Preview

ieee

Powerful Essays
Open Document
Open Document
8461 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ieee
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000

535

Performance Analysis of the IEEE 802.11 Distributed
Coordination Function
Giuseppe Bianchi

Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, in this paper we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol.
Index Terms—802.11, collision avoidance, CSMA, performance evaluation. I. INTRODUCTION

I

N recent years, much interest has been involved in the design of wireless networks for local area communication
[1], [2]. Study group 802.11 was formed under IEEE Project
802 to recommend an international standard for Wireless Local
Area Networks (WLAN’s). The final version of the standard has recently appeared [3], and provides detailed medium access control (MAC) and physical layer (PHY) specification for
WLAN’s.
In the 802.11 protocol, the fundamental mechanism to access the medium is called distributed coordination function (DCF).
This is a random access scheme, based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Retransmission of collided packets is



References: Proc. IEEE, vol. 82, pp. 1398–1430, Sept. 1994. [2] A. De Simone and S. Nanda, “Wireless data: Systems, standards, services,” J. Wireless Networks, vol. 1, no. 3, pp. 241–254, Feb. 1996. Proc. IEEE PIMRC, Toronto, Canada, Sept. 1995, pp. 907–911. Eng., Univ. Arizona, Tucson, AZ, 1996. 55–67, 1997. IEEE PIMRC, Taipei, Taiwan, Oct. 1996, pp. 392–396. San Francisco, CA, Mar. 1998. PIMRC, Taipei, Taiwan, Oct. 1996, pp. 407–411. [13] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 1987.

You May Also Find These Documents Helpful

  • Good Essays

    The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    While an 802.11b/g model for wireless networking using a traditional centralized WLAN switch might work, this solution is very expensive and has several limitations. This type of model is prone to inefficient application delivery, performance bottlenecking, and having a single point of failure depending on the health of the centralized WLAN switch.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std. 802.1X (2004).…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Media access management module main CSMA / CD (carrier sense multiple access with collision detection) protocol. CSMA / CD is a distributed MAC protocol that enables multiple network stations (nodes) can be shared transmission medium. Sending data when the frame, the first node listens for a carrier, when the medium is idle starts when the transmission frame, if in conflict with other nodes in the transmission process, each node must be given is a 32-bit transmission blocking signals to enhance the size of the conflict, in order to inform the bus conflict has occurred on each site, and then re-random delay period contention medium, and then resend the data frame.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    | |containing success or failure |mechanisms of the 802.11 standard also |management frames are still |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Encapsulation is an attribute of object design. It means that all of the object's data is contained and hidden in the object and access to it restricted to members of that class. A procedure is a type of encapsulation because it combines a series of computer instructions. Likewise, a complex data type, such as a record or class, relies on encapsulation.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    802.11g’s provide high speed wireless networking in the 2.4 GHz range. They have few channels(three which can be used indoors in the US) and can provide more elsewhere on a global scale, due to varying radio frequency spectrum regulations.…

    • 858 Words
    • 4 Pages
    Good Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Study Guide

    • 1194 Words
    • 5 Pages

    9. What is the frequency range used by 802.11a, and what modulation technique is used?…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    802.21

    • 2871 Words
    • 12 Pages

    | W.-S. Lim, D.-W. Kim, Y.-J. Suh and J.-J. Won, "Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks," Computer Communications, vol. 32, no. 1, pp. 134-143, 2009.…

    • 2871 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    chapter 8 questions

    • 552 Words
    • 3 Pages

    - 802.11a: provides high speed wireless networking in the 5 GHz range. It is a legacy technology, and no new products are being developed; but some firms still use it. It provides eight channels for indoor use in the United States (plus one channel for outdoor use). The 802.11a standard provides for more or fewer channels in other parts of the world where the radio frequency spectrum regulation is different.…

    • 552 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays

Related Topics