Ruan, Sichao. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 62-65). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Multihop Ad Hoc Wireless Networks --- p.1 / Chapter 1.1.1 --- Introduction to Multihop Ad Hoc Networks --- p.2 / Chapter 1.1.2 --- Scalability of Ad Hoc Wireless Networks --- p.3 / Chapter 1.2 --- Hidden Terminal Problem --- p.3 / Chapter 1.3 --- Exposed Terminal Problem --- p.5 / Chapter 1.4 --- Overview of the Thesis --- p.6 / Chapter 2 --- Background --- p.8 / Chapter 2.1 --- MAC Protocols for Wireless Networks --- p.8 / Chapter 2.1.1 --- Aloha --- p.8 / Chapter 2.1.2 --- CSMA/CA --- p.9 / Chapter 2.1.3 --- IEEE 802.11 DCF Standard --- p.10 / Chapter 2.2 --- Related Work --- p.12 / Chapter 2.2.1 --- Schemes for Hidden Node Problem --- p.12 / Chapter 2.2.2 --- Schemes for Exposed Node Problem --- p.13 / Chapter 2.3 --- Tradeoff between Hidden and Exposed Nodes --- p.14 / Chapter 2.4 --- The Effect of Carrier Sensing Range --- p.17 / Chapter 3 --- Analysis on Carrier Sensing Range --- p.18 / Chapter 3.1 --- Analysis Model --- p.18 / Chapter 3.1.1 --- Terminal Configurations --- p.18 / Chapter 3.1.2 --- Timing/Packet Parameters --- p.19 / Chapter 3.1.3 --- Protocol Approximation --- p.20 / Chapter 3.1.4 --- Throughput Measurement --- p.21 / Chapter 3.2 --- Derivation of Throughput --- p.21 / Chapter 3.2.1 --- Channel Modeling --- p.22 / Chapter 3.2.2 --- Actual Transmission Rate --- p.24 / Chapter 3.2.3 --- Case One --- p.24 / Chapter 3.2.4 --- Case Two --- p.26 / Chapter 3.2.5 --- Mathematical Form of Throughput --- p.28 / Chapter 3.2.6 --- Analysis Results --- p.30 / Chapter 3.3 --- Implications --- p.31 / Chapter 3.3.1 --- Value of Sensing Range in CSMA/CA --- p.31 / Chapter 3.3.2 --- Need for New MAC Protocols --- p.32 / Chapter 4 --- MAC Protocols by Congestion Control --- p.34 / Chapter 4.1 --- Motivations and Principles --- p.34 / Chapter 4.1.1 --- Balancing Hidden and Exposed Nodes --- p.35 / Chapter 4.1.2 --- Controlling Carrier Sensing Range --- p.36 / Chapter 4.1.3 --- Non-homogenous Sensing Range --- p.36 / Chapter 4.2 --- Algorithm Descriptions --- p.38 / Chapter 4.2.1 --- Core Concept --- p.38 / Chapter 4.2.2 --- LDMI Control Scheme --- p.40 / Chapter 4.2.3 --- Tahoe Control Scheme --- p.41 / Chapter 5 --- Simulation Analysis --- p.44 / Chapter 5.1 --- Simulation Configurations --- p.44 / Chapter 5.1.1 --- Geometric Burst Traffic Model --- p.45 / Chapter 5.1.2 --- Network Topology --- p.46 / Chapter 5.1.3 --- Simulation Parameters --- p.47 / Chapter 5.2 --- Throughput Comparisons --- p.48 / Chapter 5.3 --- Fairness Comparisons --- p.50 / Chapter 5.3.1 --- Situation of Unfairness --- p.50 / Chapter 5.3.2 --- Fairness Measurement --- p.52 / Chapter 5.4 --- Convergence Comparisons --- p.54 / Chapter 5.5 --- Summary of Performance Comparison --- p.55 / Chapter 6 --- Conclusions --- p.56 / Chapter A --- Categories of CSMA/CA --- p.58 / Chapter A.1 --- 1-persistent CSMA/CA --- p.58 / Chapter A.2 --- non-persistent CSMA/CA --- p.58 / Chapter A.3 --- p-persistent CSMA/CA --- p.59 / Chapter B --- Backoff Schemes --- p.60 / Chapter B.1 --- Constant Window Backoff Scheme --- p.60 / Chapter B.2 --- Geometric Backoff Scheme --- p.60 / Chapter B.3 --- Binary Exponential Backoff Scheme --- p.61 / Bibliography --- p.62
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_326437 |
Date | January 2008 |
Contributors | Ruan, Sichao., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, vi, 65 leaves : ill. ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.002 seconds