Citations
806 |
Reversibility and Stochastic Networks
- Kelly
- 1979
(Show Context)
Citation Context ...rm stands for factorization to individual componentssor stations. This product form result is related to product form resultssin the extensive literature on queueing networks (cf. [3], [4], [7],s[8], =-=[12]-=-, [26]), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-local-balance (cf.... |
517 | Packet switching in radio channels part II the hidden terminal problem in carrier sense multiple access and busy tone solution”,
- Tobagi, Kleinrock
- 1975
(Show Context)
Citation Context ...ing random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s[16], [20], [21], =-=[22]-=-, [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]).sParticularizing... |
279 |
Mean value analysis of closed multichain queueing networks.
- Reiser, Lavenberg
- 1980
(Show Context)
Citation Context ...oldswhich here would read as: "The steady state distribution as seen by asnode upon think time completion is given by (4.2) for the system withoutsthat node". The well-known mean value algorithm (cf. =-=[19]-=-) to efficiently compute performance measures can thus be applied. A computational approach to compute the normalizing constant based upon a statistlcal mechanics technique can be found in [18].s5. In... |
231 |
Blocking in a shared resource environment,”
- Kaufman
- 1981
(Show Context)
Citation Context ...thesnumber of these using trunkgroup i, and MA the number of trunks instrunkgroup i, we can usesA(h H)s1 if ̂s(H U h) < Mt for all is0 otherwise .sExample 2.4. (Synchronous servicing) (cf. [6], [10], =-=[11]-=-). As a typical feature of digital transmissions, a transmission may use several timesslots from a limited number of M time slots. The following figure visualizes that a type-i message simultaneously ... |
230 |
An introduction to queueing networks.
- Walrand
- 1988
(Show Context)
Citation Context ...nds for factorization to individual componentssor stations. This product form result is related to product form resultssin the extensive literature on queueing networks (cf. [3], [4], [7],s[8], [12], =-=[26]-=-), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-local-balance (cf. [8],s... |
129 |
Packet Switching in a Multiaccess Broadcast Channel: Performance Evaluation,”
- Kleinrock, Lam
- 1977
(Show Context)
Citation Context ...uetionsVarious packet or circuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , =-=[13]-=- , [14] , [15] ,s[16], [20], [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions ... |
85 |
Throughput analysis in multihop CSMA packet radio networks.
- Boorstyn, Kershenbaum, et al.
- 1987
(Show Context)
Citation Context ...1 - 1. IntroduetionsVarious packet or circuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. =-=[2]-=- , [10] , [13] , [14] , [15] ,s[16], [20], [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their vario... |
62 |
Performance analysis of carrier sense multiple access with collision detection
- Tobagi, Hunt
- 1980
(Show Context)
Citation Context ...ndom access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s[16], [20], [21], [22], =-=[23]-=-, [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]).sParticularizing to CS... |
49 |
Insensitivity of Blocking Probabilities in a Circuit-Switching Network,”
- Burman, Lehoczky, et al.
- 1984
(Show Context)
Citation Context ...replace N(h) be the set ofsneighbors that is either transmitting or hearing. Clearly, these two-hopsinteractions can be extended to multi-hop interactions.s- 5 - Example 2.3. (Circuit switching) (cf. =-=[3]-=-, [20]). A circuit switchingstransmission may typically have a structure of the formswhere messages from a particular source Si are to be transmitted along asparticular path T?t to a destination DA . ... |
42 |
Telecommunication Networks
- Schwartz
- 1987
(Show Context)
Citation Context ...rcuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s[16], =-=[20]-=-, [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]).sPar... |
41 |
Sharing Memory Optimally”,
- Foschini, Gopinath
- 1983
(Show Context)
Citation Context ...es, NL (H) thesnumber of these using trunkgroup i, and MA the number of trunks instrunkgroup i, we can usesA(h H)s1 if ̂s(H U h) < Mt for all is0 otherwise .sExample 2.4. (Synchronous servicing) (cf. =-=[6]-=-, [10], [11]). As a typical feature of digital transmissions, a transmission may use several timesslots from a limited number of M time slots. The following figure visualizes that a type-i message sim... |
13 |
A characterization of product-form queueing networks
- Chandy, Martin
- 1983
(Show Context)
Citation Context ...s. A product form stands for factorization to individual componentssor stations. This product form result is related to product form resultssin the extensive literature on queueing networks (cf. [3], =-=[4]-=-, [7],s[8], [12], [26]), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-lo... |
13 | Packet switching in radio channels, Part I: CSMA models and their throughput-delay characteristics - Kleinrock, Tobagi - 1975 |
9 |
On equivalencies of blocking mechanisms in queueing networks with blocking
- Onvural, Perros
- 1986
(Show Context)
Citation Context ...interruptions (see example 3.6) can so be modeled.sRemark 2.6. The assumption of a restarting think or holding time uponsblocking is common for communication systems (cf. [6], [10], [11], [15],s[16], =-=[17]-=-, [20], [27]). For an exponential think or holding time, itscoincides with interrupting this time to evolve if the idle or busysstatus respectively is currently not allowed to change (cf. [17]).sRemar... |
8 | Rude-CSMA: A multihop channel access protocol
- Nelson, Kleinrock
- 1985
(Show Context)
Citation Context ... or circuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s=-=[16]-=-, [20], [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]... |
7 |
Networks of queues. Part I: Joblocal-balance and the adjoint process. Part II: General routing and service characteristics. Lecture notes in control and informational sciences
- Hordijk, Dijk
- 1983
(Show Context)
Citation Context ...ct form stands for factorization to individual componentssor stations. This product form result is related to product form resultssin the extensive literature on queueing networks (cf. [3], [4], [7],s=-=[8]-=-, [12], [26]), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-local-balanc... |
6 |
Adjoint process, job-local-balance and insensitivity for stochastic networks".
