Effect of Contention Windows Size in Binary Exponential Back of Algorithm
暂无分享,去创建一个
[1] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[2] K. K. Ramakrishnan,et al. The Ethernet capture effect: analysis and solution , 1994, Proceedings of 19th Conference on Local Computer Networks.
[3] Y.-C. Jenq. On the Stability of Slotted ALOHA Systems , 1980, IEEE Trans. Commun..
[4] Frank Thomson Leighton,et al. Analysis of backoff protocols for multiple access channels , 1987, STOC '87.
[5] Wha Sook Jeon,et al. Performance of an exponential backoff scheme for slotted-ALOHA protocol in local wireless environment , 1995 .
[6] Byung-Jae Kwak,et al. On the Stability of Exponential Backoff , 2003, Journal of research of the National Institute of Standards and Technology.
[7] Katsumi Sakakibara,et al. The effect of limiting the number of retransmission trials on the stability of slotted ALOHA systems , 2000, IEEE Trans. Veh. Technol..
[8] Peter March,et al. Stability of binary exponential backoff , 1988, JACM.
[9] Wuyi Yue,et al. An exact analysis for CSMA/CA protocol in integrated voice/data wireless LANs , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[10] Marco Conti,et al. IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism , 2000, IEEE Journal on Selected Areas in Communications.
[11] Leslie Ann Goldberg,et al. Binary Exponential Backoff Is Stable for High Arrival Rates , 2000, STACS.
[12] Jeffrey C. Mogul,et al. Measured capacity of an Ethernet: myths and reality , 1988, CCRV.
[13] Kwang-Cheng Chen,et al. Performance analysis of IEEE 802.11 CSMA/CA medium access control protocol , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[14] Leslie Ann Goldberg,et al. An Improved Stability Bound for Binary Exponential Backoff , 2001, Theory of Computing Systems.
[15] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[16] Frank Thomson Leighton,et al. Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..