2006
DOI: 10.1561/1300000002
|View full text |Cite
|
Sign up to set email alerts
|

Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
110
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 148 publications
(111 citation statements)
references
References 26 publications
1
110
0
Order By: Relevance
“…Proof: Our proof is similar to that of [10] except that we account for n− k unicast pairs in the network. The probability that the destination node j is x away from the source node is C 3 π(x+d n ) [10] where C 3 is a constant. Thus, the probability p that there is a line passing through the cell S which is with distance x from j is…”
Section: The Traffic Caused By Unicast Communicationsmentioning
confidence: 97%
See 2 more Smart Citations
“…Proof: Our proof is similar to that of [10] except that we account for n− k unicast pairs in the network. The probability that the destination node j is x away from the source node is C 3 π(x+d n ) [10] where C 3 is a constant. Thus, the probability p that there is a line passing through the cell S which is with distance x from j is…”
Section: The Traffic Caused By Unicast Communicationsmentioning
confidence: 97%
“…The selection of sources for the access node i is based on the technique described in [10]. We randomly and uniformly select k locations in the network and choose the closest nodes to these k locations as sources for the access node.…”
Section: A the Routing Scheme And The Scheduling Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…We use the protocol model [11] to determine the success of communication in the presence of multiple access interference (MAI). In particular, if χ i , χ j and χ k denote the Cartesian positions in the unit square area for nodes v i , v j and v k , node v i can successfully transmit to node v j if |χ i −χ j | ≤ r(n), where r(n) is the common transmission range of all the nodes in the network, and for any node v k = v i , that transmits at the same time as v i , |χ k − χ j | ≥ (1 + ∆)r(n), with ∆ > 0 as the guard zone factor.…”
Section: Preliminariesmentioning
confidence: 99%
“…The protocol model defined in [7] is based on single-packet reception. The transmission range r(n) is common for all nodes in the network.…”
Section: Preliminariesmentioning
confidence: 99%