In this paper we propose a new Markovian model for p-persistent carrier sense multiple access (CSMA) systems with a finite population of unsaturated single-buffered terminals. Focused on the distribution of the number of backlogged terminals in the steady state, our model allows the optimal persistent probability p from the number of backlogged terminals, which enables us to determine the throughput upper-bound (or mean access delay lower-bound) of slotted CSMA systems. We compare the performance of slotted CSMA systems with binary exponential backoff (BEB) algorithm and with p-persistent protocol against the throughput upper-bound and examine the stability of these systems. We show how closely slotted CSMA systems with BEB algorithm or p-p...
We consider a system comprising a finite number of nodes, with infinite packet buffers, that use uns...
It has been recently shown that queue-based carrier sense multiple access (CSMA) algorithms are thro...
Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (...
When multiple users are communicating with an access point based on a random access, the stability r...
Furthermore, we show that geometric retransmission algorithm is intrinsically unstable for large pop...
This letter investigates the stability region of p-persistent carrier sense multiple access systems ...
Carrier-Sense Multiple-Access (CSMA) protocols form a popular class of random-access schemes for reg...
Abstract—Recently, it has been shown that a simple, dis-tributed CSMA algorithm is throughput-optima...
n this paper we deal with the characterization and computation of the $p$ value, say $p_{opt}$, corr...
In this letter we propose an Markov model for slotted CSMA/CA algorithm working in a non-acknowledge...
A computer network using non-persistent and 1-persistent Carrier Sense Multiple Access protocols is ...
Random-access algorithms such as the Carrier-Sense Multiple-Access (CSMA) protocol provide a popular...
This paper analyzes the non-persistent Carrier Sense Multiple Access (CSMA) mechanism, and simulates...
Random-access algorithms such as the Carrier-Sense Multiple-Access (CSMA) protocol provide a popular...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
We consider a system comprising a finite number of nodes, with infinite packet buffers, that use uns...
It has been recently shown that queue-based carrier sense multiple access (CSMA) algorithms are thro...
Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (...
When multiple users are communicating with an access point based on a random access, the stability r...
Furthermore, we show that geometric retransmission algorithm is intrinsically unstable for large pop...
This letter investigates the stability region of p-persistent carrier sense multiple access systems ...
Carrier-Sense Multiple-Access (CSMA) protocols form a popular class of random-access schemes for reg...
Abstract—Recently, it has been shown that a simple, dis-tributed CSMA algorithm is throughput-optima...
n this paper we deal with the characterization and computation of the $p$ value, say $p_{opt}$, corr...
In this letter we propose an Markov model for slotted CSMA/CA algorithm working in a non-acknowledge...
A computer network using non-persistent and 1-persistent Carrier Sense Multiple Access protocols is ...
Random-access algorithms such as the Carrier-Sense Multiple-Access (CSMA) protocol provide a popular...
This paper analyzes the non-persistent Carrier Sense Multiple Access (CSMA) mechanism, and simulates...
Random-access algorithms such as the Carrier-Sense Multiple-Access (CSMA) protocol provide a popular...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
We consider a system comprising a finite number of nodes, with infinite packet buffers, that use uns...
It has been recently shown that queue-based carrier sense multiple access (CSMA) algorithms are thro...
Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (...