Proceedings of the 2017 International Conference Advanced Engineering and Technology Research (AETR 2017)

CSMA/CA Analysis Based on the Markov Chain

Authors
Wei Wang, Wenhong Zhao
Corresponding Author
Wei Wang
Available Online March 2018.
DOI
10.2991/aetr-17.2018.61How to use a DOI?
Keywords
Markov chain; CSMA/CA; MAC; Network security
Abstract

First, the CSMA/CA mechanism is modeled. Then, based on markov chain theory, the attack method of CSMA/CA is analyzed from two aspects of stochastic performance model and bandwidth sharing model. After discussing the typical attack methods, through the throughput, communication efficiency and collision number analysis the performance of attack methods, verified the CSMA/CA based on the theory of markov chain vulnerability analysis method is feasible and effective. Finally, this paper presents a simple and efficient MAC protocol for full duplex network - full duplex MAC protocol.

Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2017 International Conference Advanced Engineering and Technology Research (AETR 2017)
Series
Advances in Engineering Research
Publication Date
March 2018
ISBN
10.2991/aetr-17.2018.61
ISSN
2352-5401
DOI
10.2991/aetr-17.2018.61How to use a DOI?
Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Wei Wang
AU  - Wenhong Zhao
PY  - 2018/03
DA  - 2018/03
TI  - CSMA/CA Analysis Based on the Markov Chain
BT  - Proceedings of the 2017 International Conference Advanced Engineering and Technology Research (AETR 2017)
PB  - Atlantis Press
SP  - 317
EP  - 323
SN  - 2352-5401
UR  - https://doi.org/10.2991/aetr-17.2018.61
DO  - 10.2991/aetr-17.2018.61
ID  - Wang2018/03
ER  -