Fig. 6From: Medium access behavior analysis of two-flow topologies in IEEE 802.11 wireless networksScenarios of asymmetric sender receiver connected topologiesBack to article page