1996
DOI: 10.1109/49.545692
|View full text |Cite
|
Sign up to set email alerts
|

Performance of a joint CDMA/PRMA protocol for mixed voice/data transmission for third generation mobile communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0
1

Year Published

2000
2000
2011
2011

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(62 citation statements)
references
References 16 publications
0
61
0
1
Order By: Relevance
“…A nonorthogonal code with a length of 7 is a commonly used pseudorandom code [29]. For example, it has been used in many other studies to simulate CDMA systems (see [20], [21], [30]). To simulate the noise effect, we also assume a reasonable noise level equivalent to SINR ¼ 10 db.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…A nonorthogonal code with a length of 7 is a commonly used pseudorandom code [29]. For example, it has been used in many other studies to simulate CDMA systems (see [20], [21], [30]). To simulate the noise effect, we also assume a reasonable noise level equivalent to SINR ¼ 10 db.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…If comparisons try to include the physical layer as well as link layer elements, the model becomes easily untreatable and many mix-up and compensation effects may not allow reaching all conclusions in a very clear way. Therefore, many of the studies concerning the MAC layer simplify the physical layer model or even it is not included at all [8], [28], [29], while those research works covering, for example, power control, sectorization, voice activity monitoring, effects of shadowing and multipath propagation, etc., usually do not introduce any specific MAC protocol, traffic statistics, etc., [30], [31]. The reason is the untreatable models that could come up.…”
Section: Prma++ and Adaptive S-aloha Ds-cdma Comparisonmentioning
confidence: 99%
“…Now, it is a well-established fact that a backoff procedure is required to achieve protocol stability when using distributed scheduling control (and the proposed protocols are no exception) by introducing controlled random delays. In [8], the backoff procedure is also used to differentiate between services with different delay requirements. In this way, a major problem when using distributed scheduling control, which is the QoS support for services with delay constraints in the absence of a centralized scheduler, is addressed in [8].…”
Section: Introductionmentioning
confidence: 99%