In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input rate) are explained. Additionally, the paper introduces novel procedure for analyzing bounded backoff protocols, which is useful for creating new protoc...
Goodman, Greenberg, Madras and March gave a lower bound of n(-Omega (log n)) for the maximum arrival...
Backoff protocols are probably the most widely used protocols for contention resolution in multiple...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general ...
In contention resolution, multiple processors are trying to coordinate to send discrete messages thr...
Backoff protocols are probably the most widely used protocols for contention resolution in multiple ...
AbstractBackoff protocols are probably the most widely used protocols for contention resolution in m...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
Despite much theoretical work, different modifications of backoff protocols in 802.11 networkslack e...
When several users simultaneously transmit over a shared communication channel, the messages are los...
Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (...
A collision resolution scheme is essential to the performance of a random-access wireless network. M...
Abstract — Recently, Ethernet celebrated its twentieth anniversary. Over those years, the processing...
A well known defect of the standard exponential back-off algorithm used in IEEE 802.11 is its short-...
We study contention-resolution protocols for multiple-access channels. We show that every backoff pr...
Goodman, Greenberg, Madras and March gave a lower bound of n(-Omega (log n)) for the maximum arrival...
Backoff protocols are probably the most widely used protocols for contention resolution in multiple...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general ...
In contention resolution, multiple processors are trying to coordinate to send discrete messages thr...
Backoff protocols are probably the most widely used protocols for contention resolution in multiple ...
AbstractBackoff protocols are probably the most widely used protocols for contention resolution in m...
In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that ...
Despite much theoretical work, different modifications of backoff protocols in 802.11 networkslack e...
When several users simultaneously transmit over a shared communication channel, the messages are los...
Abstract — In the paper, we perform an in-depth analytic study of the binary exponential algorithm (...
A collision resolution scheme is essential to the performance of a random-access wireless network. M...
Abstract — Recently, Ethernet celebrated its twentieth anniversary. Over those years, the processing...
A well known defect of the standard exponential back-off algorithm used in IEEE 802.11 is its short-...
We study contention-resolution protocols for multiple-access channels. We show that every backoff pr...
Goodman, Greenberg, Madras and March gave a lower bound of n(-Omega (log n)) for the maximum arrival...
Backoff protocols are probably the most widely used protocols for contention resolution in multiple...
In this paper we propose analytic model for computing the delay of the slotted ALOHA protocol with B...