Dissertations / Theses on the topic 'Computer network design'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer network design.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Geha, Abbas. "Computer enhanced network design." Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.
Full textNAVAS, JOSE RICARDO PORTILHO. "TOPICS IN COMPUTER NETWORK DESIGN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1985. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=14053@1.
Full textTELECOMUNICAÇÕES BRASILEIRAS S/A
O trabalho propõe um método heurístico para a análise de modelos de redes de filas fechadas, denominado algoritmo linearizado de redes simplificado (ALS), o qual é o resultado de uma simplificação no Algoritmo Linearizador original. O ALS mostrou-se interessante na análise de redes de grande porte (redes com mais de 10 classes de usuários) por apresentar um tempo de processamento bastante pequeno, se comparado com o tempo do Algoritmo Linearizador e de outros algoritmos existentes na literatura. É apresentado também a definição de um método aproximado para a integração dos mecanismos de encaminhamento e controle de fluxo em redes de computadores comutados por pacote. Resultados de simulação mostram que com esse esquema é possível utilizar de uma maneira bastante eficiente os recursos da rede.
This work presents a heuristic method called Simplifield Linearizer Algorithm for analyisis of closed queueing network models. The proposed method from some simplifications introduced in the original Linearizer Algorithm. The Simplified Linearizer Algorithm is quite useful in the analysis of large network (network with more than ten user classes) due to its smaller processing time as compared with the processing time required by the Linearizer Algorithm and others describ in the literature. Also, this work defines an approximate method for the integration of the routing and flow control mechanism in packet switching computer networks. Simulation results shom that this integration scheme improves the efficiency associated with the utilization of the network resources.
Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.
Full textZhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.
Full textalyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Full textZang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Full textLiu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Full textMorley, George David. "Analysis and design of ring-based transport networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60329.pdf.
Full textCrowley, Patrick. "Design and analysis of architectures for programmable network processing systems /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/6991.
Full textAl-Mousa, Yamin Samir. "MAC/routing design for under water sensor networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4496.
Full textLong, Weili. "On the topology design of hose-model VPN networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.
Full textRobeson, Bridget M. "A local area network & wide area network design." Master's thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-12232009-020117/.
Full textFang, Jun-Wai 1960. "Design and performance evaluation of a proposed backbone network for PC-Networks interconnection." Thesis, The University of Arizona, 1989. http://hdl.handle.net/10150/276941.
Full textLee, Myung Sub 1953. "PC-based design of network management package for broadband network." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276772.
Full textZhu, Yong. "Routing, Resource Allocation and Network Design for Overlay Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14017.
Full textRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Full textKolinska, Anna. "Performance Evaluation Tools for Interconnection Network Design." PDXScholar, 1994. https://pdxscholar.library.pdx.edu/open_access_etds/4764.
Full textAmirFaiz, Farhad 1959. "DESIGN OF A COMMUNICATION PORT AND IMPLEMENTATION OF A RECONFIGURABLE MEDIA TRANSLATION GATEWAY (COMPUTER, CONNECTION, NETWORK, BRIDGE, COMPATIBLE)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275529.
Full textBailey, Scott P. "Neural network design on the SRC-6 reconfigurable computer." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FBailey.pdf.
Full textThesis Advisor(s): Douglas J. Fouts. "December 2006." Includes bibliographical references (p. 105-106). Also available in print.
Luan, Hao. "Peer-to-peer content distribution network design /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LUAN.
Full textDiler, Timur. "Network processors and utilizing their features in a multicast design." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FDiler.pdf.
Full textThesis advisor(s): Su Wen, Jon Butler. Includes bibliographical references (p. 53-54). Also available online.
Ke, Yu-Kung. "Scalable mechanisms for IP QoS-based routing with performance objective." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/13753.
Full textViswanathan, Lakshmi. "Genetic algorithms for uncapacitated network design." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/36022.
Full textIncludes bibliographical references (leaves 124).
by Viswanathan Lakshmi.
M.S.
Hassan, Hoda Mamdouh. "A Reference Model and Architecture for Future Computer Networks." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/27916.
Full textPh. D.
Jardetzky, Paul Wenceslas. "Network file server design for continuous media." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241058.
Full textGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Full textSay, Fatih. "Minimum Concave Cost Multicommodity Network Design." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606432/index.pdf.
