotted Carrier Sense Multiple Access Protocols- A Review
2013
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
This paper focuses on slotted CSMA/CA and tries to find out its limitations of the slotted CSMA/CA protocols. ...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. ...
A suitable simulation will be performed and various parameters regarding wireless networks and CSMA/CA will also be calculated in order to do performance analysis. ...
doi:10.24297/ijmit.v7i2.3258
fatcat:rql5ikxrefalhesavqwdwwb3de
Satellite Packet Communication--Multiple Access Protocols and Performance
1979
IRE Transactions on Communications Systems
A/uslruct-A study of the design requirements of the data link control protocol leads us to consider a throughput time delay criterion as a performance measure for optimal flow control of computer communication ...
Therefore, in order to design an efficient protocol it is imperative to have knowledge of the maximum time delay a packet requires to be transmitted and acknowledged under normal conditions. ...
ACKNOWLEDGMENT The authors wish to acknowledge the advice and criticism of Prof. Toby Berger of Cornell University, Ithaca, NY. ...
doi:10.1109/tcom.1979.1094313
fatcat:t5j7nf5csrb2rj6ct65lwfufem
Performance Analysis of Network Diversity Multiple Access with Sequential Terminal Detection and Non-Orthogonal Training Sequences
2018
2018 IEEE 87th Vehicular Technology Conference (VTC Spring)
The analysis here presented includes the effects of multiple access interference caused by non orthogonal training sequences and the effect of sequential collision multiplicity estimation. ...
The analysis here presented includes the effects of MAI caused by non orthogonal training sequences and the effect of sequential collision multiplicity estimation. ...
ACKNOWLEDGMENTS This work was partially supported by National Funds through FCT (Portuguese Foundation for Science and Technology) within the CISTER Research Unit (CEC/04234); also by FCT and the EU ECSEL ...
doi:10.1109/vtcspring.2018.8417722
dblp:conf/vtc/Samano-Robles18
fatcat:p4v6x5gvtvfe3nitmo25eltgyq
Multiple-metric hybrid anycast protocol for heterogeneous access networks
2011
International Journal of Ad Hoc and Ubiquitous Computing
We propose a new hybrid proactive/reactive anycast routing protocol that integrates multiple-metrics to calculate path cost and selects the appropriate AP. ...
Simulation analysis shows that our approach outperforms single-metric protocols while supporting flexible service criteria, including load balancing at APs. ...
CNS-0721666, CNS-0915331, and CNS-1050398, and by Tsinghua National Laboratory for Information Science and Technology (TNList). ...
doi:10.1504/ijahuc.2011.041614
fatcat:ysj5q3gfmrbqdlwa3wrh4psema
Online Distributed Evolutionary Optimization of Time Division Multiple Access Protocols
[article]
2022
arXiv
pre-print
We test this approach with a 3-state Time Division Multiple Access (TDMA) Medium Access Control (MAC) protocol and we observe its emergence in networks of various scales and with various settings. ...
We also show how Distributed Hill Climbing can reach different trade-offs in terms of energy consumption and protocol performance. ...
protocols [37, 38, 39] , or MAC access protocols [40, 41] . ...
arXiv:2204.13190v1
fatcat:3rlqaq2pynbpzclyzq7plbo2qe
« Previous
Showing results 1 — 15 out of 1,133,610 results