Katarzyna Kosek-Szott, M. Natkaniec, L. Vollero, A. Pach
{"title":"存在隐藏节点的星形拓扑IEEE 802.11e网络分析","authors":"Katarzyna Kosek-Szott, M. Natkaniec, L. Vollero, A. Pach","doi":"10.1109/ICOIN.2008.4472755","DOIUrl":null,"url":null,"abstract":"This article presents a novel simulation study of IEEE 802.11e based environments. The most important innovation of this article lays in demonstrating a thorough analysis of two star topology networks, which shows how seriously they can be degraded by the presence of hidden nodes. The main stress is put on the limitation of the ability to provide services with the requested QoS. The usefulness of the RTS/CTS mechanism is also discussed. According to the authors' best knowledge, similar studies have never been made.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes\",\"authors\":\"Katarzyna Kosek-Szott, M. Natkaniec, L. Vollero, A. Pach\",\"doi\":\"10.1109/ICOIN.2008.4472755\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents a novel simulation study of IEEE 802.11e based environments. The most important innovation of this article lays in demonstrating a thorough analysis of two star topology networks, which shows how seriously they can be degraded by the presence of hidden nodes. The main stress is put on the limitation of the ability to provide services with the requested QoS. The usefulness of the RTS/CTS mechanism is also discussed. According to the authors' best knowledge, similar studies have never been made.\",\"PeriodicalId\":447966,\"journal\":{\"name\":\"2008 International Conference on Information Networking\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Information Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2008.4472755\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Information Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2008.4472755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes
This article presents a novel simulation study of IEEE 802.11e based environments. The most important innovation of this article lays in demonstrating a thorough analysis of two star topology networks, which shows how seriously they can be degraded by the presence of hidden nodes. The main stress is put on the limitation of the ability to provide services with the requested QoS. The usefulness of the RTS/CTS mechanism is also discussed. According to the authors' best knowledge, similar studies have never been made.