2009 IEEE Latin-American Conference on Communications 2009
DOI: 10.1109/latincom.2009.5304796
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of performance degradation in Radio-over-Fiber systems based on IEEE 802.16 protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0
2

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 9 publications
0
10
0
2
Order By: Relevance
“…Similar to other access control protocols that have been proposed for converged Radio-over-Fiber(RoF) networks [13] [14], the MT-MACs are specifically designed to operate upon a hybrid optical/wireless underlying infrastructure, as depicted in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to other access control protocols that have been proposed for converged Radio-over-Fiber(RoF) networks [13] [14], the MT-MACs are specifically designed to operate upon a hybrid optical/wireless underlying infrastructure, as depicted in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%
“…In the last decade, numerous studies on the effect of fiber delay on MAC protocols have been published [1]- [3], [7], [8]. Both the centralized HiperLAN/2 and the distributed IEEE 802.11 MAC protocols were compared in [2], [3].…”
Section: Related Workmentioning
confidence: 99%
“…The impact of RoF on IEEE 802.16 WiMAX is presented in [1], [7]. Compared to the distributed MAC protocols, the centralized IEEE 802.16 MAC protocol can adjust itself to support RoF.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For other popular mobile or wireless standards such as WIMAX, LTE etc., the tolerance to the inserted fiber propagation delay is found to be much greater than with the 802.11 protocol when they are employed in RoF-DAS systems [11][12][13][14]. These mobile systems are designed for greater wireless distances, and hence tolerate some delay variation, but also employ MAC protocols which are somewhat more centralized, at least after some initial contention procedure for users to gain access.…”
Section: Introductionmentioning
confidence: 99%