Performance Analysis of Multi-User Communication Systems: Access Methods and Protocols

In a multi-user communication facility a set of processes (term which we use here in the sense of computer science, i.e. a “program” in execution) exchange information via a communication “channel”. Various examples of such a system can be imagined : micr

  • PDF / 16,334,423 Bytes
  • 258 Pages / 486.26 x 691.298 pts Page_size
  • 50 Downloads / 153 Views

DOWNLOAD

REPORT


MULTI -USER COMMUNICATION SYSTEMS

EDITED BY G. LONGO UNIVERSITlt DI TRIESTE

Springer-Verlag

~

WienGmbH

SCIENCES

This work is suhject to copyright. All rights are reserved, whether the whole or part of the material is concemed specifically those of translation, reprinting, re-use of illustrations, hroadcasting, reproduction by photocopying machine or similar means, and storage in data hanks.

© 1981 hy Springer-Verlag Wien Originally published by CISM, Udine in 1981.

ISBN 978-3-211-81612-7 ISBN 978-3-7091-2900-5 (eBook) DOI 10.1007/978-3-7091-2900-5

PREFACE

Here is a set of qualified contributions to one of the most fascinating and intriguing problems in an area between system theory and communication theory, which is rapidly developing today, namely multiterminal or distributed communication. I am grateful to the lecturers who accepted my invitation and came to Udine in july 1979, to talk about this topic and to illustrate its numerous facets. I am also grateful to the

audience, who contributed in an active way to the success of the school. Tbe delay witb wbicb tbis volume is publisbed althougb being unpleasant in itself, gave tbe autbors tbe possibility of updating tbeir contributions, tbus making tbe written text even more valuable tban the set of lectures from wbicb it developed. just a few days before tbis book was printed, tbe Rector of CISM, professor Waclaw 0/szak, passed away.

I~

is witb great sorrow tbat I announce bis deatb to tbe friends of our

Centre, and I wisb to devote this book to bim. He bad been one of tbe founders of CISM and bad spent tbe last twelve years of bis life in building and extending the activity oftbis Centre. We all are greatly indebted to him. Giuseppe Longo Udine, December 1980

CONTENTS Page

Tbe Poisson Multiple-Access Conflict Resolution Problem by T. Berger Preface 1. Description of the Problem 20 Reformation-Fishingin a Poisson Stream with a Weak Net 0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

02 0

3

3 Slotted ALOHA

04

40 The 0.487 Algorithm 50 Upper Bounds

09

References

26

0

0

0

18

0

Performance Analysis of Multi-User Communication Systems: Access Metbadsand Protocols by Eo Gelenbe

29

10 Introduction 20 Random Access to a Single Broadcast Channel References 0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

30 0

47

About a Combinatorial Proof ofthe Noisy Channel Coding Theorem by]. Körner

.......

Introduction

Statement of the Problem

49 50

Existence of Good Codes

57

Converse Results

63

Universal Coding

68

Outlook

70

References

0

0

0

71

Contents

IIl

Collision-Resolution Algorithms and Random-Access Communications by j.L. Massey · 1. lntroduction

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

73

. . . . . . . . . . . . . . . . . . . . . . . . . .

76

3. Traffic-lndependent Properties of the Capetanakis Collision-Resolution Algorithm .

83

2. Collision-Resolution Algorithms

4. Random-Access via Collision-Resolution

. . . . .

5. Effects of Propagation Delays, Channel Er