2000
DOI: 10.1109/18.825799
|View full text |Cite
|
Sign up to set email alerts
|

The capacity of wireless networks

Abstract: When identical randomly located nodes, each capable of transmitting at bits per second and using a fixed range, form a wireless network, the throughput () obtainable by each node for a randomly chosen destination is 2 log bits per second under a noninterference protocol. If the nodes are optimally placed in a disk of unit area, traffic patterns are optimally assigned, and each transmission's range is optimally chosen, the bit-distance product that can be transported by the network per second is 2() bit-meters … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

141
7,110
20
57

Year Published

2003
2003
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 7,088 publications
(7,328 citation statements)
references
References 13 publications
141
7,110
20
57
Order By: Relevance
“…Whereas the two previous interference models are only concerned with pairwise (binary) link conflict, this model [6] captures a more realistic situation: the interference to a certain link is the cumulative interference from multiple links that are active at the same time. Hence, under this interference model, a set s ⊆ L is an ISet iff:…”
Section: ) Additive Interference Modelmentioning
confidence: 99%
“…Whereas the two previous interference models are only concerned with pairwise (binary) link conflict, this model [6] captures a more realistic situation: the interference to a certain link is the cumulative interference from multiple links that are active at the same time. Hence, under this interference model, a set s ⊆ L is an ISet iff:…”
Section: ) Additive Interference Modelmentioning
confidence: 99%
“…Lemma 1.The capacity of MC-HDAS networks is nλ = O nW θ 2 logn bits/sec, and that of MC-HDAH networks is nλ = O nW (θ 2 +(4π 2 −θ 2 )s 2 )logn bits/sec. Proof.for MC-HDAS networks, the condition interference zone is θ 2 (2π) 2 portion of that when ominidirectional antennas are used at both ends [4,14]. Since for ominidirectional antennas, Therefore, the interference zone is θ 2 (2π) 2 π r 2 i 4 ( r i is the transmission radius)for each transmission on channel i (1 ≤ i ≤ c ).…”
Section: Upper Boundmentioning
confidence: 99%
“…The protocol model proposed by Gupta and Kumar [4] is extended to include directional antennas in the paper. It is the receiver-based interference model proposed in [14].…”
Section: Interference Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Because the sensor nodes carry limited and generally irreplaceable power sources, the protocols designed for WSN must seriously take the issue of energy efficiency into consideration. The clustering-based routing protocols proposed for the WSN try to evenly distribute the consumption of the energy of the sensors [3][4][5]9]. The main idea of the protocol is based on dynamical selection of the cluster-heads among the eligible active nodes.…”
Section: Introductionmentioning
confidence: 99%