Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Efficient channel assignment algorithms for infrastructure WLANs under dense deployment
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Turning hidden nodes into helper nodes in IEEE 802.11 wireless LAN networks
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations
Computer Networks: The International Journal of Computer and Telecommunications Networking
Throughput analysis and bandwidth allocation for IEEE 802.11 WLAN with hidden terminals
Journal of Parallel and Distributed Computing
IEEE 802.11 saturation throughput analysis in the presence of hidden terminals
IEEE/ACM Transactions on Networking (TON)
MIMO-assisted MPR-aware MAC design for asynchronous WLANs
IEEE/ACM Transactions on Networking (TON)
An algorithmic strategy for in-network distributed spatial analysis in wireless sensor networks
Journal of Parallel and Distributed Computing
CogMAC: a cognitive link layer for wireless local area networks
Wireless Networks
Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements
Wireless Personal Communications: An International Journal
Modeling CSMA/CA network under asymmetric conditions
Proceedings of the 8th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Hi-index | 0.00 |
Recently research interest in the performance analysis of wireless networks was revived. An issue of an utmost importance in this class of networks, classified as one of the severest reasons for the degradation of their performance, is the hidden terminal problem. In this paper we argue that an accurate analysis of the effect of hidden nodes in the performance of a random access protocol is still an open issue. Firstly, we thoroughly explain the reasons behind the limitations of previous modelling methods, and show that their performance is reliable only for certain configurations. Secondly, and most importantly, we propose a novel method of modelling time that uses a fixed-length channel slot as the unit of time and does not rely on renewal theory. With these features the model is able to successfully take into account the desynchronisation of nodes in a hidden terminal environment. Our analytical model is shown to have a very close match to simulation results for an IEEE 802.11 MAC protocol and for all the system parameters considered, unlike conventional methods.