- Page 1: Faculteit WetenschappenInformaticaE
- Page 6 and 7: Chapter 0. Nederlandse samenvatting
- Page 8: Chapter 0. Nederlandse samenvatting
- Page 11: Chapter 0. English summaryalgorithm
- Page 15 and 16: ContentsAcknowledgmentsiNederlandse
- Page 17 and 18: Contents5 IEEE 802.11 problems and
- Page 19 and 20: Contents9.3.1 Near (NrN) and far (
- Page 21 and 22: List of Tables1.1 The 802 working g
- Page 23 and 24: List of Figures1.1 Bluetooth, Wirel
- Page 25 and 26: List of Figures7.1 Solutions toward
- Page 27: List of Figures11.8 SCENARIO 1: Thr
- Page 30 and 31: Chapter 0. List of AcronymsCSMA/CA
- Page 32: Chapter 0. List of AcronymsNIAMac N
- Page 36 and 37: Chapter 1. Introductionstrated a sh
- Page 38 and 39: Chapter 1. Introductioneration. Wit
- Page 40 and 41: Chapter 1. IntroductionWLAN [14] pr
- Page 42 and 43: Chapter 1. Introduction1.2 Wireless
- Page 44 and 45: Chapter 1. Introduction1.3 IEEE 802
- Page 46 and 47: Chapter 1. Introductiondesigned to
- Page 48 and 49: Chapter 1. Introductioncharacterist
- Page 50 and 51: Chapter 1. Introductiona fixed infr
- Page 52 and 53: Chapter 1. Introductionmercial MANE
- Page 54 and 55: Chapter 1. IntroductionEducationEnt
- Page 56 and 57: Chapter 1. Introductiondescribed in
- Page 58 and 59: Chapter 1. Introduction802.11 enhan
- Page 60 and 61: Chapter 1. Introduction• Section
- Page 62 and 63:
Chapter 2. Interaction between MAC
- Page 64 and 65:
Chapter 2. Interaction between MAC
- Page 66 and 67:
Chapter 2. Interaction between MAC
- Page 68 and 69:
Chapter 3. IEEE 802.11 standardInfr
- Page 70 and 71:
Chapter 3. IEEE 802.11 standardconf
- Page 72 and 73:
Chapter 3. IEEE 802.11 standardFigu
- Page 74 and 75:
Chapter 3. IEEE 802.11 standardsucc
- Page 76 and 77:
Chapter 3. IEEE 802.11 standardFigu
- Page 79 and 80:
CHAPTER4MAC protocols for ad hoc ne
- Page 81 and 82:
4.1. Classification of MAC protocol
- Page 83 and 84:
4.1. Classification of MAC protocol
- Page 85 and 86:
4.1. Classification of MAC protocol
- Page 87 and 88:
4.1. Classification of MAC protocol
- Page 89 and 90:
4.2. Different MAC layer approaches
- Page 91 and 92:
4.2. Different MAC layer approaches
- Page 93 and 94:
4.2. Different MAC layer approaches
- Page 95 and 96:
4.2. Different MAC layer approaches
- Page 97 and 98:
CHAPTER5IEEE 802.11 problems and po
- Page 99 and 100:
5.2. Concurrent (parallel) transmis
- Page 101 and 102:
5.3. Blocking, false blocking and p
- Page 103 and 104:
5.3. Blocking, false blocking and p
- Page 105 and 106:
5.4. Contention Window issueshave b
- Page 107 and 108:
5.5. Mobility and IEEE 802.11Figure
- Page 109:
5.7. Omnidirectional vs. directiona
- Page 112 and 113:
Chapter 6. Simulation environment78
- Page 114 and 115:
Chapter 6. Simulation environmentTa
- Page 116 and 117:
Chapter 6. Simulation environmentse
- Page 118 and 119:
Chapter 6. Simulation environmenten
- Page 121 and 122:
CHAPTER7Blocking problem and concur
- Page 123 and 124:
7.1. Blocking Problem (BP)C will be
- Page 125 and 126:
7.2. Concurrent transmissionswhich
- Page 127 and 128:
7.2. Concurrent transmissionsThe pa
- Page 129 and 130:
7.3. Performance evaluationγ, wher
- Page 131 and 132:
7.3. Performance evaluationTable 7.
- Page 133 and 134:
7.3. Performance evaluationTable 7.
- Page 135 and 136:
7.3. Performance evaluationsignal a
- Page 137 and 138:
7.3. Performance evaluation7.3.3 Bl
- Page 139 and 140:
7.3. Performance evaluation(350, 50
- Page 141 and 142:
7.3. Performance evaluationString T
- Page 143 and 144:
7.3. Performance evaluationScenario
- Page 145 and 146:
7.3. Performance evaluationbasic ra
- Page 147 and 148:
7.3. Performance evaluationworse fo
- Page 149 and 150:
CHAPTER8Contention Window control8.