Full texts Linearization, Minoux greedy and Minoux accelerated greedy methods are found to be applicable to circuit switching network design when both solution quality and computational time is considered. Previously, it has been found that Minoux greedy methods may create routings with cycles and in order to eliminate these cycles a modification has been proposed. In this work, this modification is extended and evaluated in detail. Similarly, Gerla and Kleinrock&rsquo
s Concave Branch Elimination, Gersht&rsquo
s greedy and Stacey&rsquo
s Concave Link Elimination methods are investigated within the context of packet switching network design. All of these methods consider aggregate flows on each link simultaneously re-routing more than one commodity in one step. This thesis work also considers an alternative disaggregate approach, where only one commodity is handled at a time. Finally, algorithms proposed for circuit switching network design problem are adapted to the packet switching case and an extensive comparative computational study is performed to point out the best method with respect to time and solution quality for a number of networks and cost structure. Computational results have shown that modification on Minoux greedy to eliminate cycles leads to considerable improvements and the disaggregate approach gives the best result in some networks and cost structure.
Lin, Katherine Xiaoyan. "Green optical network design : power optimization of wide area and metropolitan area networks." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66434.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 133-134).
Advancements in technology are fueling huge growth in network traffic capacity. Demand for low cost, reliable, and high bitrate transmissions grows 40-110% internationally every year. To date, most research has focused on cost minimization of wide area and metropolitan area networks. In this thesis, we concentrate instead on finding scalable WAN designs with respect to power constraints and optimal MAN topologies with minimal capital and operating expenditures. We find optical bypass networks to be most scalable with respect to power consumption, especially when quality of service and network flexibility, reliability, and protection are considered. The power consumption of the standard bypass network can be lowered further through a hybrid design in which whole wavelengths of core, stable traffic between node pairs are routed via direct, fixed lightpaths using patch panelling and unexpected, bursty traffic is switched on a standard optical bypass network. We analyze power distribution among components and find the OXC switch most scalable at each node and O/E/O switches and routers wasteful. Finally, we prove that shortest path and minimum hop routing is power optimal and traffic balanced routing should be avoided. We approximate MAN topologies with regular graphs for tractable analysis. We augment a previous cost-based joint optimization formulation [13] with power expenditure modelling and obtain closed form solutions for optimal node degree and normalized network costs. We find that the optimal node connectivity increases 20-25% due to the added operating expenditures. Normalized network cost and normalized network cost per unit traffic also rise by approximately 25%. Our results show that the Generalized Moore graph with node degree between 0.05N and 0.08N is both power and cost minimal for a purely optical network.
by Katherine Xiaoyan Lin.
M.Eng.
Rezaee, Arman. "Network coding, multi-packet reception, and feedback : design tools for wireless broadcast networks." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68508.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 89-92).
In this thesis, we address the combination of three technologies in wireless broadcast networks: network coding, multi-packet reception (MPR) and feedback. We will primarily discuss the performance of a single-hop network, both with and without these technologies. A single-hop network can be used as a building block for larger and more topologically diverse networks and provides a basis for analyzing the interaction of these mechanisms. Because many applications are interested in speedy transmission of data, we have focused our attention on answering the question of how to optimally use these technologies in order to reduce the overall transmission time. Initially, we consider a fully connected network and show that MPR capability of m can reduce the total time for a file transfer by as much as a factor of m/2 without network coding. We emphasize that a two-fold MPR capability will not reduce the total dissemination time without network coding and is thus ineffective. We also show that no gain can be obtained, if network coding is used without MPR. However the combination of network coding and MPR can reduce the total transfer time by as much as a factor of m. We then consider transmission of a file over a broadcast erasure channel with a potentially large number of receivers. Noting that traditional reliable multicast protocols suffer from the inevitable feedback implosion associated with servicing a large number of receivers, we present a novel feedback protocol dubbed SMART, Speeding Multicast by Acknowledgment Reduction Technique. The protocol involves an asymptotically optimal predictive model which determines a suitable feedback time that assures most receivers have completed the download. We also introduce a new single slot feedback mechanism, which enables any number of receivers to give their feedback simultaneously. We show that scheduling the feedback according to this predictive model and enhancing the protocol by the single slot mechanism reduces the feedback traffic as well as transmission of extraneous coded packets, and will provide a good completion time characteristic for all users. We show that counter to conventional wisdom, Quality of Experience (QoE) of multicast sessions is not sensitive to the number of users, however it is very sensitive to imbalanced effective rate and heterogeneity among users. Furthermore, we show that SMART performs nearly as well as an omniscient transmitter that requires no feedback.
by Arman Rezaee.
S.M.
Cheung, Jimmy. "Design and development of a network architecture for a chemical sensor network." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/91381.
Full textIncludes bibliographical references (leaf 67).
A real-time continuous chemical sensor network can obtain detailed data to analyze the dynamic behavior of water systems such as a lake. The behaviors of interest to us in Upper Mystic Lake are the effects of stratification on methane water chemistry and the results of water mixing between layers. To monitor the water chemistry, a network of three buoys is populated with various sensors. This paper covers the design implementation of the network architecture for transmitting sensor data between buoys and a shore station. The buoys' sensors and construction are also included.
by Jimmy Cheung.
M.Eng.and S.B.
