Filters








1,133,610 Hits in 6.2 sec

Cognitive multiple access via cooperation: Protocol design and performance analysis

Ahmed K. Sadek, K.J. Ray Liu, Anthony Ephremides
2007 IEEE Transactions on Information Theory  
Therefore, no extra channel resources are allocated for cooperation and the system encounters no bandwidth losses. Two protocols are developed to implement the proposed multiple-access strategy.  ...  The maximum stable throughput region and the delay performance of the proposed protocols are characterized.  ...  DELAY ANALYSIS In this section, we characterize the delay performance of the proposed cognitive cooperative multiple-access protocols, CCMA-S and CCMA-Me. A.  ... 
doi:10.1109/tit.2007.904784 fatcat:xut2y665xjfadikabwsp7gqcte

Random Multiple Access Scheme Protocol

Douglas Ikiomoye Emmanuel, Rotimi-Williams Bello, Domor Mienye Ibomoiye
2019 Zenodo  
Abstract: This paper considers random access protocol, which is part of multiple access scheme protocol.  ...  It focuses on carrying out a background research of the Aloha and CSMA family in terms of performance, throughput and offered load.  ...  ACKNOWLEDGMENT We want to use this medium to appreciate the Nigeria Society for Mathematical Biology, for organizing the annual IWMMAS conference, which provides a platform to disseminate and discuss research  ... 
doi:10.5281/zenodo.4453816 fatcat:5qy5dacownhntnkie5fde4kaga

Asymptotic performance analysis of hybrid ARQ protocols in slotted direct-sequence code division multiple-access networks

J.M. Hanratty, G.L. Stuber
1989 IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies  
This paper examines the steady-state and dynamic performance of Type 1 Hybrid ARQ protocols in slotted direct-sequence code-division multiple-access networks.  ...  network performance.  ...  I Introduction Code division multiple-access (CDMA) continues to receive interest as a viable network multiple accessing technique for both civilian and military applications.  ... 
doi:10.1109/infcom.1989.101502 dblp:conf/infocom/HanrattyS89 fatcat:i5vojah4f5bl7bokqlletjnqv4

Covert channels in multiple access protocols

Seyed Ali Ahmadzadeh, Gordon Agnew
2011 Computer communication review  
In this paper, the use of structural behavior of communication protocols in designing new covert channels is investigated.  ...  In this way, a new covert transmitter is designed based on a modified CSMA protocol that enables the transmitter to embed a covert message in its overt traffic.  ...  PERFORMANCE ANALYSIS RESULTS The performance analysis is performed on four scenarios (Table 1 ) using a CSMA testbed with Slot time = 20μs, SIFS = 10μs, DIFS = 50μs, Payload = 1.5KB, and Channel overt  ... 
doi:10.1145/2043164.2018490 fatcat:2cos6v7ppbh2jeiu4vzqxvhnsu

Covert channels in multiple access protocols

Seyed Ali Ahmadzadeh, Gordon Agnew
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
In this paper, the use of structural behavior of communication protocols in designing new covert channels is investigated.  ...  In this way, a new covert transmitter is designed based on a modified CSMA protocol that enables the transmitter to embed a covert message in its overt traffic.  ...  PERFORMANCE ANALYSIS RESULTS The performance analysis is performed on four scenarios (Table 1 ) using a CSMA testbed with Slot time = 20μs, SIFS = 10μs, DIFS = 50μs, Payload = 1.5KB, and Channel overt  ... 
doi:10.1145/2018436.2018490 dblp:conf/sigcomm/AhmadzadehA11 fatcat:3cs5efaj7babnpxpg3wquawvwi

Performance Analysis and Design of Non-orthogonal Multiple Access for Wireless Communications [article]

Zhiqiang Wei
2019 arXiv   pre-print
In this thesis, we study performance analysis and resource allocation designs for non-orthogonal multiple access (NOMA) in wireless communication systems.  ...  In contrast to conventional orthogonal multiple access (OMA) schemes, NOMA allows multiple users to share the same degree of freedom via superposition coding and the successive interference cancelation  ...  multiple access schemes.  ... 
arXiv:1910.00946v1 fatcat:p25bht4j2vaynfdj3xxi7hl3du

Multiple access protocol for power-controlled wireless access nets

A. Behzad, Z. Rubin
2004 IEEE Transactions on Mobile Computing  
In this paper, we develop and investigate a new joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets).  ...  A hierarchical network architecture is synthesized, consisting of Access Nets (ANets) and Backbone Nets (BNets).  ...  In [26] , a power controlled multiple access protocol is introduced for supporting packetized data traffic in wireless networks.  ... 
doi:10.1109/tmc.2004.44 fatcat:qj7iajtzbzepdnpkuvfoy5opdq

Multiple-access protocols and time-constrained communication

James F. Kurose, Mischa Schwartz, Yechiam Yemini
1984 ACM Computing Surveys  
Different proposed protocols are then described and discussed, and aspects of their performance are examined.  ...  A taxonomy for multiple-access protocols is then developed in order to characterize common approaches and to provide a framework within which these protocols can be compared and contrasted.  ...  ACKNOWLEDGMENTS The authors are grateful to Bruce Hillyer, Jonathan Gross, and other colleagues for many helpful comments and suggestions on earlier versions of this paper.  ... 
doi:10.1145/861.870 fatcat:natjoaqrejhy7dkuopyfwiuswi

