{"id":"https://openalex.org/W2107678120","doi":"https://doi.org/10.1109/aiccsa.2009.5069344","title":"An efficient 802.11 medium access control method and its simulation analysis","display_name":"An efficient 802.11 medium access control method and its simulation analysis","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2107678120","doi":"https://doi.org/10.1109/aiccsa.2009.5069344","mag":"2107678120"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2009.5069344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2009.5069344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058130747","display_name":"P. Venkata Krishna","orcid":"https://orcid.org/0000-0001-8138-5878"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. Venkata Krishna","raw_affiliation_strings":["School of Computing Sciences, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","School of Computing Sciences, VIT University, Vellore, TN, India"],"affiliations":[{"raw_affiliation_string":"School of Computing Sciences, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computing Sciences, VIT University, Vellore, TN, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]},{"id":"https://openalex.org/I141450709","display_name":"Monmouth University","ror":"https://ror.org/01d6qxv05","country_code":"US","type":"education","lineage":["https://openalex.org/I141450709"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["School of Information Technology, Indian Institute of Technology, Kharagpur, India","Department of Computer Science, Monmouth University, W. Long Branch, NJ 07764, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"Department of Computer Science, Monmouth University, W. Long Branch, NJ 07764, USA","institution_ids":["https://openalex.org/I141450709"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032787307","display_name":"Sudip Misra","orcid":"https://orcid.org/0000-0002-2467-6414"},"institutions":[{"id":"https://openalex.org/I141450709","display_name":"Monmouth University","ror":"https://ror.org/01d6qxv05","country_code":"US","type":"education","lineage":["https://openalex.org/I141450709"]},{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Sudip Misra","raw_affiliation_strings":["Department of Computer Science, Monmouth University, NJ, USA","School of Information Technology Indian Institute of Technology; Kharagpur India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Monmouth University, NJ, USA","institution_ids":["https://openalex.org/I141450709"]},{"raw_affiliation_string":"School of Information Technology Indian Institute of Technology; Kharagpur India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029765774","display_name":"V. Saritha","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Saritha","raw_affiliation_strings":["School of Computing Sciences, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","School of Computing Sciences, VIT University, Vellore, TN, India"],"affiliations":[{"raw_affiliation_string":"School of Computing Sciences, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computing Sciences, VIT University, Vellore, TN, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058130747"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.3428,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.63245883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"330","last_page":"335"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8142675161361694},{"id":"https://openalex.org/keywords/media-access-control","display_name":"Media access control","score":0.7184362411499023},{"id":"https://openalex.org/keywords/visual-basic-for-applications","display_name":"Visual Basic for Applications","score":0.6883761882781982},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6478854417800903},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.624032199382782},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5658336877822876},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5562853813171387},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5236244797706604},{"id":"https://openalex.org/keywords/access-method","display_name":"Access method","score":0.5217731595039368},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4853207468986511},{"id":"https://openalex.org/keywords/hidden-node-problem","display_name":"Hidden node problem","score":0.45716819167137146},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.453593909740448},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4036731421947479},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11075970530509949},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.10661187767982483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10008209943771362},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08299928903579712}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8142675161361694},{"id":"https://openalex.org/C513196756","wikidata":"https://www.wikidata.org/wiki/Q3295108","display_name":"Media access control","level":3,"score":0.7184362411499023},{"id":"https://openalex.org/C115199736","wikidata":"https://www.wikidata.org/wiki/Q667566","display_name":"Visual Basic for Applications","level":2,"score":0.6883761882781982},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6478854417800903},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.624032199382782},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5658336877822876},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5562853813171387},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5236244797706604},{"id":"https://openalex.org/C70000936","wikidata":"https://www.wikidata.org/wiki/Q4672467","display_name":"Access method","level":2,"score":0.5217731595039368},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4853207468986511},{"id":"https://openalex.org/C156738730","wikidata":"https://www.wikidata.org/wiki/Q2565413","display_name":"Hidden node problem","level":5,"score":0.45716819167137146},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.453593909740448},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4036731421947479},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11075970530509949},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.10661187767982483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10008209943771362},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08299928903579712},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2009.5069344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2009.5069344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1924820897","https://openalex.org/W1993238931","https://openalex.org/W2010359062","https://openalex.org/W2019728134","https://openalex.org/W2021521923","https://openalex.org/W2038522244","https://openalex.org/W2087901353","https://openalex.org/W2098148887","https://openalex.org/W2102630975","https://openalex.org/W2115233984","https://openalex.org/W2129374252","https://openalex.org/W2148099880","https://openalex.org/W2338403939","https://openalex.org/W3151344849","https://openalex.org/W6682170065"],"related_works":["https://openalex.org/W2110101697","https://openalex.org/W1585470534","https://openalex.org/W2156941064","https://openalex.org/W4243708224","https://openalex.org/W2048020478","https://openalex.org/W2593316511","https://openalex.org/W2272902337","https://openalex.org/W2149693961","https://openalex.org/W2168683518","https://openalex.org/W4299163324"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,70],"technique":[4,16],"called":[5],"as":[6,30,32],"Virtual":[7],"Back":[8],"off":[9,37],"Algorithm":[10],"(VBA),":[11],"based":[12],"on":[13,44],"the":[14,26,77,80,85],"sequencing":[15],"for":[17],"efficient":[18],"media":[19],"access":[20,66],"control.":[21],"The":[22,58,82],"proposed":[23,86],"method":[24,60,87],"minimizes":[25],"number":[27],"of":[28,79,84],"collisions":[29],"well":[31],"reduces":[33],"delays":[34],"during":[35],"back":[36],"periods.":[38],"We":[39,68],"present":[40],"an":[41],"analytical":[42],"study":[43],"MAC":[45],"layer":[46],"issues":[47],"that":[48],"are":[49,95],"very":[50,96],"important":[51],"while":[52],"accessing":[53],"channel":[54],"over":[55],"wireless":[56],"networks.":[57],"VBA":[59],"uses":[61],"fair":[62],"distributed":[63],"mechanisms":[64],"to":[65,75],"channel.":[67],"introduce":[69],"counter":[71],"at":[72],"each":[73],"node":[74],"maintain":[76],"discipline":[78],"nodes.":[81],"performance":[83],"is":[88],"evaluated":[89],"under":[90],"various":[91],"conditions":[92],"and":[93],"results":[94],"promising.":[97]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