- Page 151 and 152:
8.1. Minimum and maximum Contention
- Page 153 and 154:
8.1. Minimum and maximum Contention
- Page 155 and 156:
8.1. Minimum and maximum Contention
- Page 157 and 158:
8.2. CW bounds - backoff mechanismb
- Page 159 and 160:
8.2. CW bounds - backoff mechanismb
- Page 161 and 162:
8.2. CW bounds - backoff mechanism0
- Page 163 and 164:
8.2. CW bounds - backoff mechanismA
- Page 165 and 166:
8.2. CW bounds - backoff mechanism7
- Page 167 and 168:
8.2. CW bounds - backoff mechanism8
- Page 169 and 170:
8.3 enhanced selection Bounds (EsB)
- Page 171 and 172:
8.3. enhanced selection Bounds (EsB
- Page 173:
8.3. enhanced selection Bounds (EsB
- Page 176 and 177:
Chapter 9. Contention Window resett
- Page 178 and 179:
Chapter 9. Contention Window resett
- Page 180 and 181:
Chapter 9. Contention Window resett
- Page 182 and 183:
Chapter 9. Contention Window resett
- Page 184 and 185:
Chapter 9. Contention Window resett
- Page 186 and 187:
Chapter 9. Contention Window resett
- Page 188 and 189:
Chapter 9. Contention Window resett
- Page 190 and 191:
Chapter 9. Contention Window resett
- Page 192 and 193:
Chapter 9. Contention Window resett
- Page 194 and 195:
Chapter 9. Contention Window resett
- Page 196 and 197:
Chapter 9. Contention Window resett
- Page 198 and 199:
Chapter 9. Contention Window resett
- Page 200 and 201:
Chapter 9. Contention Window resett
- Page 202 and 203:
Chapter 9. Contention Window resett
- Page 204 and 205:
Chapter 9. Contention Window resett
- Page 206 and 207:
Chapter 10. Enhanced selection Boun
- Page 208 and 209:
Chapter 10. Enhanced selection Boun
- Page 210 and 211:
Chapter 10. Enhanced selection Boun
- Page 212 and 213:
Chapter 10. Enhanced selection Boun
- Page 214 and 215:
Chapter 10. Enhanced selection Boun
- Page 216 and 217:
Chapter 10. Enhanced selection Boun
- Page 218 and 219:
Chapter 10. Enhanced selection Boun
- Page 220 and 221:
Chapter 10. Enhanced selection Boun
- Page 222 and 223:
Chapter 10. Enhanced selection Boun
- Page 224 and 225:
Chapter 10. Enhanced selection Boun
- Page 227 and 228:
CHAPTER11Basic and enhanced power c
- Page 229 and 230:
11.1. Related work in power control
- Page 231 and 232:
11.1. Related work in power control
- Page 233 and 234:
11.2. Basic power controldesired nu
- Page 235 and 236:
11.2. Basic power controlwhere the
- Page 237 and 238:
11.2. Basic power controlParameterV
- Page 239 and 240:
11.2. Basic power controlThe same s
- Page 241 and 242:
11.2. Basic power control(a) SCENAR
- Page 243 and 244:
11.2. Basic power controlFigure 11.
- Page 245 and 246:
11.2. Basic power controlWe have al
- Page 247 and 248:
11.2. Basic power control11.2.3 Per
- Page 249 and 250:
11.2. Basic power controlFigure 11.
- Page 251 and 252:
11.2. Basic power controlprotocol (
- Page 253 and 254:
11.3. Enhanced power control protoc
- Page 255 and 256:
CHAPTER12A cross-layer PHY-MAC prot
- Page 257 and 258:
12.2. Cross-layer PHY-MAC protocol
- Page 259 and 260:
12.2. Cross-layer PHY-MAC protocol
- Page 261 and 262:
12.2. Cross-layer PHY-MAC protocol
- Page 263 and 264:
12.3. Performance evaluation of the
- Page 265 and 266:
12.3. Performance evaluation of the
- Page 267 and 268:
12.3. Performance evaluation of the
- Page 269 and 270:
12.3. Performance evaluation of the
- Page 271 and 272:
12.3. Performance evaluation of the
- Page 273 and 274:
12.3. Performance evaluation of the
- Page 275 and 276:
12.3. Performance evaluation of the
- Page 277 and 278:
12.3. Performance evaluation of the
- Page 279 and 280:
12.3. Performance evaluation of the
- Page 281 and 282:
12.3. Performance evaluation of the
- Page 283 and 284:
12.3. Performance evaluation of the
- Page 285 and 286:
12.3. Performance evaluation of the
- Page 287 and 288:
12.3. Performance evaluation of the
- Page 289 and 290:
12.3. Performance evaluation of the
- Page 291:
12.3. Performance evaluation of the
- Page 294 and 295:
Chapter 13. Conclusion and Perspect
- Page 296 and 297:
Chapter 13. Conclusion and Perspect
- Page 298 and 299:
Chapter 13. Conclusion and Perspect
- Page 301 and 302:
References[1] IEEE 802.11a Working
- Page 303 and 304:
References[28] The Institute of Ele
- Page 305 and 306:
References[58] I. Chlamtac. An Adap
- Page 307 and 308:
References[86] J. You A. Nasipuri,
- Page 309 and 310:
References[115] A.C. Boucouvalas P.
- Page 311 and 312:
References[144] M. Sanchez. Multipl
- Page 313:
References[172] P. Bahl R. Wattenho