scispace - formally typeset
Journal ArticleDOI

Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit

Frederico Calì, +2 more
- 01 Dec 2000 - 
- Vol. 8, Iss: 6, pp 785-799
Reads0
Chats0
TLDR
A distributed algorithm is proposed that enables each station to tune its backoff algorithm at run-time and indicates that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.
Abstract
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically derive the average size of the contention window that maximizes the throughput, hereafter theoretical throughput limit, and we show that: 1) depending on the network configuration, the standard can operate very far from the theoretical throughput limit; and 2) an appropriate tuning of the backoff algorithm can drive the IEEE 802.11 protocol close to the theoretical throughput limit. Hence we propose a distributed algorithm that enables each station to tune its backoff algorithm at run-time. The performances of the IEEE 802.11 protocol, enhanced with our algorithm, are extensively investigated by simulation. Specifically, we investigate the sensitiveness of our algorithm to some network configuration parameters (number of active stations, presence of hidden terminals). Our results indicate that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Quality analysis of CSMA/CA communications in inter-vehicle communication services

TL;DR: This paper proposes a mathematical model that can analyze communication quality between the specific vehicles by dealing with the discrepancies between conventional theory and practice and analyze communication performance between vehicles in specific accidents using the proposed model.

Modeling and evaluating the impact of denial-of-service attacks in emerging wireless and mobile applications

TL;DR: The work in this dissertation advances the understanding of network vulnerabilities associated with emerging wireless networks, and offers instrumental guidance into the security design for future wireless and mobile applications.
Journal ArticleDOI

Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks

TL;DR: This work presents Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver during protocol execution.
Book ChapterDOI

Intra-flow interference study in IEEE 802.11s mesh networks

TL;DR: An analytical model is proposed to study the problem of intra-flow interference in wireless mesh networks, taking into account collisions caused by both neighbor stations and hidden stations, and estimates the saturated throughput of a given flow in the mesh network.
References
More filters
Journal ArticleDOI

Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics

TL;DR: Two protocols are described for CSMA and their throughput-delay characteristics are given and results show the large advantage CSMA provides as compared to the random ALOHA access modes.
Journal ArticleDOI

Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution

TL;DR: The busy-tone multiple-access mode is introduced and analyzed as a natural extension of CSMA to eliminate the hidden-terminal problem and results show that BTMA with hidden terminals performs almost as well as CSMA without hidden terminals.
Book

TCP/IP Illustrated Vol 1 The Protocols

TL;DR: TCP/IP Illustrated, Volume 1 is a complete and detailed guide to the entire TCP/IP protocol suite - with an important difference from other books on the subject: rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.
Journal ArticleDOI

IEEE 802.11 Wireless Local Area Networks

TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Book

Stochastic models in operations research

TL;DR: This course provides an introduction to the modeling and analysis of various random phenomena occurring in operations research and businesses such as inventory theory, queueing theory, genetics, demography, epidemiology, competing populations.
Related Papers (5)