2008 33rd IEEE Conference on Local Computer Networks (LCN) 2008
DOI: 10.1109/lcn.2008.4664183
|View full text |Cite
|
Sign up to set email alerts
|

Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…In contrast, in the current paper, the simpler model allows much cleaner derivation and closed form results. Finally, our work [11] showed that the benefits from using the SINR model are small and the two models are quite close; the additional complexity does not expose significantly different results. Thus, the simpler and cleaner two disc model presented in this paper is sufficient for most cases, and is probably more appropriate (because of complexity) for forming practical protocols.…”
Section: Related Workmentioning
confidence: 75%
See 1 more Smart Citation
“…In contrast, in the current paper, the simpler model allows much cleaner derivation and closed form results. Finally, our work [11] showed that the benefits from using the SINR model are small and the two models are quite close; the additional complexity does not expose significantly different results. Thus, the simpler and cleaner two disc model presented in this paper is sufficient for most cases, and is probably more appropriate (because of complexity) for forming practical protocols.…”
Section: Related Workmentioning
confidence: 75%
“…We also develop and present throughput models for these five cases. In [11] we derive the interactions using the SINR model (whereas in this paper we derived them for the two disc model). The derivation and results are quite different: the SINR case is significantly more complicated, leading to more than 1 million individual cases.…”
Section: Related Workmentioning
confidence: 99%
“…Given two source-destination pairs S1−D1 and S2−D2, there exist four secondary links: S1 − S2, S1 − D2, S2 − D1, and D1 − D2 that can interfer with each other. Although there can be a large number of combinations for these interactions [7,8], we discover that a limited number of these interactions are possible between links of chain. We summarize these interactions in Figure 1, and briefly describe each one.…”
Section: Link Interactionsmentioning
confidence: 93%
“…Razak et al have determined that, between any two links, there can be 10 different interference interaction possible [8]. For a three-hop chain only interactions i1 -i4 apply.…”
Section: Chain Interactionsmentioning
confidence: 99%
“…Second, it avoids the effects of MAC protocols such as retries and exponential back-off. The effect of MAC protocol can be predicted by using the existing MAC models with the measured PER data [16], [17].…”
Section: B Measurement Protocolmentioning
confidence: 99%