2008
DOI: 10.1016/j.adhoc.2007.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…In Vassis and Kormentzas [12], Vassis et al evaluated the performance effects of exposed terminals in IEEE 802.11 ad hoc networks under finite load conditions. This paper used the model in Tobagi and Kleinrock [13] to derive total delay and network utilization parameters.…”
Section: Related Workmentioning
confidence: 99%
“…In Vassis and Kormentzas [12], Vassis et al evaluated the performance effects of exposed terminals in IEEE 802.11 ad hoc networks under finite load conditions. This paper used the model in Tobagi and Kleinrock [13] to derive total delay and network utilization parameters.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, it currently only supports the IEEE 802.11b specification with a maximum data rate up to 11 Mb/s in the 2.4-GHz band [12]. More recently, the tools Pythagor and Panvotis appeared with the sole purpose of studying WLANs [13], [14]. Their main feature is their support for different types of physical-layer implementation and their speed rates, as well as net operations, by combining IEEE 802.11b/g nodes in mixed mode.…”
Section: Introductionmentioning
confidence: 99%
“…To this end, we propose Imola, a decentralised learning-driven networking paradigm that overcomes the performance limitations facing carrier sensing based access mechanisms in multi-hop topologies, especially when operating in TVWS [7] . Precisely, as base sta-tions often compete with different numbers of neighbours, while encountering hidden and exposed terminal problems [8,9] , their performance degrades severely and unfairness arises in the absence of appropriate link scheduling. 1 For example, consider a typical multi-hop wireless network where traffic flows traverse two hops to an Internet gateway, as illustrated in Fig.…”
Section: Introductionmentioning
confidence: 99%