By Topic

On the Maximum Stable Throughput of Tree Algorithms With Free Access

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Peeters, G.T. ; Math. & Comput. Sci. Dept., Univ. of Antwerp-IBBT, Antwerp, Belgium ; Van Houdt, B.

A simple numerical procedure is presented to determine the maximum stable throughput (MST) of various tree algorithms with free access by defining an associated multitype branching process such that the criticality of the branching process corresponds to the stability of the tree algorithm. More precisely, a bisection algorithm is proposed that only requires the computation of the dominant eigenvalue of the expectation matrix of the branching process, the size of which is typically below 20, at each step. Using this novel approach, many existing results on free-access tree algorithms are reproduced without much effort (e.g., channels with/without noise, variable length packets, interference cancellation, etc.). Furthermore, in an almost plug-and-play manner, the MST of the free access equivalent of many existing results on tree algorithms with blocked access is established (e.g., channels with capture, control signals, multireception capabilities, etc.). The method can be applied to the class of independent and identically distributed (i.i.d.) arrival processes, which includes the Poisson process as a special case. Apart from determining the MST, the probability that a sizei collision is resolved in a finite amount of time when the arrival rate exceeds the MST can also be computed. Some limitations of the proposed methodology are discussed as well.

Published in:

Information Theory, IEEE Transactions on  (Volume:55 ,  Issue: 11 )