• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Broadband Wireless Access

Broadband Wireless Access

Paperback

Series: The Springer International Engineering and Computer Science, Book 578

Technology & EngineeringGeneral ComputersNetworking

ISBN10: 1475784120
ISBN13: 9781475784121
Publisher: Springer Nature
Published: Mar 21 2013
Pages: 262
Weight: 0.90
Height: 0.60 Width: 6.14 Depth: 9.21
Language: English
This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N., Multiple Access Communications, IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R., Data Networks, Prentice Hall, 1992. [CHOU83]Chou, W, ComputerCommunications Volume1: Principles, Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M., Erasures and Noise in Splitting Multiple Access Algorithms, IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M., Erasure, Capture and Random Power Level Selectionin Multiple Access Systems, IEEE Transactions on Communications, Vol. 3 6, N o. 3, March 1988, pp. 263 - 271.

Also in

Technology & Engineering