An analysis of uplink multiple access protocols in meshed VSAT satellite networks

Yann Hang Lee, Randy Chow, Kyungshik Lim, William D. Ivancic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The paper gives a brief description of the meshed VSAT satellite network under investigation by the NASA Lewis Research Center and a detailed performance model of the uplink protocol access techniques. The satellite has eight uplink beams with one or two dedicated 64 kbps access request channels per beam. The request channel is a multiple access packet transmission channel and adopts the slotted ALOHA protocol. The performance analysis reveals the effects of various request channel implementations on data channel throughput and channel connection delay. System parameters considered include the number of request channels, the offered load of request channels, request buffering strategies, and channel allocation/deallocation strategies. The result is a part of the performance analysis of the meshed VSAT satellite network.

Original languageEnglish (US)
Title of host publicationProceedings of Phoenix Conference on Computers and Communications, PCCC 1993
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages394-400
Number of pages7
ISBN (Electronic)0780309227, 9780780309227
DOIs
StatePublished - Jan 1 1993
Externally publishedYes
Event1993 Phoenix Conference on Computers and Communications, PCCC 1993 - Tempe, United States
Duration: Mar 23 1993Mar 26 1993

Publication series

NameProceedings of Phoenix Conference on Computers and Communications, PCCC 1993

Conference

Conference1993 Phoenix Conference on Computers and Communications, PCCC 1993
Country/TerritoryUnited States
CityTempe
Period3/23/933/26/93

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'An analysis of uplink multiple access protocols in meshed VSAT satellite networks'. Together they form a unique fingerprint.

Cite this