Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)
DOI: 10.1109/icccn.1999.805499
|View full text |Cite
|
Sign up to set email alerts
|

Isolation of wireless ad hoc medium access mechanisms under TCP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Moreover, none of these papers present the effect of available buffer at the base station and the interaction of 802.11 MAC protocol on the user level unfairness observed at the TCP layer. Research on interaction of TCP over 802.11 based ad hoc networks [14], [4], [15] has taken factors such as mobility and multiple hops into account. However, the unfairness problems in 802.11 based WLAN installations arising due to buffer size availability has neither been studied nor observed before.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, none of these papers present the effect of available buffer at the base station and the interaction of 802.11 MAC protocol on the user level unfairness observed at the TCP layer. Research on interaction of TCP over 802.11 based ad hoc networks [14], [4], [15] has taken factors such as mobility and multiple hops into account. However, the unfairness problems in 802.11 based WLAN installations arising due to buffer size availability has neither been studied nor observed before.…”
Section: Related Workmentioning
confidence: 99%
“…In the following, as an example of a dynamically variable system, we focus on a wireless multi-hop Mobile Ad Hoc Network (MANET) [17,35]. Simulation models for wireless systems incarnate the assumptions that motivated our design.…”
Section: A Case Study Of a Dynamic Modelmentioning
confidence: 99%
“…Topology changes due to simulated hosts' mobility map on causality effects in the "areas of influence" of each mobile device, resulting in dynamically shaped causalitydomains and component interaction schemes. Given two or more neighbor-hosts sharing the wireless medium, the causal effect of signal interference could result in a chain of local-state events up to the high protocols' layers [35]. In our approach, we define a model entity as the data structure defined to model a Simulated Mobile Host (SMH).…”
Section: A Case Study Of a Dynamic Modelmentioning
confidence: 99%
See 2 more Smart Citations