Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes
暂无分享,去创建一个
[1] Haitao Wu,et al. WSN02-1: Analysis of IEEE 802.11 DCF with Hidden Terminals , 2006, IEEE Globecom 2006.
[2] Anura P. Jayasumana,et al. Performance Degradation of IEEE 802.15.4 Slotted CSMA/CA due to Hidden Nodes , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[3] Sumit Roy,et al. Analysis of the contention access period of IEEE 802.15.4 MAC , 2007, TOSN.
[4] L. Kleinrock,et al. Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .
[5] Eduardo Tovar,et al. Improving Quality-of-Service in Wireless Sensor Networks by Mitigating “Hidden-Node Collisions” , 2009, IEEE Transactions on Industrial Informatics.
[6] Brahim Bensaou,et al. Throughput analysis and bandwidth allocation for IEEE 802.11 WLAN with hidden terminals , 2011, J. Parallel Distributed Comput..
[7] Karl Benki. Effect of hidden nodes in IEEE 802.15.4/ZigBee Wireless Sensor Networks , 2009 .
[8] Shiann-Tsong Sheu,et al. Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN , 2005, First International Conference on Wireless Internet (WICON'05).
[9] David Starobinski,et al. Performance of wireless networks with hidden nodes: a queuing-theoretic analysis , 2005, Comput. Commun..
[10] Hsiao-Hwa Chen,et al. An accurate and scalable analytical model for IEEE 802.15.4 slotted CSMA/CA networks , 2009, IEEE Trans. Wirel. Commun..
[11] Tarik Taleb,et al. R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks , 2007 .
[12] Tat Chee Wan,et al. Performance Evaluation of IEEE 802.15.4 Ad Hoc Wireless Sensor Networks: Simulation Approach , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[13] Wook Hyun Kwon,et al. Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/CA , 2005 .