- Page 1:
Faculteit WetenschappenInformaticaE
- Page 6 and 7:
Chapter 0. Nederlandse samenvatting
- Page 8:
Chapter 0. Nederlandse samenvatting
- Page 11:
Chapter 0. English summaryalgorithm
- Page 14 and 15:
Chapter 0. List of publications8. S
- Page 16 and 17:
Contents1.6 Publications . . . . .
- Page 18 and 19:
Contents7.3.3 Blocking Problem (BP)
- Page 20 and 21:
Contents12 A cross-layer PHY-MAC pr
- Page 22 and 23:
List of Tables8.1 Examples of CW mi
- Page 24 and 25:
List of Figures3.6 CFP/ CP periods
- Page 26 and 27:
List of Figures8.10 (Lw)(Upp)Bounds
- Page 29 and 30:
List of AcronymsAC Access CategoryA
- Page 31 and 32:
Chapter 0. List of AcronymsFND Firs
- Page 35 and 36:
CHAPTER1Introduction1.1 State-of-th
- Page 37 and 38:
1.1. State-of-the-art in wireless n
- Page 39 and 40:
1.1. State-of-the-art in wireless n
- Page 41 and 42:
1.1. State-of-the-art in wireless n
- Page 43 and 44:
1.2. Wireless technologies organiza
- Page 45 and 46:
1.3. IEEE 802 and 802.11 familyfami
- Page 47 and 48:
1.4. Ad hoc network definition and
- Page 49 and 50:
1.4. Ad hoc network definition and
- Page 51 and 52:
1.4. Ad hoc network definition and
- Page 53 and 54:
1.4. Ad hoc network definition and
- Page 55 and 56:
1.5 Outline and main research contr
- Page 57 and 58:
1.5. Outline and main research cont
- Page 59 and 60:
1.6. Publications1.6 PublicationsPa
- Page 61 and 62:
CHAPTER2Interaction between MAC lay
- Page 63 and 64:
2.1. Wireless environment -interact
- Page 65 and 66:
2.1. Wireless environment -interact
- Page 67 and 68:
CHAPTER3IEEE 802.11 standardThe IEE
- Page 69 and 70:
3.2. IEEE 802.11 DCF mechanismTable
- Page 71 and 72:
3.2. IEEE 802.11 DCF mechanismnode
- Page 73 and 74:
3.4. Interframe space periods and b
- Page 75 and 76:
3.5. Random backoff time and Binary
- Page 77:
3.6. Power management in ad hoc net
- Page 80 and 81:
Chapter 4. MAC protocols for ad hoc
- Page 82 and 83:
Chapter 4. MAC protocols for ad hoc
- Page 84 and 85:
Chapter 4. MAC protocols for ad hoc
- Page 86 and 87:
Chapter 4. MAC protocols for ad hoc
- Page 88 and 89:
Chapter 4. MAC protocols for ad hoc
- Page 90 and 91:
Chapter 4. MAC protocols for ad hoc
- Page 92 and 93:
Chapter 4. MAC protocols for ad hoc
- Page 94 and 95:
Chapter 4. MAC protocols for ad hoc
- Page 96 and 97:
Chapter 4. MAC protocols for ad hoc
- Page 98 and 99:
Chapter 5. IEEE 802.11 problems and
- Page 100 and 101:
Chapter 5. IEEE 802.11 problems and
- Page 102 and 103:
Chapter 5. IEEE 802.11 problems and
- Page 104 and 105:
Chapter 5. IEEE 802.11 problems and
- Page 106 and 107:
Chapter 5. IEEE 802.11 problems and
- Page 108 and 109:
Chapter 5. IEEE 802.11 problems and
- Page 111 and 112:
CHAPTER6Simulation environmentThe N
- Page 113 and 114:
6.2. Simulation parameters• PDF -
- Page 115 and 116:
6.2. Simulation parametersour simul
- Page 117 and 118:
6.2. Simulation parametersSince it
- Page 119:
6.2. Simulation parameters(a) The p
- Page 122 and 123:
Chapter 7. Blocking problem and con
- Page 124 and 125:
Chapter 7. Blocking problem and con
- Page 126 and 127:
Chapter 7. Blocking problem and con
- Page 128 and 129:
Chapter 7. Blocking problem and con
- Page 130 and 131:
Chapter 7. Blocking problem and con
- Page 132 and 133:
Chapter 7. Blocking problem and con
- Page 134 and 135:
Chapter 7. Blocking problem and con
- Page 136 and 137:
Chapter 7. Blocking problem and con
- Page 138 and 139:
Chapter 7. Blocking problem and con
- Page 140 and 141:
Chapter 7. Blocking problem and con
- Page 142 and 143:
Chapter 7. Blocking problem and con
- Page 144 and 145:
Chapter 7. Blocking problem and con
- Page 146 and 147:
Chapter 7. Blocking problem and con
- Page 148 and 149:
Chapter 7. Blocking problem and con
- Page 150 and 151:
Chapter 8. Contention Window contro
- Page 152 and 153:
Chapter 8. Contention Window contro
- Page 154 and 155: Chapter 8. Contention Window contro
- Page 156 and 157: Chapter 8. Contention Window contro
- Page 158 and 159: Chapter 8. Contention Window contro
- Page 160 and 161: Chapter 8. Contention Window contro
