InnovationQ will be updated on Sunday, September 22, from 10am-noon ET. You may experience brief service interruptions during that time.
Browse Prior Art Database


IP.com Disclosure Number: IPCOM000009521D
Original Publication Date: 1999-Sep-01
Included in the Prior Art Database: 2002-Aug-29

Publishing Venue


Related People

K. Aswarth Rao Yih G. Jan Joel L. Gross


Many random access algorithms have been implemented, investigated and studied for a period of time in data communication industry. Basically these algorithms can be categorized into following three classes: 1. Generalized Aloha algorithm: Every network user monitors its status after transmitting its access request, this request may be a new request or a retransmission of previous request since it has not been successfully accepted by the network. User can uniformly select a time slot to retransmit its request over next few time slots or to retransmit the request in the next time slot with certain probability, or using an exponential backoff process to handle the retransmission request in different algorithms. This kind of algorithm eventually becomes unstable and needs to generate the system throughput versus sys- tem average delay curve to investigate its system behavior.