0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Buy Now

Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002) Loot Price: R4,483
Discovery Miles 44 830
Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002): Benny Bing

Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002)

Benny Bing

Series: The Springer International Series in Engineering and Computer Science, 578

 (sign in to rate)
Loot Price R4,483 Discovery Miles 44 830 | Repayment Terms: R420 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

General

Imprint: Springer-Verlag New York
Country of origin: United States
Series: The Springer International Series in Engineering and Computer Science, 578
Release date: March 2013
First published: 2002
Authors: Benny Bing
Dimensions: 235 x 155 x 15mm (L x W x T)
Format: Paperback
Pages: 262
Edition: Softcover reprint of the original 1st ed. 2002
ISBN-13: 978-1-4757-8412-1
Categories: Books > Computing & IT > Computer communications & networking > Networking standards & protocols
LSN: 1-4757-8412-0
Barcode: 9781475784121

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners