scispace - formally typeset
Journal ArticleDOI

Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit

Frederico Calì, +2 more
- 01 Dec 2000 - 
- Vol. 8, Iss: 6, pp 785-799
Reads0
Chats0
TLDR
A distributed algorithm is proposed that enables each station to tune its backoff algorithm at run-time and indicates that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.
Abstract
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically derive the average size of the contention window that maximizes the throughput, hereafter theoretical throughput limit, and we show that: 1) depending on the network configuration, the standard can operate very far from the theoretical throughput limit; and 2) an appropriate tuning of the backoff algorithm can drive the IEEE 802.11 protocol close to the theoretical throughput limit. Hence we propose a distributed algorithm that enables each station to tune its backoff algorithm at run-time. The performances of the IEEE 802.11 protocol, enhanced with our algorithm, are extensively investigated by simulation. Specifically, we investigate the sensitiveness of our algorithm to some network configuration parameters (number of active stations, presence of hidden terminals). Our results indicate that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.

read more

Content maybe subject to copyright    Report

Citations
More filters

Universidade federal de santa catarina programa de pós-graduação em ciência da computação

TL;DR: It was proposed two protocols for the long-term preservation of secrecy and authenticity of electronic documents that improves this work in order to overcome the verified weaknesses.
Proceedings ArticleDOI

An adaptive radio resource management technique for APs in WLANs

TL;DR: A real-time algorithm to estimate the number of active stations from the standpoint of an AP, instead of a station is developed and for the first time, the optimal switching probability is found that can minimize the transient time for an AP to reach the equilibrium state.
Journal ArticleDOI

Delay analysis and optimality of the renewal access protocol

TL;DR: It is shown that, if a Poisson distribution is used as the selection distribution of the RAP, then the resulting RAP achieves high short-term fairness as well as optimal throughput and the Poisson selection distribution provides near-optimal delay performance.
Proceedings ArticleDOI

Enhanced backoff scheme in CSMA/CA for IEEE 802.11

TL;DR: In this article, an enhanced CSMA/CA (carrier sense multiple access with collision avoidance) protocol is proposed to improve the exponential backoff scheme by dynamically adjusting the contention window (CW) around the optimal value.
Proceedings ArticleDOI

Generalized CSMA/CA Protocol for OFDMA Systems

TL;DR: A multi-channel carrier sense multiple access with collision avoidance (CSMA/CA) protocol for orthogonal frequency division multiple access (OFDMA) systems that allows to segment the channel bandwidth into multiple narrow-band random access channels and adjust the transmission probability according to the multichannel activity in a flexible manner.
References
More filters
Journal ArticleDOI

Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics

TL;DR: Two protocols are described for CSMA and their throughput-delay characteristics are given and results show the large advantage CSMA provides as compared to the random ALOHA access modes.
Journal ArticleDOI

Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution

TL;DR: The busy-tone multiple-access mode is introduced and analyzed as a natural extension of CSMA to eliminate the hidden-terminal problem and results show that BTMA with hidden terminals performs almost as well as CSMA without hidden terminals.
Book

TCP/IP Illustrated Vol 1 The Protocols

TL;DR: TCP/IP Illustrated, Volume 1 is a complete and detailed guide to the entire TCP/IP protocol suite - with an important difference from other books on the subject: rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.
Journal ArticleDOI

IEEE 802.11 Wireless Local Area Networks

TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Book

Stochastic models in operations research

TL;DR: This course provides an introduction to the modeling and analysis of various random phenomena occurring in operations research and businesses such as inventory theory, queueing theory, genetics, demography, epidemiology, competing populations.
Related Papers (5)