IEEE 802.11a Throughput Performance with Hidden Nodes
ABSTRACT Analytic performance of IEEE 802.11 distributed coordination function that takes into account hidden node problem and unsaturated traffic condition is presented for symmetric networks. This enables us to estimate the performance of practical wireless local area networks more accurately. It is shown that the presence of hidden nodes barely affects the network performance in low traffic conditions, but it causes 33% performance loss in moderate traffic scenarios. Analytical results presented in the paper are backed by simulation results.
Conference Proceeding: Analyzing the throughput of IEEE 802.11 DCF scheme with hidden nodes[show abstract] [hide abstract]
ABSTRACT: In this paper, we analyze the throughput of the IEEE 802.11 DCF scheme using the RTS/CTS access mechanism in multi-hop ad hoc networks. The mathematical analysis is much more involved than that in a single-hop network due to the hidden node problem. A more realistic carrier sense range is considered in this paper. The impact of parameters, such as the number of stations, the packet size, and the carrier sense range, is also considered. Simulation results show good agreement with the analytical results.Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th; 11/2003
- [show abstract] [hide abstract]
ABSTRACT: The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocolIEEE Journal on Selected Areas in Communications 04/2000; · 3.12 Impact Factor