Broadband Wireless Access / Libristo.pl
Broadband Wireless Access

Kod: 02717078

Broadband Wireless Access

Autor Benny Bing

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmiss ... więcej

868.66


Dostępna u dostawcy
Wysyłamy za 14 - 18 dni
Dodaj do schowka

Zobacz książki o podobnej tematyce

Bon podarunkowy: Radość gwarantowana

Wzór bonu podarunkowegoDowiedz się więcej

Więcej informacji o Broadband Wireless Access

Za ten zakup dostaniesz 506 punkty

Opis

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , Erasures and Noise in Splitting Multiple Access Algorithms , IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , Erasure, Capture and Random Power Level Selectionin Multiple Access Systems , IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 271.

Szczegóły książki

Kategoria Książki po angielsku Computing & information technology Computer networking & communications WAP networking & applications

868.66

Ulubione w innej kategorii


250 000
zadowolonych klientów

Od roku 2008 obsłużyliśmy wielu miłośników książek, ale dla nas każdy był tym wyjątkowym.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl Wszelkie prawa zastrzeżonePrywatnieCookies


Konto: Logowanie
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Koszyk ( pusty )

Kup za 299 zł i
zyskaj darmową dostawę.

Twoja lokalizacja: