Receiver-initiated busy-tone multiple access in packet radio networks
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Iterative solution of nonlinear equations in several variables
Iterative solution of nonlinear equations in several variables
A scalable model for channel access protocols in multihop ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Modeling media access in embedded two-flow topologies of multi-hop wireless networks
Proceedings of the 11th annual international conference on Mobile computing and networking
How do wireless chains behave?: the impact of MAC interactions
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Interference across Multi-hop Wireless Chains
WIMOB '09 Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
Graph approximations of spatial wireless network models
Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Extending graph-based models of wireless network structure with dynamics
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Hi-index | 0.00 |
Interference plays a complex and often defining role on the overall performance of wireless networks, especially in multi-hop scenarios. Understanding this role is critical for understanding these networks, and in turn for developing effective protocols for them. In the presence of interference, Carrier Sense Multiple Access MAC protocols are known to suffer from the hidden terminal and exposed terminal problems, which can cause poor performance and unfairness. Recent work has shown that depending on the relative location of interfering sources and destinations, several modes of interference exhibiting different behavior, occur. In this paper, we first relax the assumption that the interference range is equal to the reception range. This gives rise to a large number of interference configurations; we develop closed form expressions for their frequency of occurrence. As a result, we discover that the frequency of occurrence of the major modes of interference change significantly from those obtained without relaxing the interference range assumption. More importantly, we show that two previously unknown modes of interactions arise, whose performance differs significantly from the known modes. We develop models for estimating the throughput for the different categories of interaction, and validate them against simulation results. We believe that this analysis represents a further step into the understanding and characterization of the impact of interference from first principles.