[1] | G. R. Hiertz, "IEEE 802.11s: The WLAN Mesh Standard," in IEEE Wireless Communications, vol. 17, no. 1, pp. 104-111, February 2010. |
[2] | I. F. Akyildiz and Xudong Wang, "A survey on wireless mesh networks," in IEEE Communications Magazine, vol. 43, no. 9, pp. S23-S30, Sept. 2005. |
[3] | Salitha Priyanka Undugodage and Nurul I Sarkar, “Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Networks: Design Challenges, Guidelines and Future Directions”, IJWMN, Vol. 5, No. 3, June 2013. |
[4] | Kamal Kumar and Pooja Saini “Performance Evaluation of VOIP in MultiHop Wireless Mesh Network”, ICACCT, ISBN 81-87885-03-3, 2011. |
[5] | Bayer N, Castro M C, Dely P, Kesslar A “VoIP service performance optimization in pre-IEEE802.11s Wireless mesh network”, pp75-79, 2008. |
[6] | Yu Cheng; Hongkun Li; Peng-Jun Wan; Xinbing Wang, “Wireless Mesh Network Capacity Achievable Over the CSMA/CA MAC,” in Vehicular Technology, IEEE Transactions on , vol.61, no.7, pp.3151-3165, 2012. |
[7] | IEEE 802 LAN/MAN Standards Committee, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11,” 1999. |
[8] | J. Deng, B. Liang, and P. K. Varshney, “Tuning the carrier sense range of IEEE 802.11 MAC,” in Proceedings of IEEE Global Telecommunications Conference - Wireless Communications, Networks, and Systems (Globecom’04), 2004. |
[9] | P. Kyasanur, J. Padhye, and P. Bahl, “On the efficacy of separating control and data into different frequency bands,” in Proceedings of 1st IEEE International Conference on Broadband Networks, 2005. |
[10] | A. Acharya, A. Misra, and S. Bansal, “Design and analysis of a cooperative medium access scheme for high-performance wireless mesh networks,” in Proceedings of 1st IEEE International Conference on Broadband Networks, 2004. |
[11] | L. Bao and J. J. Garcia-Luna-Aceves, “A new approach to channel access scheduling for ad hoc networks,” in MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking, (New York, NY, USA), pp. 210–221, ACM Press, 2001. |
[12] | Chin-Ya Huang; Ramanathan, P., “Network Layer Support for Gigabit TCP Flows in Wireless Mesh Networks,” in Mobile Computing, IEEE Transactions on , vol.14, no.10, pp.2073-2085, 2015. |
[13] | Anusha, M.; Vemuru, S.; Gunasekhar, T., "TDMA-based MAC protocols for scheduling channel allocation in multi-channel wireless mesh networks using cognitive radio," in Circuit, Power and Computing Technologies (ICCPCT), International Conference on, vol., no., pp.1-5, 2015. |
[14] | Djukic, P.; Valaee, S., "Distributed Link Scheduling for TDMA Mesh Networks," in Communications, 2007. ICC '07. IEEE International Conference on, vol., no., pp.3823-3828, 24-28 2007. |
[15] | S. Zhao, Z. Wu, A. Acharya, and D. Raychaudhuri, “PARMA: A PHY/MAC aware routing metric for ad-hoc wireless networks with multi-rate radios,” in Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2005), 2005. |
[16] | Zhibin Wu and D. Raychaudhuri, "Integrated routing and MAC scheduling for single-channel wireless mesh networks," World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a, Newport Beach, CA, pp. 1-8, 2008. |
[17] | S. Chakraborty, S. Nandi and S. Chattopadhyay, "Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks," in IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 928-937, Feb. 2016. |
[18] | S. Chakraborty, S. Chattopadhyay, S. Chakraborty, and S. Nandi, “Defending concealedness in IEEE 802.11n,” in proceedings of the 6th COMSNETS, Jan 2014, pp. 1–8. |
[19] | K. Nishide, H. Kubo, R. Shinkuma, and T. Takahashi, “Detecting hidden and exposed terminal problems in densely deployed wireless networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 11, pp. 3841–3849, 2012. |
[20] | P. van de Ven, A. Janssen, and J. van Leeuwaarden, “Balancing exposed and hidden nodes in linear wireless networks,” IEEE/ACM Transactions on Networking, vol. 22, pp. 1429 – 1443, October 2014. |
[21] | L. Deek, E. Garcia-Villegas, E. Belding, S. Lee, and K. Almeroth, “Intelligent channel bonding in 802.11n WLANs,” IEEE Transactions on Mobile Computing, vol. 13, pp. 1536–1233, June 2014. |
[22] | Asha C. N., and T. G. Basavaraju, “A Device Pair Classification based Channel Slot Re-Utilization Optimization for Scalability Enhancement in Wireless Mesh Network”, International Journal of Computer Science and Telecommunications, Volume 7, Issue 2, February 2016. |
[23] | Bruno R, Conti M, Gregori E: Mesh networks: commodity multihop ad hoc networks. IEEE Commun Mag, 43(3): 123-131, 2005. |
[24] | Zhang Y, Jijun L, Honglin H: Wireless Mesh Networking. Auerbach publication, Boca Raton; 2007. |
[25] | Gast MS: 802.11 Wireless Networks: The definitive Guide. O'Reilly & Associate, USA; 2002. |
[26] | Johnson DB, Maltz DA: Dynamic Source Routing in Ad Hoc Wireless Networks. In Proceedings of Mobile Computing. Volume chapt. 5. Edited by: Imielinski T, Korth H. Kluwer Academic Publishers, Dordrecht: 153-181, 1996. |
[27] | Perkins C, Royer EM, Das SR: Ad Hoc On-Demand Distance Vector (AODV) routing. IETF RFC 3561 2003. |
[28] | Khurana S, Kahol A, Jayasumana AP: Effect of Hidden Terminal On The Performance of IEEE 802.11 MAC Protocol. Proceedings of IEEE LCN'98, 12-22, 1998. |
[29] | Hadzi-Velkov Z, Gavrilovska L: Performance of the IEEE 802.11 Wireless LANs Under Influence Of Hidden Node. Proceedings of IEEE PWCS, 221-225, 1999. |
[30] | ANSI/IEEE Std 802.11: Part II: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1999. |
[31] | Xu K, Gerla M, Bae S: Effectiveness of RTS/CTS handshake in IEEE 802.11 based adhoc networks. Ad Hoc Netw J, 1: 107-123, 2003. |
[32] | Y. C. Tu, M. C. Chen and Y. S. Sun, "A Two-Stage Link Scheduling Scheme for Variable-Bit-Rate Traffic Flows in Wireless Mesh Networks," in IEEE Transactions on Wireless Communications, vol. 13, no. 11, pp. 6232-6244, Nov. 2014. |
[33] | S. Zhao and X. Lin, “On the design of scheduling algorithms for end-toend backlog minimization in multi-hop wireless networks,” in Proc. IEEE INFOCOM, 2012, pp. 981–989. |