Location, location, location: Border effects in interference limited ad hoc networks

Orestis Georgiou, Shanshan Wang, Mohammud Z. Bocus, Carl P Dettmann, Justin P Coon

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)
244 Downloads (Pure)

Abstract

Wireless networks are fundamentally limited by the intensity of the received signals and by their inherent interference. It is shown here that in finite ad hoc networks where node placement is modelled according to a Poisson point process and no carrier sensing is employed for medium access, the SINR received by nodes located at the border of the network deployment/operation region is on average greater than the rest. This is primarily due to the uneven interference landscape of such networks which is particularly kind to border nodes giving rise to all sorts of performance inhomogeneities and access unfairness. Using tools from stochastic geometry we quantify these spatial variations and provide closed form communication-theoretic results showing why the receiver's location is so important.

Original languageEnglish
Title of host publication2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2015)
Subtitle of host publicationProceedings of a meeting held 25-29 May 2015, Mumbai, India
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages568-575
Number of pages8
ISBN (Electronic)9783901882746
ISBN (Print)9781467366823
DOIs
Publication statusPublished - Aug 2015
Event2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015 - Mumbai, India
Duration: 25 May 201529 May 2015

Conference

Conference2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015
CountryIndia
CityMumbai
Period25/05/1529/05/15

Fingerprint Dive into the research topics of 'Location, location, location: Border effects in interference limited ad hoc networks'. Together they form a unique fingerprint.

Cite this