References:
1.Tsertou and D. I. Laurenson, “Insights into the hidden node problem,”Proceeding of the 2006 international conference on Communications and mobile computing, pp. 767-772, 2006.
2.K. Xu, M. Gerla, and S. Bae, “How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?” IEEE GLOBECOM’02, Vol. 1, pp. 72-76,
November2002.
3.. Performance evaluation of key 802.11 mac protocals ENSC 835: COMMUNICATION NETWORKS Y Wu, B Li – 2011,
4.S.Ray, J.B.Carruthers, and D.Starobinski, “RTS/CTS-induced congestion in ad hoc wireless LANs,” In WCNC, 2003
5. E. E.T.C. Tsai,C. Tu,”Improving IEEE 802.11 RTS/CTS handshake in wireless adhoc networks considering large interference range,” Technical Report, NCU, Chengchi, Taiwan, 2004.
1.Tsertou and D. I. Laurenson, “Insights into the hidden node problem,”Proceeding of the 2006 international conference on Communications and mobile computing, pp. 767-772, 2006.
2.K. Xu, M. Gerla, and S. Bae, “How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?” IEEE GLOBECOM’02, Vol. 1, pp. 72-76,
November2002.
3.. Performance evaluation of key 802.11 mac protocals ENSC 835: COMMUNICATION NETWORKS Y Wu, B Li – 2011,
4.S.Ray, J.B.Carruthers, and D.Starobinski, “RTS/CTS-induced congestion in ad hoc wireless LANs,” In WCNC, 2003
5. E. E.T.C. Tsai,C. Tu,”Improving IEEE 802.11 RTS/CTS handshake in wireless adhoc networks considering large interference range,” Technical Report, NCU, Chengchi, Taiwan, 2004.