In this paper, we develop a Markov model to evaluate the performance of WLAN in the presence of hidden terminals. We focus on characterizing and studying the scenario of an access point with a population of clients partitioned into two mutually hidden groups, and derive a model to estimate the network throughput and the individual nodes' throughput. We propose a general methodology to solve the Markov chain by forming a nonlinear system of equations which describes the relationship between the conditional state transition probabilities, the transmission attempts probability and the steady state probability. Unlike alternative approaches, it is not necessary to invoke iterative methods to solve this system. We also demonstrate how our method...
The paper evaluates the impact of hidden terminal problem and capture effect on Wireless Local Area...
International audienceWLANs (Wireless Local Area Networks) have become ubiquitous in our everyday li...
This technical report develops an analytical framework to model the interaction between TCP and 802:...
Motivated by observations from real world wireless local area network (WLAN) deployments, we develop...
This paper investigates saturation and finite load throughputs of distributed coordinated function (...
The IEEE 802.11 is the most widely used standard in WLAN currently. It can support not only a WLAN w...
The key contribution of this paper is the combined analytical analysis of both saturated and non-sat...
The IEEE 802.15.4 medium access control (MAC) protocol, which is widely used in current WSN deployme...
99學年度新聘教師論文著作[[abstract]]The IEEE 802.11 is the most widely used standard in WLAN currently. It can ...
AbstractThe key contribution of this paper is the combined analytical analysis of both saturated and...
This paper develops an analytical framework to model the interaction between TCP and 802.11 MAC prot...
In order to understand the behavior of upper layer protocols and to design or fine tune their parame...
The IEEE 802.11 standard provides the specifications for a Wireless Local-Area Network (WLAN) techno...
The presence of hidden nodes degrades the performance of wireless networks due to an excessive amoun...
IEEE 802.11 WLAN cannot guarantee the QoS of applications, thus admission control has been proposed ...
The paper evaluates the impact of hidden terminal problem and capture effect on Wireless Local Area...
International audienceWLANs (Wireless Local Area Networks) have become ubiquitous in our everyday li...
This technical report develops an analytical framework to model the interaction between TCP and 802:...
Motivated by observations from real world wireless local area network (WLAN) deployments, we develop...
This paper investigates saturation and finite load throughputs of distributed coordinated function (...
The IEEE 802.11 is the most widely used standard in WLAN currently. It can support not only a WLAN w...
The key contribution of this paper is the combined analytical analysis of both saturated and non-sat...
The IEEE 802.15.4 medium access control (MAC) protocol, which is widely used in current WSN deployme...
99學年度新聘教師論文著作[[abstract]]The IEEE 802.11 is the most widely used standard in WLAN currently. It can ...
AbstractThe key contribution of this paper is the combined analytical analysis of both saturated and...
This paper develops an analytical framework to model the interaction between TCP and 802.11 MAC prot...
In order to understand the behavior of upper layer protocols and to design or fine tune their parame...
The IEEE 802.11 standard provides the specifications for a Wireless Local-Area Network (WLAN) techno...
The presence of hidden nodes degrades the performance of wireless networks due to an excessive amoun...
IEEE 802.11 WLAN cannot guarantee the QoS of applications, thus admission control has been proposed ...
The paper evaluates the impact of hidden terminal problem and capture effect on Wireless Local Area...
International audienceWLANs (Wireless Local Area Networks) have become ubiquitous in our everyday li...
This technical report develops an analytical framework to model the interaction between TCP and 802:...