|
|
![]() |
Notes:
|
![]() |
Observations:
|
![]() |
|
![]() U Snon-persistent CSMA = ------ ...... (1) B + I |
All we need to do now is to find U, B, and I :-)
![]() |
Notes:
|
Ҏ[ I ≤ x ] = 1 - Ҏ[ I > x ] = 1 - Ҏ[ no packet arrives in x sec ]
(Gx)0 Ҏ[ I ≤ x ] = 1 - ---- e-Gx 0! <=> Ҏ[ I ≤ x ] = 1 - e-Gx ...... (2) |
d Ҏ[ I ≤ x ] fI(x) = --------------- d x d (1 - e-Gx) <==> fI(x) = -------------- d x <==> fI(x) = G e-Gx ...... (3) |
I = 0∫∞ x fI(x) dx (= the definition of expected value) <=> I = 0∫∞ x G e-Gx dx 1 | x = ∞ <=> I = -x e-Gx - --- e-Gx | G | x = 0 1 <=> I = ( 0 - 0 ) - ( 0 - --- ) G 1 <=> I = --- ..... (4) G |
One down, two more to go....
|
|
![]() |
Notes:
|
![]() |
Notes to the figure above:
Ҏ[ transmission successful ] = Ҏ[ 0 arrivals within "vulnerable period" ] = Ҏ[ 0 arrivals within τ sec ]
(Gτ)0 Ҏ[ transmission successful ] = ----- e-Gτ 0! <=> Ҏ[ transmission successful ] = e-Gτ ..... (5) |
U = T × Ҏ[ transmission successful ] + 0 × (1 - Ҏ[ transmission successful ]) = T × e-Gτ + 0 × (1 - e-Gτ)
|
Two down, one more to go....