Effectiveness of physical and virtual carrier sensing in IEEE 802.11 wireless ad hoc networks

Fu Yi Hung, Ivan Marsic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

IEEE 802.11 defines physical and virtual carrier sensing mechanisms to avoid interference in wireless local area networks for the kind of interference originating from within the receiving range of a receiver. However, in wireless ad hoc networks most interference comes from outside of this range. So, the effectiveness of IEEE 802.11 carrier sensing mechanism in ad hoc networks has attracted many studies. Prior research has attempted to evaluate effectiveness from a spatial viewpoint only, using an analytical model to estimate the size of the interference area of an ongoing communication based on the transmitter-receiver distance. Unlike this, the temporal effectiveness of the carrier sensing mechanism has been ignored. In this paper we propose an analysis combining spatial and temporal viewpoint to study the effect of interference on the performance of IEEE 802.11 protocol in ad hoc networks. We also compare the effectiveness of physical and virtual carrier sensing mechanisms, known as RTS/CTS mechanism, in wireless ad hoc networks.

Original languageEnglish (US)
Title of host publication2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
Pages143-147
Number of pages5
DOIs
StatePublished - 2007
Event2007 IEEE Wireless Communications and Networking Conference, WCNC 2007 - Kowloon, China
Duration: Mar 11 2007Mar 15 2007

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

Other2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
Country/TerritoryChina
CityKowloon
Period3/11/073/15/07

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Effectiveness of physical and virtual carrier sensing in IEEE 802.11 wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this