Ankara : The Department of Electrical and Electronics Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013.Thesis (Ph. D.) -- Bilkent University, 2013.Includes bibliographical references leaves 115-127.Variants of the carrier-sense multiple access (CSMA) protocol has been employed in many communications protocols such as the IEEE 802.11 and Ethernet standards. CSMA based medium access control (MAC) mechanisms have been recently proposed for other communications scenarios such as sensor networks and acoustical underwater networks. Despite its widespread use, the performance of the CSMA protocol is not well-studied from the perspective of these newly encountered networking scenarios. We here invest...
International Conference on Information, Communications and Signal Processing, Singapore, 9-12 Septe...
Abstract—This paper investigates the fundamental performance limits of medium access control (MAC) p...
Medium Access Control (MAC) layer protocols are responsible for the reliable transition of data by p...
We analyze the performance of the CSMA protocol under propagation delays that are comparable with pa...
As the penetration of wireless networks increase, number of neighboring networks contending for the ...
We propose a model for the energy consumption of a node as a function of its throughput in a wireles...
Cataloged from PDF version of article.As the penetration of wireless networks increase, number of ne...
Cataloged from PDF version of article.We propose a model for the energy consumption of a node as a f...
Abstract—In the literature, asymptotic studies of multi-hop wireless network capacity often consider...
Abstract. We analyze the class of Carrier Sense Multiple Access (CSMA) policies for scheduling packe...
Carrier-Sense Multiple-Access (CSMA) protocols form a popular class of random-access schemes for reg...
Raj Bridgelall is the program director for the Upper Great Plains Transportation Institute (UGPTI) C...
Abstract—We consider CSMA policies for multihop wireless networks. CSMA policies are simple policies...
Automatic rate adaptation in CSMA/CA wireless networks may cause drastic throughput degradation for ...
We explore the achievable delay performance in wireless CSMA networks. While relatively simple and i...
International Conference on Information, Communications and Signal Processing, Singapore, 9-12 Septe...
Abstract—This paper investigates the fundamental performance limits of medium access control (MAC) p...
Medium Access Control (MAC) layer protocols are responsible for the reliable transition of data by p...
We analyze the performance of the CSMA protocol under propagation delays that are comparable with pa...
As the penetration of wireless networks increase, number of neighboring networks contending for the ...
We propose a model for the energy consumption of a node as a function of its throughput in a wireles...
Cataloged from PDF version of article.As the penetration of wireless networks increase, number of ne...
Cataloged from PDF version of article.We propose a model for the energy consumption of a node as a f...
Abstract—In the literature, asymptotic studies of multi-hop wireless network capacity often consider...
Abstract. We analyze the class of Carrier Sense Multiple Access (CSMA) policies for scheduling packe...
Carrier-Sense Multiple-Access (CSMA) protocols form a popular class of random-access schemes for reg...
Raj Bridgelall is the program director for the Upper Great Plains Transportation Institute (UGPTI) C...
Abstract—We consider CSMA policies for multihop wireless networks. CSMA policies are simple policies...
Automatic rate adaptation in CSMA/CA wireless networks may cause drastic throughput degradation for ...
We explore the achievable delay performance in wireless CSMA networks. While relatively simple and i...
International Conference on Information, Communications and Signal Processing, Singapore, 9-12 Septe...
Abstract—This paper investigates the fundamental performance limits of medium access control (MAC) p...
Medium Access Control (MAC) layer protocols are responsible for the reliable transition of data by p...