IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.971
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Throughput and Starvation in 802.11 Wireless Networks with Multiple Flows

Abstract: Abstract-Carrier sense multiple access (CSMA) protocols require stations that wish to transmit to first check the shared medium for ongoing transmissions. However, in wireless networks stations may not be able to sense transmissions from all other stations; hence those at different locations can experience different amounts of contention, resulting in unfairness and possible "starvation" (inability to acquire channel access for long periods). In this paper we model how the 802.11 MAC protocol allocates bandwid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2007
2007
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 16 publications
0
9
0
1
Order By: Relevance
“…As stated in [6] a large-scale network is very hard to model. A first attempt has been made in [7] to model the throughput of large-scale networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As stated in [6] a large-scale network is very hard to model. A first attempt has been made in [7] to model the throughput of large-scale networks.…”
Section: Introductionmentioning
confidence: 99%
“…The authors also provide an interesting discussion concerning the impact of the IEEE 802.11 MAC protocol. The idea of using a sequence of states of active or transmitting nodes, where each possible state is an independent set in the conflict graph as presented in [4,5] has been extended in [6] to provide a simple model for equally-distant string topologies of 802.11 terminals. However, their model is less accurate when the length of the string increases.…”
Section: Introductionmentioning
confidence: 99%
“…Every mobile node utilizes a similar scheduling algorithm for routing the data packets. In this model, it consider the conventional scheduling (priority scheduling) usually used in mobile ad hoc networks [6]. In buffer management, drop tail policy is utilized with no-priority scheduling and it works when buffer is empty otherwise drops the incoming packets.…”
Section: E Synchronous Two-phase Rate and Powermentioning
confidence: 99%
“…So the stream gets starved and the data transfer capacity is not productively used by the system. So to stay away from this issue we present a Starvation Mitigation Algorithm (SMA) by which we can give productive data transfer capacity use by every one of the nodes in a network and give decency in a" network [6].…”
Section: A) Netwirk Flooding Of Rreq B) Propagation Of Rrep Messagementioning
confidence: 99%
See 1 more Smart Citation