Cited 1 time in
Cross-Layer Design for Exposed Node Reduction in Ad Hoc WLANs
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Weyulu, Emilia | - |
| dc.contributor.author | Hanada, Masaki | - |
| dc.contributor.author | Kanemitsu, Hidehiro | - |
| dc.contributor.author | Park, Eun-Chan | - |
| dc.contributor.author | Kim, Moo Wan | - |
| dc.date.accessioned | 2024-08-08T03:30:49Z | - |
| dc.date.available | 2024-08-08T03:30:49Z | - |
| dc.date.issued | 2018-07 | - |
| dc.identifier.issn | 0916-8516 | - |
| dc.identifier.issn | 1745-1345 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/16988 | - |
| dc.description.abstract | Interference in ad hoc WLANs is a common occurrence as there is no centralized access point controlling device access to the wireless channel. IEEE 802.11 WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) which initiates the Request to Send/Clear to Send (RTS/CTS) handshaking mechanism to solve the hidden node problem. While it solves the hidden node problem, RTS/CTS triggers the exposed node problem. In this paper, we present an evaluation of a method for reducing exposed nodes in 802.11 ad hoc WLANs. Using asymmetric transmission ranges for RTS and CTS frames, a cross-layer design is implemented between Layer 2 and 3 of the OSI model. Information obtained by the AODV routing protocol is utilized in adjusting the RTS transmission range at the MAC Layer. The proposed method is evaluated with the NS-2 simulator and we observe significant throughput improvement, and confirm the effectiveness of the proposed method. Especially when the mobile nodes are randomly distributed, the throughput gain of the Asymmetric RTS/CTS method is up to 30% over the Standard RTS/CTS method. | - |
| dc.format.extent | 14 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
| dc.title | Cross-Layer Design for Exposed Node Reduction in Ad Hoc WLANs | - |
| dc.type | Article | - |
| dc.publisher.location | 일본 | - |
| dc.identifier.doi | 10.1587/transcom.2017CQP0015 | - |
| dc.identifier.scopusid | 2-s2.0-85049387609 | - |
| dc.identifier.wosid | 000444150400007 | - |
| dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.7, pp 1575 - 1588 | - |
| dc.citation.title | IEICE TRANSACTIONS ON COMMUNICATIONS | - |
| dc.citation.volume | E101B | - |
| dc.citation.number | 7 | - |
| dc.citation.startPage | 1575 | - |
| dc.citation.endPage | 1588 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | WIRELESS NETWORKS | - |
| dc.subject.keywordPlus | ACCESS-CONTROL | - |
| dc.subject.keywordPlus | HIDDEN NODES | - |
| dc.subject.keywordPlus | THROUGHPUT | - |
| dc.subject.keywordPlus | MODEL | - |
| dc.subject.keywordAuthor | RTS/CTS | - |
| dc.subject.keywordAuthor | cross-layer | - |
| dc.subject.keywordAuthor | exposed node | - |
| dc.subject.keywordAuthor | AODV | - |
| dc.subject.keywordAuthor | NS-2 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
