JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Random Access Method of the Wibro System
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Random Access Method of the Wibro System
Lee, Kang-Won;
  PDF(new window)
 Abstract
Random access method for Wibro system is proposed using the Bayesian Technique, which can estimate the number of bandwidth request messages in a frame only based on the number of successful slots. The performance measures such as the maximum average throughput, the mean delay time and the collision ratio are investigated to evaluate the performance of the proposed method. The proposed method shows better performance than the binary exponential backoff algorithm used currently.
 Keywords
random access;Wibro;Bayesian;exponential backoff algorithm;
 Language
English
 Cited by
 References
1.
S.M. Oh and J.H. Kim, "The Analysis of the Optimal Contention Period for Broadband Wireless Access Network," Proceedings of Percom 2005 Workshop, pp.215-219, March 2005.

2.
S.M. Oh and J.H. Kim, "The Optimization of the Collision Resolution Algorithm for Broad band Wireless Access Network," ICACT 2006, pp.1944-1948, Feb. 2006.

3.
B.J. Kwak, N.O. Song and L.E. Miller, "Performance Analysis of Exponential Back off," IEEE/ACM Trans. On Networking, Vol.13, No.2, pp.343-355, April 2006.

4.
J. Je, K. Guild, K. Yang and H.H. Chen, "Modeling Contention Based Bandwidth Request Scheme for IEEE 802.16 Networks," IEEE Communication Letters, Vol.11, No.8, pp.698-700, August 2007.

5.
V.A. Kobliakiv, A.M. Turlikov and A.V. Vinel," Distributed Queue Random Multiple Access Algorithm for Centralized Data Networks," ISCE'06, pp.1-6, 2006.

6.
M.Molle, "Conflict-Resolution Algorithm," Encyclopedia of Telecommunications, Vol.4, Communications Human Factors to Cryptology, pp.381-398.

7.
K.H, kook and K.W. Lee, "A Study on the Efficient Link Establishment between MR-BS and RS," ETRI Technical Report, Jan. 2008.

8.
H. Vogt, "Efficient Object Identification with Passive RFID Tags," International Conference on Pervasive Computing, LNCS, Springer-Verlag, 2002.

9.
N.L. Johnson and S. Kotz, "Urn Models and Their Application," Wiley, 1977.

10.
V.F. Kolchin, B.A. Svast'yanov, and V.P. Christyakov, "Random Allocations," V.H. Winston & Sons, 1978.