2014
DOI: 10.1007/s11277-014-1894-9
|View full text |Cite
|
Sign up to set email alerts
|

Throughput and Delay Analysis of IEEE 802.11 DCF in the Presence of Hidden Nodes for Multi-hop Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Similar work can be found in [22], where the authors analyzed the throughput of the IEEE 802.11 protocol in the non-saturated traffic conditions by considering the imperfect channel sensing. The hidden node problem does not eliminate by use the RTS/CTS mechanism in wireless multihop networks [23], [24]. Considering the non-ideal channel and hidden node problems adds complexity to the existing analysis for multihop networks.…”
Section: Iraqi Journal For Electrical and Electronic Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar work can be found in [22], where the authors analyzed the throughput of the IEEE 802.11 protocol in the non-saturated traffic conditions by considering the imperfect channel sensing. The hidden node problem does not eliminate by use the RTS/CTS mechanism in wireless multihop networks [23], [24]. Considering the non-ideal channel and hidden node problems adds complexity to the existing analysis for multihop networks.…”
Section: Iraqi Journal For Electrical and Electronic Engineeringmentioning
confidence: 99%
“…After B sends the RTS_b frame to A, considering C did not hear B, and C sends a RTS_c frame to A simultaneous that A sends a CTS_a frame to node B, as the reqiuest to RTS_b frame. More detials for hidden nodes problems can be found in [24]. In this paper, several additional necessary assumptions are made for the analytical model as follows: i) The RTS/CTS access methoed is applied.…”
Section: Analytical Modelmentioning
confidence: 99%
“…Researches on wireless networks aim for feasible and cheap broadband internet access, as well as investigation on Quality of Service (QoS) for critical time services systems (such as healthcare and telemedicine, emergency and disaster networking systems) have recently attracted considerable attention. Wireless multi-hop networks, such as wireless mesh networks (WMNs) random topology, are considered an ideal networks field for such services [1] thus; multi-hop wireless networks become necessary for users. However due to the limitation of the transmission range of wireless network interfaces, multiple hops are needed to extend range and exchange data between stations in the network and the IEEE 802.11 standard is widely applied in multi-hop wireless networks [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…Since the DCF (Distributed Coordination Function) protocol was introduced for the fundamental MAC (MeWoo-Yong Choi3 Access Control) access mechanism for IEEE 802.11 wireless LANs in 1997, the DCF protocol has been the primary MAC protocol for wireless LANs [1][2][3]. However, because the DCF protocol depends on the exponential back-off mechanism, it suffers from the exponential MAC performance degradation as more nodes exist in a wireless LAN [4,5].…”
Section: Introductionmentioning
confidence: 99%