{"id":186528,"date":"2011-07-20T00:00:00","date_gmt":"2011-07-21T11:26:31","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/medium-access-using-queues\/"},"modified":"2016-08-22T11:31:55","modified_gmt":"2016-08-22T18:31:55","slug":"medium-access-using-queues","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/medium-access-using-queues\/","title":{"rendered":"Medium Access Using Queues"},"content":{"rendered":"
\n

Medium access control (MAC) resolves contention among simultaneously transmitting wireless nodes so as to utilize the wireless medium efficiently while mitigating interference.To be implementable, the MAC algorithm is required to be totally distributed and simple. In this talk, we will present such a MAC algorithm that is optimal in terms of utilizing medium and thus bringing a long pursued quest (since 1970s) to an end. In this MAC, each node utilizes its local queue-size and recent contention history to make decisions. We will also discuss related issues in stochastic networks. The talk will be self-contained. It is based on joint work with Jinwoo Shin and Prasad Tetali.<\/p>\n<\/div>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Medium access control (MAC) resolves contention among simultaneously transmitting wireless nodes so as to utilize the wireless medium efficiently while mitigating interference.To be implementable, the MAC algorithm is required to be totally distributed and simple. In this talk, we will present such a MAC algorithm that is optimal in terms of utilizing medium and thus […]<\/p>\n","protected":false},"featured_media":196254,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[13561,13547],"msr-video-type":[],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-186528","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-algorithms","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/Q9TX2y9Jf4w","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/186528"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/186528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/196254"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=186528"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=186528"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=186528"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=186528"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=186528"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=186528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}