{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:43:33Z","timestamp":1767725013444,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319108339","type":"print"},{"value":"9783319108346","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10834-6_7","type":"book-chapter","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T13:21:44Z","timestamp":1408972904000},"page":"115-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Throughput Analysis in CSMA\/CA Networks Using Continuous Time Markov Networks: A Tutorial"],"prefix":"10.1007","author":[{"given":"Boris","family":"Bellalta","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Zocca","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Cano","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Checco","sequence":"additional","affiliation":[]},{"given":"Jaume","family":"Barcelo","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Vinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Laufer, R., Kleinrock, L.: On the capacity of wireless CSMA\/CA multihop networks. In: IEEE INFOCOM 2013 (2013)","DOI":"10.1109\/INFCOM.2013.6566924"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Herzen, J., Merz, R., Thiran, P.: Distributed spectrum assignment for home WLANs. In: IEEE INFOCOM 2013 (2013)","DOI":"10.1109\/INFCOM.2013.6566953"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TCOM.1987.1096769","volume":"35","author":"R Boorstyn","year":"1987","unstructured":"Boorstyn, R., Kershenbaum, A., Maglaris, B., Sahin, V.: Throughput analysis in multihop CSMA packet radio networks. IEEE Trans. Commun. 35(3), 267\u2013274 (1987)","journal-title":"IEEE Trans. Commun."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Kar, K.: Throughput modelling and fairness issues in CSMA\/CA based ad-hoc networks. In: IEEE INFOCOM 2005, vol. 1, pp. 23\u201334. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1497875"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Durvy, M., Thiran, P.: A packing approach to compare slotted and non-slotted medium access control. In: IEEE INFOCOM 2006 (2006)","DOI":"10.1109\/INFOCOM.2006.251"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Nardelli, B., Knightly, E.W.: Closed-form throughput expressions for CSMA networks with collisions and hidden terminals. In: IEEE INFOCOM 2012, pp. 2309\u20132317. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195618"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 535\u2013547 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"9","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TMC.2010.89","volume":"9","author":"SC Liew","year":"2010","unstructured":"Liew, S.C., Kai, C.H., Leung, H.C., Wong, P.: Back-of-the-envelope computation of throughput distributions in CSMA wireless networks. IEEE Trans. Mob. Comput. 9(9), 1319\u20131331 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LCOMM.2014.022514.140206","volume":"18","author":"B Bellalta","year":"2014","unstructured":"Bellalta, B., Belyaev, E., Jonsson, M., Vinel, A.: Performance evaluation of IEEE 802.11 p-enabled vehicular video surveillance system. IEEE Commun. Lett. 18(4), 708\u2013711 (2014)","journal-title":"IEEE Commun. Lett."},{"key":"7_CR10","volume-title":"Reversibility and Stochastic Networks","author":"FP Kelly","year":"1979","unstructured":"Kelly, F.P.: Reversibility and Stochastic Networks. Wiley, New York (1979)"},{"issue":"11","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1016\/j.peva.2010.08.011","volume":"67","author":"PM van de Ven","year":"2010","unstructured":"van de Ven, P.M., Borst, S.C., Van Leeuwaarden, J.S.H., Prouti\u00e8re, A.: Insensitivity and stability of random-access networks. Perform. Eval. 67(11), 1230\u20131242 (2010)","journal-title":"Perform. Eval."},{"issue":"6","key":"7_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164\u2013171 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1109\/TVT.2012.2192301","volume":"61","author":"A Vinel","year":"2012","unstructured":"Vinel, A., Belyaev, E., Egiazarian, K., Koucheryavy, Y.: An overtaking assistance system based on joint beaconing and real-time video transmission. IEEE Trans. Veh. Technol. 61(5), 2319\u20132329 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9780470661291","volume-title":"Power Line Communications","author":"HC Ferreira","year":"2010","unstructured":"Ferreira, H.C., Lampe, L., Newbury, J., Swart, T.G.: Power Line Communications. Wiley, New York (2010)"},{"key":"7_CR15","unstructured":"Homeplug Powerline Alliance. Homeplug 1.0 Specification (2001)"},{"key":"7_CR16","unstructured":"IEEE Std 1901: Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications. ANSI\/IEEE Std 1901 (2010)"},{"key":"7_CR17","unstructured":"IEEE P802.11n-2009: Draft Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY): Enhancements for High Throughput (2009)"},{"key":"7_CR18","unstructured":"IEEE WG11ac: Draft Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 5: Enhancements for Very High Throughput for Operation in Bands below 6\u00a0GHz (2014)"},{"issue":"226","key":"7_CR19","first-page":"2013","volume":"2013","author":"R Liao","year":"2013","unstructured":"Liao, R., Bellalta, B., Barcelo, J., Valls, V., Oliver, M.: Performance analysis of IEEE 802.11ac wireless backhaul networks in saturated conditions. EURASIP J. Wirel. Commun. Netw. 2013(226), 2013 (2013)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Heusse, M., Rousseau, F., Berger-Sabbatel, G., Duda, A.: Performance anomaly of 802.11b. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 2, pp. 836\u2013843. IEEE (2003)","DOI":"10.1109\/INFCOM.2003.1208921"}],"container-title":["Lecture Notes in Computer Science","Wireless Networking for Moving Objects"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10834-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:06:30Z","timestamp":1746338790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10834-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319108339","9783319108346"],"references-count":20,"aliases":["10.1007\/978-3-319-14116-9_7"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10834-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}