Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    6 Citations (Scopus)

    Abstract

    The IEEE 802.15.4 medium access control (MAC) protocol, which is widely used in current WSN deployments, does not provide any hidden node avoidance mechanisms. This leads to severe performance degradation in IEEE 802.15.4 MAC protocol in the presence of hidden nodes. In this paper, we apply a discrete-time Markov Chain model to analyse the throughput of IEEE 802.15.4 MAC protocol in the presence of hidden nodes. Based on the proposed model, the effects of network size, network topology, frame length and frame arrival rate on the throughput of the system are investigated.
    Original languageEnglish
    Title of host publicationProceedings of the 11th International Symposium on Communications and Information Technologies (ISCIT 2011): Green and Cognitive Communications for the Future, 12-14 October 2011, Hangzhou, China
    PublisherIEEE
    Pages303-308
    Number of pages6
    ISBN (Print)9781457712937
    DOIs
    Publication statusPublished - 2011
    EventInternational Symposium on Communications and Information Technologies -
    Duration: 2 Oct 2012 → …

    Conference

    ConferenceInternational Symposium on Communications and Information Technologies
    Period2/10/12 → …

    Fingerprint

    Dive into the research topics of 'Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes'. Together they form a unique fingerprint.

    Cite this