- Hordijk, Dijk
- 1983
(Show Context)
Citation Context ...), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-local-balance (cf. [8],s=-=[9]-=-), provided appropiate conditions are met. However, sufficiënt conditions in terms of concrete system protocols are hereby left open andsnot obvious. To this end, a general invariance condition will b... |
5 |
Dijk, Networks of queues with blocking, in Performance ‘81
- Hordijk, van
- 1981
(Show Context)
Citation Context ...product form stands for factorization to individual componentssor stations. This product form result is related to product form resultssin the extensive literature on queueing networks (cf. [3], [4], =-=[7]-=-,s[8], [12], [26]), but has as such not been reported or recognized forsthe system under study. It can be shown that it conceptually fits in thesframework of reversibility (cf. [12]) or of job-local-b... |
5 |
Store-and-Forward Buffer Requirements in a Packet Switching Network,”
- Lam
- 1976
(Show Context)
Citation Context ... packet or circuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , =-=[15]-=- ,s[16], [20], [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16... |
4 |
Insensitivity in two-node blocking models with applications", Teletraffic Analysis and Computer Performance Evaluation, North Holland
- Dijk, Tijms
- 1986
(Show Context)
Citation Context ...es"averaged out" leading to expression (4.2) with ah and rh representings"averaged" means. Multi levels may reflect for instance different interrupted phases of a transmission.s- 15 - 4. Similarly to =-=[25]-=-, also the "arrival theorem" can be shown to holdswhich here would read as: "The steady state distribution as seen by asnode upon think time completion is given by (4.2) for the system withoutsthat no... |
2 |
Generalized semi-Markov schemes and open queueing networks
- Barbour
- 1982
(Show Context)
Citation Context ...hus be applied. A computational approach to compute the normalizing constant based upon a statistlcal mechanics technique can be found in [18].s5. In various Standard ways (e.g. by letting N-*» as in =-=[1]-=- or by including a "dummmy node" as in [8]), similar results can be provided tosmodel "infinite or open" transmission systems with Poissonian inputs.sProof of theorem 4.1.sWe need to verify the global... |
2 |
Extension to the rude-CSMA analysis
- Felderman
- 1987
(Show Context)
Citation Context ...to multihop random access 'sschemes which take into account the well-known "hidden terminal problem". Relaxations to non-exponential packet lenghts (cf. [2]) and transmitter dependent parameters (cf. =-=[5]-=-) were also- established. However,stransmissions are still assumed to be exponential and several randomsaccess schemes of practical interest are not yet covered.sThis paper aims to show that a concept... |
2 |
Analysis of Finite Storage in A Computer Network Node Environment Under General Traffic Conditions
- Kamoun, Kleinrock
- 1980
(Show Context)
Citation Context ... IntroduetionsVarious packet or circuit switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , =-=[10]-=- , [13] , [14] , [15] ,s[16], [20], [21], [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various exte... |
1 |
A statistical mechanica of some interconnection networks", Performance '84
- Pinsky, Yemini
- 1984
(Show Context)
Citation Context ...s- 4 - Throughout let H - {h-L , . .. ,1̂ } and denote by H + h the state in whichsnode h is added (+) or deleted (-) as a busy node.sExample 2.1. (Interference graph; Standard CSMA) (cf. [14], [16], =-=[18]-=-,s[20]). Let the nodes in a graph represent transmitters with the restriction that adjacent nodes cannot transmit at the same time. Let N(h) besthe set of all neighbors of node h. Then the above descr... |
1 |
Unified analysis of local flow control mechanisms in message-switched networks
- Swiderski
- 1984
(Show Context)
Citation Context ...switching random access schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s[16], [20], =-=[21]-=-, [22], [23], [27]). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]).sParticula... |
1 |
Dijk, "Finite source blocking systems with multi-level active and idle periods", Research report
- van
- 1987
(Show Context)
Citation Context ...a counterexample with O and 1 values orsone can recursively calculate P(H) as based upon "basic" paths orscycles. (Related resul ts along this line can be found in [7], [8] ands[12]).s3. Similarly to =-=[24]-=-, the above results can be extended to allow different levels of think and holding times for a node. These levels can bes"averaged out" leading to expression (4.2) with ah and rh representings"average... |
1 |
Interfering queueing processes in packet broadcoast Communications", IFIP Tokyo
- Yemini, Kleinrock
- 1980
(Show Context)
Citation Context ...ccess schemes for computer, broadcasting or telecommunication networks have been introduced andsinvestigated over the last decades (cf. [2] , [10] , [13] , [14] , [15] ,s[16], [20], [21], [22], [23], =-=[27]-=-). Most notably among these are thesALOHA (e.g. [13], [20]) and CSMA (e.g. [13], [14], [20]) packetsswitching protocols and their various extensions (e.g. [2], [16], [23]).sParticularizing to CSMA-pro... |