Power-line communications are becoming a key component in home networking. The dominant MAC protocol for high data-rate power-line communications, IEEE 1901, employs a CSMA/CA mechanism similar to the backoff process of 802.11. Existing performance evaluation studies of this protocol assume that the backoff processes of the stations are independent (the so-called decoupling assumption). However, in contrast to 802.11, 1901 stations can change their state after sensing the medium busy, which introduces strong coupling between the stations, and, as a result, makes existing analyses inaccurate. In this paper, we propose a new performance model for 1901, which does not rely on the decoupling assumption. We prove that our model admits a unique s...
The Backoff mechanism is one of the key factors of Medium Access Control (MAC) protocol which is sch...
In this paper we introduce an algorithm based analytical model to calculate the performance of the w...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
Abstract—Power-line communications are becoming a key component in home networking. The dominant MAC...
Power-line communications (PLC) are becoming a key component in home networking, because they provid...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
We investigate the IEEE 1901 MAC protocol, the domi-nant protocol for high data rate power-line comm...
The standardized Medium Access Control (MAC) protocols for Power Line Communication (PLC) networks ...
The Medium Access Control protocol of Power Line Communication networks (defined in Homeplug and IE...
ordination Function (DCF) defined for IEEE 802.11. However, the backoff procedure is modified with t...
As WLANs employing IEEE 802.11 have become pervasive, many analytic models for predicting their perf...
IEEE 802.11 MAC is a CSMA/CA protocol and uses RTS/CTS exchanges to avoid the hidden terminal proble...
Wireless Local Area Networks (WLANs) have been widely developed during this decade, due to their mo...
The Backoff mechanism is one of the key factors of Medium Access Control (MAC) protocol which is sch...
In this paper we introduce an algorithm based analytical model to calculate the performance of the w...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
Abstract—Power-line communications are becoming a key component in home networking. The dominant MAC...
Power-line communications (PLC) are becoming a key component in home networking, because they provid...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
Power-line communications are employed in home networking to provide easy and high-throughput connec...
We investigate the IEEE 1901 MAC protocol, the domi-nant protocol for high data rate power-line comm...
The standardized Medium Access Control (MAC) protocols for Power Line Communication (PLC) networks ...
The Medium Access Control protocol of Power Line Communication networks (defined in Homeplug and IE...
ordination Function (DCF) defined for IEEE 802.11. However, the backoff procedure is modified with t...
As WLANs employing IEEE 802.11 have become pervasive, many analytic models for predicting their perf...
IEEE 802.11 MAC is a CSMA/CA protocol and uses RTS/CTS exchanges to avoid the hidden terminal proble...
Wireless Local Area Networks (WLANs) have been widely developed during this decade, due to their mo...
The Backoff mechanism is one of the key factors of Medium Access Control (MAC) protocol which is sch...
In this paper we introduce an algorithm based analytical model to calculate the performance of the w...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...