• The material is reproduced accurately and not in a misleading context • The material is correctly acknowledged and the author's name appears on the work or the excerpt • A copy of the publication containing the material is sent to the author • No charge shall be made for the copy containing the work or the excerpt No translation of the material may be… (More)
Note: Most SVRC technical reports are available via anonymous ftp, from svrc.it.uq.edu.au in the directory /pub/techreports. Abstracts and compressed postscript files are available via Abstract UQ is an evolving generic language-based environment for manipulation of structured documents. The environment is intended to capture both syntactic and relational… (More)
In this paper we examine the use of radio frequency and wireless contention simulation models within the context of a complex network emulation. We show how through modelling of key parameters in radio equipment we can build a model of real Defence systems and emulate network scenarios with mobile plat-forms.
This paper shows that although simultaneous transmissions on the same frequency can cause interference to one another, they may still benefit network capacity if adequate separation conditions between nodes are met. We define this separation and show that it decreases as the number of simultaneous transmissions increases. We further show, through an example… (More)
In this paper we show how the network routing protocol B.A.T.M.A.N. can be augmented by a simple hysteresis mechanism called Batrytis in order to provide a more stable routing table with no decrease in performance. This leads to an improved operating environment for various networked applications. We conduct various indoor and outdoor experiments showing… (More)
Predicting the capacity of wireless mesh networks is difficult, due to the complex interaction of various layers such as the radio environment, media access protocols, network protocols and, traffic load and types. When modelling and simulation takes into account the interaction of all these factors, it can facilitate insights into anticipated network… (More)
Reverse engineering of the Internet is a valuable activity. Apart from providing scientific insight, the resulting datasets are invaluable in providing realistic network scenarios for other researchers. The Rocketfuel project attempted this process, but it is surprising how little effort has been made to validate its results. This paper concentrates on… (More)
Carrier Sense Multiple Access with Collision avoidance (CSMA/CA) is a well known and distributed Medium Access Control (MAC) protocol that enables wireless stations to communicate with one another using a single medium. In this paper an analysis of the times between data transmission in this protocol has been performed and results obtained. Whilst neither… (More)