20 research outputs found

    How do Wireless Chains Behave? The Impact of MAC Interactions

    Full text link
    In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent processes that arise as the sources of different chain hops compete to transmit their packets on the shared medium. In this paper, we show that MAC level interactions play the primary role in determining the behavior of chains. We evaluate the types of chains that occur based on the MAC interactions between different links using realistic propagation and packet forwarding models. We discover that the presence of destructive interactions, due to different forms of hidden terminals, does not impact the throughput of an isolated chain significantly. However, due to the increased number of retransmissions required, the amount of bandwidth consumed is significantly higher in chains exhibiting destructive interactions, substantially influencing the overall network performance. These results are validated by testbed experiments. We finally study how different types of chains interfere with each other and discover that well behaved chains in terms of self-interference are more resilient to interference from other chains

    Застосування методів диференціального та інтегрального числення до розв’язання задач технічного змісту. Методичні вказівки для самостійної роботи студентів напрямів підготовки 6.050301 Гірництво, 6.050101 Комп’ютерні науки, 6.040103 Геологія, 6.050502 Інженерна механіка

    Get PDF
    Мета методичних вказівок – конкретизувати приклади, які розв’язуватимуть студенти при вивченні розділу “Диференціальне та інтегральне числення функції однієї змінної”, а також надати допомогу їм у засвоєнні методів математичного дослідження прикладних задач, що дуже важливо для майбутніх інженерів. Наведено 80 задач технічного змісту. Всі вони забезпечені відповідями та вказівками до їх розв’язання. Необхідні відомості з теорії подано у довідковій формі. Можуть бути використані студентами для самостійної роботи, а також викладачами для проведення практичних й індивідуальних занять та занять студентського математичного гуртка

    Modeling and Analysis of Two-Flow Interactions in Wireless Networks

    Get PDF
    Interference plays a complex and often defining role in the performance of wireless networks, especially in multi-hop scenarios. In the presence of interference, Carrier Sense Multiple Access MAC protocols are known to suffer from the hidden terminal and exposed terminal problems, which can cause poor performance and unfairness. In this paper, we examine the possible interference modes arising among two interfering one-hop connections under a Two-Disc model of interference. We classify the large set of resulting configurations into five categories and develop closed form expressions to compute their probability of occurrence. The analysis exposes two new categories, whose occurrence is common, and whose behavior differs significantly from the three known interference categories. Further, the frequency of occurrence of the categories differ significantly from existing results (obtained with a simpler unit disc model of interference). We develop throughput estimation models for the different categories and validate them using simulation

    Modeling and Analysis of Two-Flow Interactions in Wireless Networks

    Get PDF
    Interference plays a complex and often defining role in the performance of wireless networks, especially in multi-hop scenarios. In the presence of interference, Carrier Sense Multiple Access MAC protocols are known to suffer from the hidden terminal and exposed terminal problems, which can cause poor performance and unfairness. In this paper, we examine the possible interference modes arising among two interfering one-hop connections under a Two-Disc model of interference. We classify the large set of resulting configurations into five categories and develop closed form expressions to compute their probability of occurrence. The analysis exposes two new categories, whose occurrence is common, and whose behavior differs significantly from the three known interference categories. Further, the frequency of occurrence of the categories differ significantly from existing results (obtained with a simpler unit disc model of interference). We develop throughput estimation models for the different categories and validate them using simulation
    corecore