|
[1] K. Pahlavan and A. H. Levesque, “Wireless data communications,” Proc .IEEE, vol. 82, pp. 1398–1430, Sept. 1994. [2] A. De Simone and S. Nanda, “Wireless data: Systems, standards, services,” J. Wireless Networks, vol. 1, no. 3, pp. 241–254, Feb. 1996. [3] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Nov. 1997. P802.11. [4] L. Kleinrock and F. Tobagi, “Packet switching in radio channels, Part II The hidden terminal problem in carrier sense multiple access and the busy tone solution,” IEEE Trans. Commun., vol. COM-23, no. 12, pp. 1417–1433, Dec. 1975. [5] H. S. Chhaya and S. Gupta, “Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol,” Wireless Networks, vol. 3, pp. 217–234, 1997. [6] K. C. Huang and K. C. Chen, “Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks,” in Proc. IEEE PIMRC, Toronto, Canada, Sept. 1995, pp. 907–911. [7] Wireless LAN MAC and PHY Specifications Amendment 8: MAC Quality of Service Enhancements, IEEE 802.11e WG, Sep. 2005. [8] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000. [9] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans. Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000. [10] F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 protocol: Design and performance evaluation of an adaptive backoff mechanism,” IEEE J. Sel. Areas Commun., vol. 18, no. 9, pp. 1774–1786, Sep. 2000. [11] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans. Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000. [12] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000. [13] J. S. Kim, E. Serpedin, and D. R. Shin, “Improved particle filtering based estimation of the number of competing stations in IEEE 802.11 networks,” IEEE Signal Process. Lett., vol. 15, pp. 87–90, Dec. 2008. [14] Y. Kwon, Y. Fang, and H. Latchman, “Novel MAC protocol with fast collision resolution for wireless LANs,” in Proc. IEEE INFOCOM, Apr. 2003, pp. 853–862. [15] J. Choi and J. Yoo, “EBA: An enhancement of the IEEE 802.11 DCF via distributed reservation,” IEEE Trans. Mobile Comput., vol. 4, no. 4, pp. 378–390, Jul./Aug. 2005. [16] D. Deng, C. Ke, H. Chen, and Y. Huang, “Contention window optimization for IEEE 802.11 DCF access control,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5129–5135, Dec. 2008. [17] F. Talucci, M. Gerla, and L. Fratta, “MACA-BI (MACA by invitation)—A receiver oriented access protocol for wireless multihop networks,” in Proc. IEEE Pers., Indoor, Mobile Radio Commun., Sep. 1997, pp. 435–439. [18] Z. J. Haas and J. Deng, “Dual busy tone multiple access (DBTMA)—A multiple access control scheme for ad hoc networks,” IEEE Trans. Commun., vol. 50, no. 6, pp. 975–985, Jun. 2002. [19] F. A. Tobagi and L. Kleinrock, “Packet switching in radio channels—Part III: Polling and (dynamic) split-channel reservation multiple access,” IEEE Trans. Commun., vol. COM-24, no. 8, pp. 832–844, Aug. 1976. [20] S. Gobriel, R. Melhem, and D. Mosse, “BLAM: An energy-aware MAC layer enhancement for wireless adhoc networks,” in Proc. IEEE Wireless Commun. Netw. Conf., Mar. 2005, pp. 1557–1563. [21] S. Romaszko and C. Blondia, “Neighbour-aware, collision avoidance MAC protocol (NCMac) for mobile ad hoc networks,” in Proc. Int. Symp. Wireless Commun. Syst., Sep. 2006, pp. 322–326. [22] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Enhancements for Higher Throughput, IEEE P802.11n–D4.0, Mar. 2008. [23] H. Jin, B. C. Jung, H. Y. Hwang, and D. K. Sung, “A MIMO-based collision mitigation scheme in uplink WLANs,” IEEE Commun. Lett., vol. 12, no. 6, pp. 417–419, Jun. 2008. [24] M. Park, S. Choi, and S. M. Nettles, “Cross-layer MAC design for wireless networks using MIMO,” in Proc. IEEE Globecom, St. Louis, MO, Nov. 2005, pp. 2870–2874. [25] K. Sundaresan, R. Sivakumar, M. A. Ingram, and T. Chang, “Medium access control in ad hoc networks with MIMO links: Optimization considerations and algorithms,” IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 350–365, Oct.–Dec. 2004. [26] J.-S. Park, A. Nandan, M. Gerla, and H. Lee, “SPACE-MAC: Enabling spatial reuse using MIMO channel-aware MAC,” in Proc. IEEE ICC, Seoul, Korea, May 2005, pp. 3642–3646. [27] R. Binder; N. Abramson, F. Kuo, A. Okinaka, D. Wax (1975). "ALOHA packet broadcasting - A retrospect" (PDF). Proc. 1975 National Computer Conference. AFIPS Press. [28] N. Abramson (December 2009). "The ALOHAnet – Surfing for Wireless Data" (PDF). IEEE Communications Magazine 47 (12): 21–25. [29] Ramos, D. Panigrahi, and S. Dey, “Quality of Service Provisioning in 802.11e Networks: Challenges, Approaches, and Future Directions”, IEEE Network, Vol. 19, pp. 14–20, July 2005. [30] S. A. Jafar and M. J. Fakhereddin, “Degrees of freedom for the MIMO interference channel,” IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2637–2642, Jul. 2007.
|