IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
DOI: 10.1109/glocom.2004.1378861
|View full text |Cite
|
Sign up to set email alerts
|

MAC layer performance analysis of multi-hop ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Apart from the assumption explained above, previous research papers [8,12] are based on the variable slot and use the relevant equation for the transmission probability τ and an expression of the form p = 1 − (1 − τ ) Tv (where Tv is the duration of the vulnerable period normalised to σ) for the conditional collision probability p. We claim that these modeling techniques have an important limitation. In fact, in the conventional modeling it is implied that if we discretised time into these variable slots, then the channel state would be described as a succession of 1/τ − 1 non-transmitting backoff slots followed by a transmitting slot (with collision or success) and the same pattern being repeated.…”
Section: Motivationmentioning
confidence: 96%
See 1 more Smart Citation
“…Apart from the assumption explained above, previous research papers [8,12] are based on the variable slot and use the relevant equation for the transmission probability τ and an expression of the form p = 1 − (1 − τ ) Tv (where Tv is the duration of the vulnerable period normalised to σ) for the conditional collision probability p. We claim that these modeling techniques have an important limitation. In fact, in the conventional modeling it is implied that if we discretised time into these variable slots, then the channel state would be described as a succession of 1/τ − 1 non-transmitting backoff slots followed by a transmitting slot (with collision or success) and the same pattern being repeated.…”
Section: Motivationmentioning
confidence: 96%
“…11, there has been much research effort put into the theoretical analysis of one-hop wireless LANs, with the most prominent paper being [7]. However, as we will show in Section 2, a simple extension of [7] which is followed by many researchers in the field [8,12] is not appropriate for a network exhibiting hidden terminals. Another frequent assumption is the one of synchronisation among the nodes which simplifies the analysis by the use of renewal theory [10,12].…”
Section: Introductionmentioning
confidence: 98%
“…Models in refs. [13][14][15] investigated the throughput with non-saturated traffic in multi-hop ad hoc networks. However, there has been no solution to present the end-to-end delay under non-saturated traffic in a multi-hop scenario to the best of our knowledge.…”
Section: Introductionmentioning
confidence: 99%
“…A wireless ad hoc network does not require any infrastructure support in order to provide any type of communication among nodes [1]. MAC protocols are used for multiple nodes to share scarce wireless bandwidth in an orderly and efficient manner [2]. Recently, quality-of-service (QoS) is more and more important and necessary for real-time traffic such as voice and video [3].…”
Section: Introductionmentioning
confidence: 99%