- Page 162 and 163: Chapter 8. Contention Window contro
- Page 164 and 165: Chapter 8. Contention Window contro
- Page 166 and 167: Chapter 8. Contention Window contro
- Page 168 and 169: Chapter 8. Contention Window contro
- Page 170 and 171: Chapter 8. Contention Window contro
- Page 172 and 173: Chapter 8. Contention Window contro
- Page 175 and 176: CHAPTER9Contention Window resetting
- Page 177 and 178: 9.1. Dynamic Resetting Algorithm (D
- Page 179 and 180: 9.1. Dynamic Resetting Algorithm (D
- Page 181 and 182: 9.2. Evaluation of the dynamic rese
- Page 183 and 184: 9.2. Evaluation of the dynamic rese
- Page 185 and 186: 9.2. Evaluation of the dynamic rese
- Page 187 and 188: 9.2. Evaluation of the dynamic rese
- Page 189 and 190: 9.3. Neighbor and Interferences Awa
- Page 191 and 192: 9.3. Neighbor and Interferences Awa
- Page 193 and 194: 9.4. Performance evaluation of the
- Page 195 and 196: 9.4. Performance evaluation of the
- Page 197 and 198: 9.5 The eDRA versus the NIAMac prot
- Page 199 and 200: 9.6. MobiNIAMac protocolthe results
- Page 201 and 202: 9.7. Comparison of eDRA, NIAMac and
- Page 203: 9.7. Comparison of eDRA, NIAMac and
- Page 207 and 208: 10.1. Performance evaluation of the
- Page 209 and 210: 10.1. Performance evaluation of the
- Page 211 and 212: 10.1. Performance evaluation of the
- Page 213 and 214: 10.1. Performance evaluation of the
- Page 215 and 216: 10.1. Performance evaluation of the
- Page 217 and 218: 10.1. Performance evaluation of the
- Page 219 and 220: 10.1. Performance evaluation of the
- Page 221 and 222: 10.1. Performance evaluation of the
- Page 223 and 224: 10.1. Performance evaluation of the
- Page 225: 10.1. Performance evaluation of the
- Page 228 and 229: Chapter 11. Basic and enhanced powe
- Page 230 and 231: Chapter 11. Basic and enhanced powe
- Page 232 and 233: Chapter 11. Basic and enhanced powe
- Page 234 and 235: Chapter 11. Basic and enhanced powe
- Page 236 and 237: Chapter 11. Basic and enhanced powe
- Page 238 and 239: Chapter 11. Basic and enhanced powe
- Page 240 and 241: Chapter 11. Basic and enhanced powe
- Page 242 and 243: Chapter 11. Basic and enhanced powe
- Page 244 and 245: Chapter 11. Basic and enhanced powe
- Page 246 and 247: Chapter 11. Basic and enhanced powe
- Page 248 and 249: Chapter 11. Basic and enhanced powe
- Page 250 and 251: Chapter 11. Basic and enhanced powe
- Page 252 and 253: Chapter 11. Basic and enhanced powe
- Page 254 and 255:
Chapter 11. Basic and enhanced powe
- Page 256 and 257:
Chapter 12. A cross-layer PHY-MAC p
- Page 258 and 259:
Chapter 12. A cross-layer PHY-MAC p
- Page 260 and 261:
Chapter 12. A cross-layer PHY-MAC p
- Page 262 and 263:
Chapter 12. A cross-layer PHY-MAC p
- Page 264 and 265:
Chapter 12. A cross-layer PHY-MAC p
- Page 266 and 267:
Chapter 12. A cross-layer PHY-MAC p
- Page 268 and 269:
Chapter 12. A cross-layer PHY-MAC p
- Page 270 and 271:
Chapter 12. A cross-layer PHY-MAC p
- Page 272 and 273:
Chapter 12. A cross-layer PHY-MAC p
- Page 274 and 275:
Chapter 12. A cross-layer PHY-MAC p
- Page 276 and 277:
Chapter 12. A cross-layer PHY-MAC p
- Page 278 and 279:
Chapter 12. A cross-layer PHY-MAC p
- Page 280 and 281:
Chapter 12. A cross-layer PHY-MAC p
- Page 282 and 283:
Chapter 12. A cross-layer PHY-MAC p
- Page 284 and 285:
Chapter 12. A cross-layer PHY-MAC p
- Page 286 and 287:
Chapter 12. A cross-layer PHY-MAC p
- Page 288 and 289:
Chapter 12. A cross-layer PHY-MAC p
- Page 290 and 291:
Chapter 12. A cross-layer PHY-MAC p
- Page 293 and 294:
CHAPTER13Conclusions and Perspectiv
- Page 295 and 296:
Chapter 13. Conclusion and Perspect
- Page 297 and 298:
Chapter 13. Conclusion and Perspect
- Page 299:
Chapter 13. Conclusion and Perspect
- Page 302 and 303:
References[11] HSPA Mobile broadban
- Page 304 and 305:
References[43] Intelligent Transpor
- Page 306 and 307:
References[71] Chane L. Fullmer J.
- Page 308 and 309:
References[101] Mort Naraghi-Pour.
- Page 310 and 311:
References[130] P.K. Varshney J. De
- Page 312 and 313:
References[158] Q. Lindsey D. Lymbe