Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
A scalable model for channel access protocols in multihop ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Modeling media access in embedded two-flow topologies of multi-hop wireless networks
Proceedings of the 11th annual international conference on Mobile computing and networking
Performance of wireless networks with hidden nodes: a queuing-theoretic analysis
Computer Communications
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
An empirical model for probability of packet reception in vehicular ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless access in vehicular environments
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Hi-index | 0.01 |
A promising new class of wireless networks has recently emerged, the so-called Wireless Mesh Networks (WMNs). WMNs inherit many advantages from both wired infrastructure and also ad-hoc networks. However, in spite of their distinct characteristics, they also face many technical problems that were present in older classes of wireless networks, such as wireless LANs or pure ad-hoc networks. The much discussed hidden terminal problem is one of them. We argue that an accurate analysis of the effect of hidden nodes in the performance of a random access protocol is still an open issue. In this paper we show the problems and the limitations stemming from common assumptions used in the literature and propose a novel method of modeling time that uses a fixed size channel slot as the unit of time in order to take into account the desynchronisation of nodes. Finally we apply our general method to the classic hidden terminal problem incorporating an iterative step. The proposed analytical model is shown to have a very good match to simulation results for an IEEE 802.11 MAC protocol.