Subramanian, Suvinay. "Ordered Mesh Network Interconnect (OMNI) : design and implementation of in-network coherence." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82379.
Full textTitle as it appears in MIT Commencement Exercises program, June 2013: Design and implementation of in-network coherence. Cataloged from PDF version of thesis.
Includes bibliographical references (p. 101-104).
CMOS technology scaling has enabled increasing transistor density on chip. At the same time, multi-core processors that provide increased performance, vis-a'-vis power efficiency, have become prevalent in a power constrained environment. The shared memory model is a predominant paradigm in such systems, easing programmability and increasing portability. However with memory being shared by an increasing number of cores, a scalable coherence mechanism is imperative for these systems. Snoopy coherence has been a favored coherence scheme owing to its high performance and simplicity. However there are few viable proposals to extend snoopy coherence to unordered interconnects - specifically, modular packet-switched interconnects that have emerged as a scalable solution to the communication challenges in the CMP era. This thesis proposes a distributed in-network global ordering scheme that enables snoopy coherence on unordered interconnects. The proposed scheme is realized on a two-dimensional mesh interconnection network, referred to as OMNI (Ordered Mesh Network Interconnect). OMNI is an enabling solution for the SCORPIO processor prototype developed at MIT - a 36-core chip multi-processor supporting snoopy coherence, and fabricated in a commercial 45nm technology. OMNI is shown to be effective, reducing runtime by 36% in comparison to directory and Hammer coherence protocol implementations. The OMNI network achieves an operating frequency of 833 MHz post-layout, occupies 10% of the chip area, and consumes less than 100mW of power.
by Suvinay Subramanian.
S.M.
Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.
Full textSrinivasan, Sridhar. "Design and Use of Managed Overlay Networks." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14501.
Full textHarper, Scott Jeffery. "Design of a hardware interface for a high-speed parallel network." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-01102009-063929/.
Full textIngco, Divinagracia I. (Divinagracia Ilagan). "Network design problems for improving facility locations." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/14494.
Full textIncludes bibliographical references (leaf 116).
by Divinagracia I. Ingco.
M.S.
Johnston, Matthew R. (Matthew Ryan). "A robust optimization approach to network design." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62451.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 91-93).
This thesis addresses the problem of logical topology design for optical backbone networks subject to traffic following a Gaussian distribution. The network design problem is broken into three tasks: traffic routing, capacity allocation, and link placement. The routing and capacity allocation problems are formulated as a convex mathematical program. To extend this formulation to discrete optimization problems, such as the link placement sub-problem, it is reformulated as a mixed integer linear program (MILP) by extending tools from robust optimization to Gaussian variables. Bounds are presented to relate capacity allocation to the probability of traffic overflow on a link. Lastly, the link placement subproblem is formulated as an MILP and network topologies for deterministic traffic are compared with those for stochastic traffic. Additionally, this thesis presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffic is rerouted through a preplanned path in the backup network. We introduce a novel approach for dealing with random link failures, in which probabilistic survivability guarantees are provided to limit capacity over-provisioning. We show that the optimal backup routing strategy in this respect depends on the reliability of the primary network. Specifically, as primary links become less likely to fail, the optimal backup networks employ more resource sharing amongst backup paths. We apply results from the field of robust optimization to formulate an ILP for the design and capacity provisioning of these backup networks. We then propose a simulated annealing heuristic to solve this problem for large-scale networks, and we present simulation results to verify our analysis on optimal backup networks.
by Matthew R. Johnston.
S.M.
Sulaiman, Md Nasir. "The design of a neural network compiler." Thesis, Loughborough University, 1994. https://dspace.lboro.ac.uk/2134/25628.
Full textKandah, Farah Issa. "A Secure and Reliable Interference-Aware Wireless Mesh Network Design." Diss., North Dakota State University, 2012. https://hdl.handle.net/10365/26479.
Full textCarlini, Nicholas. "Evaluation and Design of Robust Neural Network Defenses." Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10931076.
Full textNeural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neural networks are vulnerable to test-time evasion attacks adversarial examples): inputs specifically designed by an adversary to cause a neural network to misclassify them. This makes applying neural networks in security-critical areas concerning. In this dissertation, we introduce a general framework for evaluating the robustness of neural network through optimization-based methods. We apply our framework to two different domains, image recognition and automatic speech recognition, and find it provides state-of-the-art results for both. To further demonstrate the power of our methods, we apply our attacks to break 14 defenses that have been proposed to alleviate adversarial examples. We then turn to the problem of designing a secure classifier. Given this apparently-fundamental vulnerability of neural networks to adversarial examples, instead of taking an existing classifier and attempting to make it robust, we construct a new classifier which is provably robust by design under a restricted threat model. We consider the domain of malware classification, and construct a neural network classifier that is can not be fooled by an insertion adversary, who can only insert new functionality, and not change existing functionality. We hope this dissertation will provide a useful starting point for both evaluating and constructing neural networks robust in the presence of an adversary.
