2010
DOI: 10.1007/s11036-010-0290-2
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical Analysis of Throughput Bounds in Random Access with ZigZag Decoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…In this paper we only consider the worst case, where carrier sensing constantly fails and there are always packet collisions. The improved decoding probabilities we obtain in this paper can be used to improve performance of higher layer multiaccess protocols that incorporate ZigZag-like collision frames, such as those in [24]. Under the 802.11 protocol, each sender retransmits its packet until it receives an acknowledgment that the AP successfully decoded it.…”
Section: Introductionmentioning
confidence: 92%
“…In this paper we only consider the worst case, where carrier sensing constantly fails and there are always packet collisions. The improved decoding probabilities we obtain in this paper can be used to improve performance of higher layer multiaccess protocols that incorporate ZigZag-like collision frames, such as those in [24]. Under the 802.11 protocol, each sender retransmits its packet until it receives an acknowledgment that the AP successfully decoded it.…”
Section: Introductionmentioning
confidence: 92%
“…Paek and Neely [13] applied ZigZag techniques to four different idealised multi-access system models in order to study the performance benefits of ANC in the existing MAC protocols. Using analytical and simulation results, the authors demonstrated that ZigZag decoding can considerably improve the maximum throughput of random access systems.…”
Section: Related Workmentioning
confidence: 99%
“…As another approach for resolving the collision of packets, a zigzag decoder (ZD) was proposed [12]. ZD was first proposed as a solution to the hidden terminal problem in IEEE 802.11 networks and was later applied to the ALOHA schemes [13]- [15]. In ZD, every packet is assumed to be equipped with a unique word or a pilot at both ends.…”
Section: Introductionmentioning
confidence: 99%