Collaborative Multiple-Access Protocols for Wireless Networks

Ahmed Sadek, K. Ray Liu, Anthony Ephremides
2006 2006 IEEE International Conference on Communications  
This will better utilize the channel resources and will introduce on-demand spatial diversity into the network. Two different protocols are proposed to implement this new multiple-access scheme.  ...  Numerical results indicate a significant increase in the maximum stable throughput by using the new multiple-access protocol over pure TDMA.  ...  This motivated us to study the implementation of new multiple-access protocols for relay-based wireless networks.  ... 
doi:10.1109/icc.2006.255347 dblp:conf/icc/SadekLE06 fatcat:k5f52uqcqbcqvhwvgdkqw3vp7y

Performance Analysis of Multiple Access Protocol for Maritime VHF Data Exchange System (VDES)
해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구

Changho Yun, A-Ra Cho, Seung-Geun Kim, Yong-Kon Lim
2014 The Journal of the Korean Institute of Information and Communication Engineering  
CS-TDMA, a multiple access method of AIS class B, is recommended as that of the VDE.  ...  To this end, the performance of CS-TDMA, which includes the number of received packets, reception success rate, channel utilization, and collision rate, is investigated via a simulation.  ...  또 한, AIS의 채널을 효율적으로 사용하기 위해 class A에 서 점유된 시간 슬럿을 제외한 나머지 시간 슬럿들에서 반송파를 감지하여 유휴 시간 슬럿을 점유하는 class B 의 다중 접속 방식인 CS-TDMA (Carrier Sense-Time Division Multiple Access)를 다중 접속 방식으로 사용 하도록 권고하고 있다[10].  ... 
doi:10.6109/jkiice.2014.18.12.2839 fatcat:uamh3b6zynhjtjjx472atv7w6u

Slotted Carrier Sense Multiple Access Protocols- A Review

Kulbir Kaur, Kiran Kumar
2013 INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY  
This paper focuses on slotted CSMA/CA and tries to find out its limitations of the slotted CSMA/CA protocols.  ...  CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules.  ...  A suitable simulation will be performed and various parameters regarding wireless networks and CSMA/CA will also be calculated in order to do performance analysis.  ... 
doi:10.24297/ijmit.v7i2.3258 fatcat:rql5ikxrefalhesavqwdwwb3de

Satellite Packet Communication--Multiple Access Protocols and Performance

S. Lam
1979 IRE Transactions on Communications Systems  
A/uslruct-A study of the design requirements of the data link control protocol leads us to consider a throughput time delay criterion as a performance measure for optimal flow control of computer communication  ...  Therefore, in order to design an efficient protocol it is imperative to have knowledge of the maximum time delay a packet requires to be transmitted and acknowledged under normal conditions.  ...  ACKNOWLEDGMENT The authors wish to acknowledge the advice and criticism of Prof. Toby Berger of Cornell University, Ithaca, NY.  ... 
doi:10.1109/tcom.1979.1094313 fatcat:t5j7nf5csrb2rj6ct65lwfufem

Performance Analysis of Network Diversity Multiple Access with Sequential Terminal Detection and Non-Orthogonal Training Sequences

Ramiro Samano-Robles
2018 2018 IEEE 87th Vehicular Technology Conference (VTC Spring)  
The analysis here presented includes the effects of multiple access interference caused by non orthogonal training sequences and the effect of sequential collision multiplicity estimation.  ...  The analysis here presented includes the effects of MAI caused by non orthogonal training sequences and the effect of sequential collision multiplicity estimation.  ...  ACKNOWLEDGMENTS This work was partially supported by National Funds through FCT (Portuguese Foundation for Science and Technology) within the CISTER Research Unit (CEC/04234); also by FCT and the EU ECSEL  ... 
doi:10.1109/vtcspring.2018.8417722 dblp:conf/vtc/Samano-Robles18 fatcat:p4v6x5gvtvfe3nitmo25eltgyq

Multiple-metric hybrid anycast protocol for heterogeneous access networks

Lijuan Cao, Kashif Sharif, Teresa A. Dahlberg, Yu Wang
2011 International Journal of Ad Hoc and Ubiquitous Computing  
We propose a new hybrid proactive/reactive anycast routing protocol that integrates multiple-metrics to calculate path cost and selects the appropriate AP.  ...  Simulation analysis shows that our approach outperforms single-metric protocols while supporting flexible service criteria, including load balancing at APs.  ...  CNS-0721666, CNS-0915331, and CNS-1050398, and by Tsinghua National Laboratory for Information Science and Technology (TNList).  ... 
doi:10.1504/ijahuc.2011.041614 fatcat:ysj5q3gfmrbqdlwa3wrh4psema

Online Distributed Evolutionary Optimization of Time Division Multiple Access Protocols [article]

Anil Yaman, Tim van der Lee, Giovanni Iacca
2022 arXiv   pre-print
We test this approach with a 3-state Time Division Multiple Access (TDMA) Medium Access Control (MAC) protocol and we observe its emergence in networks of various scales and with various settings.  ...  We also show how Distributed Hill Climbing can reach different trade-offs in terms of energy consumption and protocol performance.  ...  protocols [37, 38, 39] , or MAC access protocols [40, 41] .  ... 
arXiv:2204.13190v1 fatcat:3rlqaq2pynbpzclyzq7plbo2qe
« Previous Showing results 1 — 15 out of 1,133,610 results