Back to Results
First PageMeta Content
Media Access Control / Computing / Hidden node problem / Throughput / Transmission time / Packet loss / Channel / IEEE 802.11 RTS/CTS / MORE protocol / Wireless networking / Technology / Telecommunications engineering


QUEUEING ANALYSIS OF DCHF AND HF TOKEN PROTOCOL WITH VARYING TURNAROUND TIMEā€  Manikanden Balakrishnan and Eric E. Johnson New Mexico State University {mabalakr, ejohnson}@nmsu.edu ABSTRACT
Add to Reading List

Document Date: 2004-09-07 16:53:06


Open Document

File Size: 1,31 MB

Share Result on Facebook

City

Atlantic City / Boston / /

Company

Third-Generation HF / John Wiley and Sons / IEEE Journal / ABSTRACT Wireless Networks / Ad Hoc Mobile Wireless Networks / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Prentice Hall / Eric E. Johnson New Mexico State University / Hidden station / /

IndustryTerm

wireless channel / loaded networks / carrier detection / wireless network hardware / token-passing protocols / basic token passing protocol / physical layer processing / contention-free protocols / layer processing time / physical carrier sensing / token passing protocol / back-off algorithm / appropriate wireless / large networks / virtual carrier sensing / Wireless LANs / Wireless MAC protocols / wireless networks / Wireless Token Ring Protocol / radio networks / /

Organization

New Mexico State University / US Navy Space and Naval Warfare Systems Command / /

Person

Eric E. Johnson / Tq / /

Position

head / /

Product

VARYING TURNAROUND TIME / Wireless LANs / /

ProvinceOrState

New Jersey / /

Technology

token-passing protocols / token passing protocol / wireless MAC protocol / Token Ring Protocol / Contention-free MAC protocols / Contentionbased protocols / contention-free MAC protocol / inappropriate MAC protocol / Contention-based MAC protocols / MAC protocol / appropriate wireless MAC protocol / contention-based MAC protocol / simulation / Wireless MAC protocols / contention-free HF Token Protocol / contention-free protocols / basic token passing protocol / Wireless Token Ring Protocol / back-off algorithm / wireless LAN / MAC protocols / /

SocialTag