Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshold: When the activation rate is below this threshold the optimal sensing range is small (to maximize spatial reuse). When the activation rate is above the threshold the optimal sensing range is just large enough to preclude all collisions. Simulations suggest that this threshold policy extends to more complex linear and non-linear topologies
Wireless multi-hop networks are being increasingly used in military and civilian applications. Conne...
The popularity of wireless access will cause wireless ad- hoc networks to operate with higher node d...
Aggregate throughput of wireless ad hoc networks is diminished by the presence of hidden terminal pr...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless multi-hop networks are being increasingly used in military and civilian applications. Conne...
The popularity of wireless access will cause wireless ad- hoc networks to operate with higher node d...
Aggregate throughput of wireless ad hoc networks is diminished by the presence of hidden terminal pr...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For...
Wireless multi-hop networks are being increasingly used in military and civilian applications. Conne...
The popularity of wireless access will cause wireless ad- hoc networks to operate with higher node d...
Aggregate throughput of wireless ad hoc networks is diminished by the presence of hidden terminal pr...