Skip to main navigation Skip to search Skip to main content

Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

6 Citations (Scopus)

Abstract

The IEEE 802.15.4 medium access control (MAC) protocol, which is widely used in current WSN deployments, does not provide any hidden node avoidance mechanisms. This leads to severe performance degradation in IEEE 802.15.4 MAC protocol in the presence of hidden nodes. In this paper, we apply a discrete-time Markov Chain model to analyse the throughput of IEEE 802.15.4 MAC protocol in the presence of hidden nodes. Based on the proposed model, the effects of network size, network topology, frame length and frame arrival rate on the throughput of the system are investigated.
Original languageEnglish
Title of host publicationProceedings of the 11th International Symposium on Communications and Information Technologies (ISCIT 2011): Green and Cognitive Communications for the Future, 12-14 October 2011, Hangzhou, China
PublisherIEEE
Pages303-308
Number of pages6
ISBN (Print)9781457712937
DOIs
Publication statusPublished - 2011
EventInternational Symposium on Communications and Information Technologies -
Duration: 2 Oct 2012 → …

Conference

ConferenceInternational Symposium on Communications and Information Technologies
Period2/10/12 → …

Fingerprint

Dive into the research topics of 'Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes'. Together they form a unique fingerprint.

Cite this