Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that is widely used in distributed MAC protocols, for example, IEEE 802.11 DCF. We begin with a generalized framework of modeling BEBA. Then we identify a key difference between BEBA and the commonly-assumed p-persistent model: due to the characteristics of BEBA, the slot suc-ceeding a busy period has a different contention rate from other slots. This causes access to a slot to be non-uniform and dependent on whether or not the slot immediately follows a busy period. We propose a detailed model with the use of a Markov chain to faithfully describe the channel activities governed by BEBA. To reduce the computational complexity, we simpli...
Abstract — Recently, Ethernet celebrated its twentieth anniversary. Over those years, the processing...
AbstractThe Backoff Algorithm is the heart of Medium Access Control(MAC) protocol which determines t...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
In wireless communication environments, backoff is traditionally based on the IEEE binary exponentia...
The IEEE 802.15.3 medium access control (MAC) is proposed, especially, for wireless personal area n...
Abstract — the field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of adva...
Abstract: The Medium Access Control (MAC) protocol is the main element which determines the system t...
this paper, by modeling the exponential backoff process as a Markov chain, we can use the signal tra...
Furthermore, we show that geometric retransmission algorithm is intrinsically unstable for large pop...
In the field of wireless networks one of the arduous assignments is to design an efficient MAC schem...
Abstract- The collision probability in the MAC layer could become very high when a poor backoff algo...
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general ...
A generalized analysis of the IEEE 802.15.4 medium access control (MAC) protocol in terms of reliabi...
Abstract—This work started out with our discovery of a pattern of throughput distributions among lin...
Abstract — Recently, Ethernet celebrated its twentieth anniversary. Over those years, the processing...
AbstractThe Backoff Algorithm is the heart of Medium Access Control(MAC) protocol which determines t...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
In wireless communication environments, backoff is traditionally based on the IEEE binary exponentia...
The IEEE 802.15.3 medium access control (MAC) is proposed, especially, for wireless personal area n...
Abstract — the field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of adva...
Abstract: The Medium Access Control (MAC) protocol is the main element which determines the system t...
this paper, by modeling the exponential backoff process as a Markov chain, we can use the signal tra...
Furthermore, we show that geometric retransmission algorithm is intrinsically unstable for large pop...
In the field of wireless networks one of the arduous assignments is to design an efficient MAC schem...
Abstract- The collision probability in the MAC layer could become very high when a poor backoff algo...
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general ...
A generalized analysis of the IEEE 802.15.4 medium access control (MAC) protocol in terms of reliabi...
Abstract—This work started out with our discovery of a pattern of throughput distributions among lin...
Abstract — Recently, Ethernet celebrated its twentieth anniversary. Over those years, the processing...
AbstractThe Backoff Algorithm is the heart of Medium Access Control(MAC) protocol which determines t...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...