Network control by Bayesian broadcast

نویسنده

  • Ronald L. Rivest
چکیده

A transmission control strategy is described for slottedALOHA-type broadcast channels with ternary feedback. At each time slot, each station estimates the probability that n stations are ready to transmit a packet for each n, using Bayes’ rule and the observed history of collisions, successful transmissions, and holes (empty slots). A station transmits a packet in a probabilistic manner based on these estimates. Tbis strategy is called Bayesian broadcast. An elegant and very practical strategy-pseudo-Bayesian broadcast-is then derived by approximating the probability estimates with a Poisson distribution with mean Y and further simplifying. Each station keeps a copy of V, transmits a packet with probability 1 / Y, and then updates Y in two steps:. l For collisions, increment v by (e 2)-l = 1.39221 *.* . For successes and holes, decrement Y by 1. l Set Y to max (V + x, l), where x is an estimate of the arrival rate A of new packets into the system. Simulation results are presented showing that pseudo-Bayesian broadcast performs well in practice, and methods that can be used to prove that certain versions of pseudo-Bayesian broadcast are stable for X < e ’ are

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Broadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach

While routing in multi-hop packet radio networks (static Ad-hoc wireless networks), it is crucial to minimize power consumption since nodes are powered by batteries of limited capacity and it is expensive to recharge the device. This paper studies the problem of broadcast routing in radio networks. Given a network with an identified source node, any broadcast routing is considered as a directed...

متن کامل

Learning Bayesian Network Structure using Markov Blanket in K2 Algorithm

‎A Bayesian network is a graphical model that represents a set of random variables and their causal relationship via a Directed Acyclic Graph (DAG)‎. ‎There are basically two methods used for learning Bayesian network‎: ‎parameter-learning and structure-learning‎. ‎One of the most effective structure-learning methods is K2 algorithm‎. ‎Because the performance of the K2 algorithm depends on node...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Green Supply Chain Risk Network Management and Performance Analysis: Bayesian Belief Network Modeling

With the increase in environmental awareness, competitions and government policies, implementation of green supply chain management activities to sustain production and conserve resources is becoming more necessary for different organizations. However, it is difficult to successfully implement green supply chain (GSC) activities because of the risks involved. These risks alongside their resourc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 33  شماره 

صفحات  -

تاریخ انتشار 1987