rdf:type | <https://jpsearch.go.jp/term/type/図書> |
rdfs:label | "Multiple Access Protocols : Performance and Analysis" |
schema:name 2 | "Multiple Access Protocols : Performance and Analysis" @en |
schema:name | "Performance and Analysis" @ja |
ns0:accessInfo | #accessinfo |
ns0:agential 3 | _:vb66464340 (an orphan bnode) |
ns0:agential | _:vb66464341 (an orphan bnode) |
ns0:agential | _:vb66464339 (an orphan bnode) |
ns0:sourceInfo | #sourceinfo |
ns0:spatial | _:vb66464342 (an orphan bnode) |
ns0:temporal | _:vb66464343 (an orphan bnode) |
schema:creator 2 | <https://jpsearch.go.jp/entity/ncname/Sidi,_Moshe> (➜ "Sidi, Moshe") |
schema:creator | <https://jpsearch.go.jp/entity/ncname/Rom,_Raphael> (➜ "Rom, Raphael") |
schema:datePublished | "2011" |
schema:description 4 | "備考: This book focuses on the analysis of multiaccess communication systems that include both local area and radio networks. Because the field of computer communication networks has progressed immensely in recent years, most material in this volume has, so far, only been covered in a limited form mostly without a thorough analysis or has never appeared except scattered in specialized professional journals. This book, for the first time, collects all these topics and presents them in a unified and uniform framework. The subjects covered in the volume were chosen judiciously. Each subsection presents a communication system that differs in nature from the others in the system characteristic, the purpose of the system, or the method of analysis. Via this approach the authors have succeeded in covering all types of multiaccess systems and most of the analytical methods used in their analysis. An extensive bibliography is attached to enhance its use as a reference for professionals. For the teacher and student, a fair number of nontrivial exercises are included. (Nielsen Book)...(more)" |
schema:description | "責任表示: By (author) Rom, Raphael; By (author) Sidi, Moshe" |
schema:description | "資料種別: Paperback / softback" |
schema:description | "分類: BIC:UT; BIC:UVZ; BIC:TJK" |
schema:edition | "Softcover reprint of the original 1st ed. 1990" |
schema:encodingFormat | <https://ld.webcatplus.jp/ext/code/onix#BC> |
schema:inLanguage | <http://id.loc.gov/vocabulary/iso639-2/eng> (➜ "英語") |
schema:isbn | "9781461279976" |
schema:numberOfPages | "188p" |
schema:publisher | <https://ld.webcatplus.jp/entity/P1533458> |
schema:size | "H234 x W156" |
schema:spatial | <https://jpsearch.go.jp/entity/place/アメリカ> |
schema:temporal | <https://jpsearch.go.jp/entity/time/2011> (➜ "2011年") |
schema:tocEntry | "1. Introduction.- 1.1. Protocol Classification.- 1.2. The System Model.- 2. Conflict-Free Access Protocols.- 2.1. Frequency Division Multiple Access.- 2.1.1. Delay Distribution.- 2.2. Time Division Multiple Access.- 2.2.1. FDMA - TDMA Comparison.- 2.2.2. Message Delay Distribution.- 2.3. Generalized TDMA.- 2.3.1. Number of Packets at Allocated Slots - Distribution.- 2.3.2. Expected Number of Packets at Allocated Slots.- 2.3.3. Message Delay Distribution.- 2.3.4. Expected Message Delay.- 2.4. Dynamic Conflict-Free Protocols.- 2.4.1. Expected Delay.- 2.5. Related Analysis.- Exercises.- Appendix: Distribution of the Mod Function.- 3. Aloha Protocols.- 3.1. Pure Aloha.- 3.2. Slotted Aloha.- 3.3. Slotted Aloha - Finite Number of Users.- Steady-State Probabilities.- Throughput Analysis.- Expected Delay.- The Capture Phenomenon.- 3.4. (In)Stability Of Aloha Protocols.- 3.4.1. Analysis.- 3.4.2. Stabilizing the Aloha System.- 3.5. Related Analysis.- 2.1 Exercises.- 4. Carrier Sensing Protocols.- 4.1. Nonpersistent Carrier Sense Multiple Access.- Throughput Analysis.- 4.2. 1-Persistent Carrier Sense Multiple Access.- Throughput Analysis.- Transmission Period Lengths.- State Probabilities.- 4.3. Slotted Carrier Sense Multiple Access.- Throughput of Slotted Nonpersistent CSMA.- Throughput of Slotted 1P-CSMA.- 4.4. Carrier Sense Multiple Access with Collision Detection.- Throughput of Slotted Nonpersistent CSMA/CD.- Throughput of Slotted 1-Persistent CSMA/CD.- 4.5. Related Analysis.- Exercises.- 5. Collision Resolution Protocols.- 5.1. The Binary-Tree Protocol.- 5.1.1. Moments of the Conditional Length of a CRI.- Bounds on the Moments.- 5.1.2. Stability Analysis.- 5.1.3. Bounds on Expected Packet Delay.- 5.2. Enhanced Protocols.- 5.2.1. The Modified Binary-Tree Protocol.- 5.2.2. The Epoch Mechanism.- 5.2.3. The Clipped Binary-Tree Protocol.- 5.3. Limited Sensing Protocols.- 5.3.1. Throughput Analysis.- 5.5. Related Analysis.- Exercises.- Appendix: Moments of Collision Resolution Interval Length.- 6. Additional Topics.- References.- Appendix: Mathematical Formulae and Background.- Glossary of Notation....(more)" |