MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Application of the Diffusion Approximation to Queueing Networks I: Equilibrium Queue Distributions
Journal of the ACM (JACM)
Capacity of Ad Hoc wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Communication Networking: An Analytical Approach
Communication Networking: An Analytical Approach
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Queueing Networks and Markov Chains
Queueing Networks and Markov Chains
Performance of wireless networks with hidden nodes: a queuing-theoretic analysis
Computer Communications
Accuracy of the diffusion approximation for some queuing systems
IBM Journal of Research and Development
Numerical analysis of IEEE 802.11 broadcast scheme in multihop wireless ad hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
The capacity of wireless networks
IEEE Transactions on Information Theory
Asymptotic Delay Analysis and Timeout-Based Admission Control for Ad Hoc Wireless Networks
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Capacity-aware routing in heterogeneous mesh networks: an analytical approach
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
A unified model for joint throughput-overhead analysis of random access mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Load-aware routing in mesh networks: Models, algorithms and experimentation
Computer Communications
Routing Internet traffic in heterogeneous mesh networks: Analysis and algorithms
Performance Evaluation
An analytical model of delay in multi-hop wireless ad hoc networks
Wireless Networks
On-demand multicast routing protocol with efficient route discovery
Journal of Network and Computer Applications
Cross-layer analysis of the end-to-end delay distribution in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Energy Efficient and Scalable Routing Protocol for Extreme Emergency Ad Hoc Communications
Mobile Networks and Applications
On the performance evaluation of query-based wireless sensor networks
Performance Evaluation
International Journal of Ad Hoc and Ubiquitous Computing
Standardisation advancements in the area of routing for mobile ad-hoc networks
The Journal of Supercomputing
Approximation algorithms for throughput maximization in wireless networks with delay constraints
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
In this paper we analyze the average end-to-end delay and maximum achievable per-node throughput in random access multihop wireless ad hoc networks with stationary nodes. We present an analytical model that takes into account the number of nodes, the random packet arrival process, the extent of locality of traffic, and the back off and collision avoidance mechanisms of random access MAC. We model random access multihop wireless networks as open G/G/1 queuing networks and use the diffusion approximation in order to evaluate closed form expressions for the average end-to-end delay. The mean service time of nodes is evaluated and used to obtain the maximum achievable per-node throughput. The analytical results obtained here from the queuing network analysis are discussed with regard to similarities and differences from the well established information-theoretic results on throughput and delay scaling laws in ad hoc networks. We also investigate the extent of deviation of delay and throughput in a real world network from the analytical results presented in this paper. We conduct extensive simulations in order to verify the analytical results and also compare them against NS-2 simulations.