Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes

نویسندگان

  • Katarzyna Kosek-Szott
  • Marek Natkaniec
  • Luca Vollero
چکیده

In this paper the authors present a simulation study of two 802.11e network scenarios. The presented analysis is not only novel but most of all crucial for understanding how a theoretically simple star topology network can be degraded by the presence of hidden nodes. The authors discuss the results obtained during the analysis of two different star topologies where the hidden node problem exists and compare them with the corresponding ones without hidden nodes. Additionally, the usefulness of the four-way handshake mechanism is argued and, furthermore, brief descriptions of the currently known solutions of the hidden node problem are given. Finally, the authors signalize the need for a better MAC protocol and provide a number of important conclusions about the 802.11e nature.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes

In this paper the authors present a simulation study of five different ring networks with hidden and exposed nodes in which the IEEE 802.11 EDCA function is used as the MAC protocol. The presented analysis is crucial for understanding how the theoretically simple ring topology can be degraded by the presence of hidden and exposed nodes. Configurations with equal and mixed priorities are conside...

متن کامل

Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes

In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simple and, most of all, popular line topology network can be degraded by the presence of hidden and exposed nodes. The discussion of the obtained results helps to understand how and why the behavior of IEEE 802.11e based ...

متن کامل

Evaluation of the Impact of the Topology and Hidden Nodes in the Performance of a ZigBee Network

Low power and small footprint IEEE 802.15.4/ZigBee based devices are a promising alternative to 802.11a/b/g and proprietary protocols for non-critical patient monitoring under important scenarios such as post-op and emergency rooms. However, their use in a healthcare facility to monitor several mobile patients poses several difficulties, mainly because these protocols were primarily designed to...

متن کامل

Two-stage stochastic programming model for capacitated complete star p-hub network with different fare classes of customers

In this paper, a stochastic programming approach is applied to the airline network revenue management problem. The airline network with the arc capacitated single hub location problem based on complete–star p-hub network is considered. We try to maximize the profit of the transportation company by choosing the best hub locations and network topology, applying revenue management techniques to al...

متن کامل

Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks

This paper presents a work in progress which deals with the problem of node misbehaviour in ad-hoc networks. A realistic approach is used to determine the impact of contention window manipulation and RTS/CTS cheating. It is explained why IEEE 802.11e ad-hoc networks are more prone to misbehaviour. The paper presents simulation results related to the mentioned types of misbehaviour. The analysis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008