Learn More
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simple and, most of all, popular line topology network can be degraded by the presence of hidden and exposed nodes. The discussion of the obtained results helps to understand how and(More)
We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely(More)
This paper presents a simulation analysis of the backoff mechanism presented in the IEEE 802.11 standard. The obtained simulations allow us to determine the effective throughput and the mean packet delay versus offered load for different values of the Contention Window parameter and the number of contending stations. The choice of the CWmin and CWmax(More)
—This article presents a new MAC layer protocol for IEEE 802.11 EDCA-based ad-hoc networks with hidden nodes. The key idea of the proposed solution is based on an intelligent two-step reservation procedure which is combined with the advantages of EDCA service differentiation. The new protocol achieves significant performance improvement for high priority(More)
IEEE 802.11 is a wireless network standard that was completed in 1997. Unfortunately, the medium access protocol described in the standard meets some problems that arise from the presence of so-called hidden stations. This situation can cause degradation of the network performance. The paper describes a simulation analysis of influence of hidden stations on(More)
We state a new problem of \emph{itinerant routing} in elastic optical networks, which we define as the establishment and reconfiguration of an \emph{itinerant connection}. In an itinerant connection, one of the connection end nodes is allowed to change. Itinerant routing could also be considered a form of connection restoration, where a connection has to be(More)