2009 | OriginalPaper | Chapter
Thorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes
Authors : Katarzyna Kosek, Marek Natkaniec, Luca Vollero
Published in: Computational Science and Its Applications – ICCSA 2009
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
In this paper the authors present a simulation study of five different ring networks with hidden and exposed nodes in which the IEEE 802.11 EDCA function is used as the MAC protocol. The presented analysis is crucial for understanding how the theoretically simple ring topology can be degraded by the presence of hidden and exposed nodes. Configurations with equal and mixed priorities are considered. Additionally, the usefulness of the four-way handshake mechanism is argued. Furthermore, the achieved results are compared with the results obtained for several star and line topology networks. Finally, the authors signalize the need for a better MAC protocol.