Learn More
• The material is reproduced accurately and not in a misleading context • The material is correctly acknowledged and the author's name appears on the work or the excerpt • A copy of the publication containing the material is sent to the author • No charge shall be made for the copy containing the work or the excerpt No translation of the material may be(More)
Note: Most SVRC technical reports are available via anonymous ftp, from svrc.it.uq.edu.au in the directory /pub/techreports. Abstracts and compressed postscript files are available via Abstract UQ is an evolving generic language-based environment for manipulation of structured documents. The environment is intended to capture both syntactic and relational(More)
In this paper we show how the network routing protocol B.A.T.M.A.N. can be augmented by a simple hysteresis mechanism called Batrytis in order to provide a more stable routing table with no decrease in performance. This leads to an improved operating environment for various networked applications. We conduct various indoor and outdoor experiments showing(More)
With wireless networking becoming more prevalent, the capacity and power efficiency of these networks is of concern to both users and network designers. Wireless network capacity is difficult to define, with current research providing upper bounds and throughput results for given traffic profiles. However, these measures are not suitable as optimisation(More)
This paper shows that although simultaneous transmissions on the same frequency can cause interference to one another, they may still benefit network capacity if adequate separation conditions between nodes are met. We define this separation and show that it decreases as the number of simultaneous transmissions increases. We further show, through an example(More)
Carrier Sense Multiple Access with Collision avoidance (CSMA/CA) is a well known and distributed Medium Access Control (MAC) protocol that enables wireless stations to communicate with one another using a single medium. In this paper an analysis of the times between data transmission in this protocol has been performed and results obtained. Whilst neither(More)