Defending concealedness in IEEE 802.11n
Citations
24 citations
Cites background from "Defending concealedness in IEEE 802..."
...Our earlier paper [13] presents a theoretical model for the performance of IEEE 802....
[...]
...As shown in [13], reducing hidden nodes through a tunable CS threshold only is not sufficient to have a reasonable performance benefit in high throughput...
[...]
References
8,072 citations
2,000 citations
Additional excerpts
...…2014 07 January, 2014 2 / 20 Sandip Chakraborty (CSE, IITG) COMSNETS 2014 07 January, 2014 3 / 20 Two-way handshaking (Basic Access) Sandip Chakraborty (CSE, IITG) COMSNETS 2014 07 January, 2014 3 / 20 Two-way handshaking (Basic Access) A B C D E F Sandip Chakraborty (CSE, IITG) COMSNETS…...
[...]
319 citations
53 citations
"Defending concealedness in IEEE 802..." refers background in this paper
...For, IEEE 802.11b/g networks, solutions of hidden and exposed nodes require extra controlling overhead, which severe for a low to moderate loaded network....
[...]