Abstract
In this paper the authors present a simulation study of five different ring networks with hidden and exposed nodes in which the IEEE 802.11 EDCA function is used as the MAC protocol. The presented analysis is crucial for understanding how the theoretically simple ring topology can be degraded by the presence of hidden and exposed nodes. Configurations with equal and mixed priorities are considered. Additionally, the usefulness of the four-way handshake mechanism is argued. Furthermore, the achieved results are compared with the results obtained for several star and line topology networks. Finally, the authors signalize the need for a better MAC protocol.
This work has been realized under NoE CONTENT project no. 038423 within TA1 (Community Networks and Service Guarantees).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE 802.11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Inc., New York (2007)
TKN EDCA IEEE 802.11e extension (2006), http://www.tkn.tu-berlin.de/research/802.11e_ns2
Kumar, S., Raghavan, V.S., Deng, J.: Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey. Elsevier Ad-Hoc Networks Journal 4(3), 326–358 (2006)
Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks 2(1), 1–22 (2004)
Kosek, K., Natkaniec, M., Vollero, L., Pach, A.R.: An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. In: ICOIN 2008, Korea (2008)
Kosek, K., Natkaniec, M., Vollero, L.: Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes. In: IFIP Networking 2008, Singapore (2008)
Kosek, K., Natkaniec, M., Vollero, L.: Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds.) ADHOC-NOW 2008. LNCS, vol. 5198, pp. 380–390. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kosek, K., Natkaniec, M., Vollero, L. (2009). Thorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02454-2_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-02454-2_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02453-5
Online ISBN: 978-3-642-02454-2
eBook Packages: Computer ScienceComputer Science (R0)