1987
DOI: 10.1109/mcom.1987.1093648
|View full text |Cite
|
Sign up to set email alerts
|

Multiple access protocols for data communications via VSAT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

1988
1988
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 30 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…In this approach, data is carried in contention mode on the channel as in S-Aloha with a variation that all packets are acknowledged by the recipient. This scheme has been also referred to as random access TDMA 5 . In terms of capacity performance, it is similar to S-Aloha but suffers from the twice propagation delay before the acknowledgment is received by the sender.…”
Section: Slotted Aloha With Acknowledgmentmentioning
confidence: 99%
“…In this approach, data is carried in contention mode on the channel as in S-Aloha with a variation that all packets are acknowledged by the recipient. This scheme has been also referred to as random access TDMA 5 . In terms of capacity performance, it is similar to S-Aloha but suffers from the twice propagation delay before the acknowledgment is received by the sender.…”
Section: Slotted Aloha With Acknowledgmentmentioning
confidence: 99%
“…As mentioned in the introduction, during the 1980s and 1990s, numerous multiple access protocols were developed . They are all based on combinations of RA (unslotted or slotted) with fixed‐allocation TDMA, demand‐assigned TDMA, or CDMA.…”
Section: The Satellite Multiple Access Problem and Initial Random Accmentioning
confidence: 99%
“…The available inbound bandwidth resources are shared employing FDMA, TDMA, MF‐TDMA, or CDMA . As opposed to the purely fixed assignment multiple access techniques, the protocols in combined DA, RA, and fixed assignment to dynamically control the access to the shared resources by the large population of contending users. These protocols typically have a centralized control located in the hub, which manages the access to the satellite resources, as it allows a more efficient multiplexing of services with different priorities (e.g.…”
Section: The Satellite Multiple Access Problem and Initial Random Accmentioning
confidence: 99%