{"title":"媒体访问控制协议的性能评估,使用生成图的算法来估计隐藏终端的效果","authors":"Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga","doi":"10.1002/ecja.20343","DOIUrl":null,"url":null,"abstract":"<p>Hidden terminals can significantly lower the throughput of such competitive MAC protocols as CSMA. Therefore, a large number of MAC protocols that implement different hidden terminal strategies have been developed. In this paper we propose an algorithm for generating evaluation networks with different ratios of hidden terminals in order to evaluate the effect of hidden terminals on competitive MAC protocols. In addition, we use the same algorithm to report results that elucidate the characteristics of throughput as the ratio of hidden terminals that exist in a network is varied for both CSMA, a representative competitive MAC protocol, and MACA, a MAC protocol that makes use of RTS/CTS control, a representative hidden terminal strategy. © 2006 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(4): 46–55, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.20343</p>","PeriodicalId":100405,"journal":{"name":"Electronics and Communications in Japan (Part I: Communications)","volume":"90 4","pages":"46-55"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/ecja.20343","citationCount":"5","resultStr":"{\"title\":\"Performance evaluation of media access control protocols using an algorithm generating graphs for effect estimation of hidden terminals\",\"authors\":\"Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga\",\"doi\":\"10.1002/ecja.20343\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Hidden terminals can significantly lower the throughput of such competitive MAC protocols as CSMA. Therefore, a large number of MAC protocols that implement different hidden terminal strategies have been developed. In this paper we propose an algorithm for generating evaluation networks with different ratios of hidden terminals in order to evaluate the effect of hidden terminals on competitive MAC protocols. In addition, we use the same algorithm to report results that elucidate the characteristics of throughput as the ratio of hidden terminals that exist in a network is varied for both CSMA, a representative competitive MAC protocol, and MACA, a MAC protocol that makes use of RTS/CTS control, a representative hidden terminal strategy. © 2006 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(4): 46–55, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.20343</p>\",\"PeriodicalId\":100405,\"journal\":{\"name\":\"Electronics and Communications in Japan (Part I: Communications)\",\"volume\":\"90 4\",\"pages\":\"46-55\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1002/ecja.20343\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electronics and Communications in Japan (Part I: Communications)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ecja.20343\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics and Communications in Japan (Part I: Communications)","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ecja.20343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5