From: Coded unicast downstream traffic in a wireless network: analysis and WiFi implementation
Packet loss and policy | user a | user b | System |
---|---|---|---|
p a =0.1,p b =0.1, uncoded | 0.45 | 0.45 | 0.9 |
p a =0.1,p b =0.1, greedy | 0.453 | 0.453 | 0.906 |
p a =0.1,p b =0.1, semi-greedy | 0.47 | 0.47 | 0.943 |
p a =0.1,p b =0.2, uncoded | 0.45 | 0.4 | 0.85 |
p a =0.1,p b =0.2, greedy | 0.455 | 0.404 | 0.86 |
p a =0.1,p b =0.2, semi-greedy | 0.66 | 0.26 | 0.921 |
p a =0.1,p b =0.4, uncoded | 0.45 | 0.3 | 0.75 |
p a =0.1,p b =0.4, greedy | 0.457 | 0.305 | 0.762 |
p a =0.1,p b =0.4, semi-greedy | 0.815 | 0.09 | 0.905 |