Saeed, Bahghtar Ibraheem. "Design of a wireless intelligent fuzzy controller network." Thesis, University of Huddersfield, 2014. http://eprints.hud.ac.uk/id/eprint/24569/.
Full textYou, N. Z. "The design of a microcomputer workstation in a network computer system." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356422.
Full textOmarouayache, Salim. "A graph theoretic approach to transputer network design for computer vision." Thesis, City University London, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.281815.
Full textLi, Liang. "Energy-efficient design and implementation of turbo codes for wireless sensor network." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/345593/.
Full textGomoluch, Mark Stephen. "The design of a low-cost local area network." Thesis, Cardiff University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.329796.
Full textAngelopoulos, Georgios Ph D. Massachusetts Institute of Technology. "Energy-aware network coding circuit and system design." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66021.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 73-78).
Network Coding (NC) has been shown to provide several advantages in communication networks in terms of throughput, data robustness and security. However, its applicability to networks with resource constrained nodes, like Body Area Networks (BANs), has been questioned due to its complexity requirements. Proposed NC implementations are based on high-end CPUs and GPUs, consuming hundreds of Watts, without providing enough insight about its energy requirements. As more and more mobile devices, sensors and other low power systems are used in modern communication protocols, a highly efficient and optimized implementation of NC is required. In this work, an effort is made to bridge NC theory with ultra low power applications. For this reason, an energy-scalable, low power accelerator is designed in order to explore the minimum energy requirements of NC. Based on post-layout simulation results using a TSMC 65nm process, the proposed encoder consumes 22.15 uW at 0.4V, achieving a processing throughput of 80 MB/s. These numbers reveal that NC can indeed be incorporated into resource constrained networks with battery-operated or even energy scavenging nodes. Apart from the hardware design, a new partial packet recovery mechanism based on NC, called PPRNC, is proposed. PPRNC exploits information contained in partial packets, similarly to existing Hybrid-ARQ schemes, but with a PHY-agnostic approach. Minimization of the number of retransmitted packets saves transmission energy and results in higher total network throughput, making PPRNC an attractive candidate for energy constrained networks, such as BANs, as well as modern, high-speed wireless mesh networks. The proposed mechanism is analyzed and implemented using commercial development boards, validating its ability to extract information contained from partial packets.
by Georgios Angelopoulos.
S.M.
Muller, Casey Maloney Rosales 1980. "Design and performance of a wired viral network." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29699.
Full textIncludes bibliographical references (p. 47-51).
We constructed a network that fully distributes access to audiovisual information. The information is apportioned among a family of machines. We call it Viral because it can scale in an ad hoc way and the addition of new nodes adds to the overall network capability. The network uses multiple multicast for distribution, acquires content from the broadcast television system, and makes viewing video content a more user-centric activity. In this thesis we address the performance of this network in comparison with other ways of providing the same spatio-temporal diversity of access to a body of work. We first provide some theoretical estimate of the capacity, and then we show how the network we built approaches those limits. This is done in terms of a presumed distribution of what the user wants.
by Casey Maloney Rosales Muller.
M.Eng.and S.B.
Anjali, Tricha. "DiffServ/MPLS Network Design and Management." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5191.
Full textO'Neal, Matthew R. "A design comparison between IPv4 and IPv6 in the context of MYSEA, and implementation of an IPv6 MYSEA prototype." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FONeal.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 49-50). Also available online.
Savage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Full textCloud, Jason M. (Jason Michael). "Cross-layer design with multi-packet reception, MAC, and network coding in multi-hop networks." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66024.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 87-90).
A cross-layer design approach is proposed that can be used to optimize the cooperative use of multi-packet reception (MPR) and network coding. A simple and intuitive model is constructed for the behavior of an opportunistic network coding scheme called COPE proposed by Katti et. al., MPR, the 802.11 MAC, and their combination. The model is then applied to key small canonical topology components and their larger counterparts. The results obtained from this model match the available experimental results with fidelity. Using this model, fairness allocation by the 802.11 MAC is shown to significantly impede performance and cause non-monotonic saturation behaviors; hence, a new MAC approach is devised that not only substantially improves throughput by providing monotonic saturation but provides fairness to flows of information rather than to nodes. Using this improved MAC, it is shown that cooperation between network coding and MPR achieves super-additive gains of up to 6.3 times that of routing alone with the standard 802.11 MAC. Furthermore, the model is extended to analyze the improved MAC's asymptotic, delay, and throughput behaviors. Finally, it is shown that although network performance is reduced under substantial asymmetry or limited implementation of MPR to a central/bottleneck node, there are some important practical cases, even under these conditions, where MPR, network coding, and their combination provide significant gains.
by Jason M. Cloud.
S.M.